• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

News Article – Week 5

October 2, 2017 by Christie L Vazquez 2 Comments

https://www.technewsworld.com/story/84801.html

Interesting article where Apache strikes back against the Equifax breach being caused by a vulnerability in their framework.

They note no one at the @equifax domain has been in contact with them, insinuating they haven’t managed their environment, and that Equifax didn’t use database encryption.

The article also goes into a good explanation of a zero day vulnerability.

Filed Under: Week 05: System and User Enumeration Tagged With:

Reader Interactions

Comments

  1. Matt Roberts says

    October 2, 2017 at 12:25 pm

    Very interesting article, for me it particularly shed more light on the continuing issues with Equifax’s response in recent weeks. Last week, I went on to their site and and typed my last six ssn digits to see if I was affected, and just as the article pointed out, it took almost no time to bring up a message telling me that I may have been affected and offering me the free “TrustedID Premier.” I looked into what other people were saying about it and decided not to sign up. This coupled with the fact that executives may have sold their shares directly following the incident signifies gross mismanagement if not illegal actions on the part of Equifax both before and after the incident.

    Log in to Reply
  2. Jonathan Duani says

    October 3, 2017 at 6:40 pm

    I agree with Matt. I think it gave a lot more information on the current situation. Also I have heard that apache has been an issue in the past. It is interesting that even with it being such a known issue people still seem to neglect it.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in