Домой United States USA — software CERT/CC launches Twitter bot to give security bugs random names

CERT/CC launches Twitter bot to give security bugs random names

105
0
ПОДЕЛИТЬСЯ

CERT/CC attempts to reduce the use of sensationalized vulnerability names that needlessly scare software users.
In an attempt to reduce the use of sensationalized and scary vulnerability names, the CERT/CC team launched a Twitter bot that will assign random and neutral names to every security bug that receives a CVE identifier. Named Vulnonym, the bot is operated by the CERT Coordination Center (CERT/CC) at the Carnegie Mellon University, the first-ever CERT team created, and now a collaborator and partner of the DHS’ official US-CERT team. The idea for this bot came after the seemingly unending discussions around the topic «if vulnerabilities should have names?» For decades, all major security flaws have been assigned a CVE identifier by the MITRE Corporation. This ID is usually in the format of CVE-[YEAR]-[NUMBER], such as CVE-2019-0708. These CVE IDs are usually used by security software to identify bugs, track, and monitor bugs for statistical or reporting purposes, and CVE IDs are rarely used by humans in any meaningful way. Over the years, some security firms and security researchers realized that their work in identifying important bugs could easily get lost in a constant stream of CVE numbers that almost everyone has a hard time remembering.

Continue reading...