This Week in Security: Backdoors in Cisco Switches, PGP Spoofing in Emails, Git Ransomware

Cisco CVE-2019-1804 Some switches in Cisco’s 9000 series are susceptible to a remote vulnerability. It’s a bit odd to call it a vulnerability, actually, because the software is operating as intended. Cisco shipped out these switches with the same private key hardcoded in software for all root SSH logins. Anyone …read more

Continue reading This Week in Security: Backdoors in Cisco Switches, PGP Spoofing in Emails, Git Ransomware

How can I trust a GPG key when I download it based on the fingerprint contained in the file I want to verify?

The instructions at https://tutorials.ubuntu.com/tutorial/tutorial-how-to-verify-ubuntu#3 suggest that you can download an ISO for installing an OS, along with the checksums and a signature. You then attempt to verify the si… Continue reading How can I trust a GPG key when I download it based on the fingerprint contained in the file I want to verify?