Print

Print


Thank you for this notice, Britt!

Gail



On 2/24/14 2:31 PM, Britt Griswold wrote:
[log in to unmask]" type="cite">
Last week a vulnerability in Apple's iOS and OS X was discovered that allows an attacker to read or 
even alter your encrypted traffic.  This includes all sorts of connections: web servers, email 
accounts, instant messages, calendars, etc.

To do this they'd have to control the network connection, so you're safe on trusted networks like 
GSFC Ethernet or "nasa" wireless. However, networks that anyone can join -- like at Starbucks 
wireless -- are potentially hazardous.  Home network security varies; ones properly protected by 
WPA2 should be safe.

If you have an iPhone or iPod Touch, you can fix this by updating to iOS 7.0.6 or 6.1.6.  Go to 
Settings -> General -> Software Updates while you're on a trusted network.

If you have a Mac with Mavericks, you're out of luck until Apple fixes it.  In the meantime bear in 
mind that built-in applications are no longer secure, including Safari, Mail, Messages, Calendar, 
FaceTime, Twitter, Keynote and iBooks.  Most importantly, Software Update itself uses this library, 
so make sure you're on a trusted network when applying the update that Apple finally makes available.

While you're waiting, note that Thunderbird, Firefox and Chrome are unaffected, as are pre-10.9 
versions of OS X.  Here's a test page to see if your browser is vulnerable:<https://gotofail.com/>

Britt

Need to leave or subscribe to the Sciart-L listserv? Follow the instructions at
http://www.gnsi.org/resources/reviews/gnsi-sciart-l-listserv


--
Gail Guth
Guth Illustration & Design
139 Lathrop Avenue
Battle Creek, MI  49014-5076
269-963-1311
[log in to unmask]
www.guthillustration.com


________________________________________________

Need to leave or subscribe to the Sciart-L listserv? Follow the instructions at
http://www.gnsi.org/resources/reviews/gnsi-sciart-l-listserv