Title: Tech Companies Racing to Fix At-Risk Internet Software

Content: <div id='article-page'><div id='article-content' data-media-url='//news-app-staging.s3.amazonaws.com' data-base-url='//news-app-staging.herokuapp.com' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/A.wav' data-capture-url='//staging.analytics.lingraphica.com/events/capture_news' data-article-title='Tech Companies Racing to Fix At-Risk Internet Software' data-article-id='5972'><script src='//news-app-staging.herokuapp.com/javascripts/getscripts.js'></script><link rel='stylesheet' href='//news-app-staging.herokuapp.com/stylesheets/article.css' type='text/css' /><div class='article'><p><span data-start-time='0' data-end-time='9417'>Computer security experts around the world are trying to fix one of the worst software weaknesses found in years.</span> <span data-start-time='9417' data-end-time='16771'>The vulnerability is in an open-source program widely used by government and industry. </span> <span data-start-time='16771' data-end-time='23292'>It has become a major threat to organizations around the world.</span> <span data-start-time='23292' data-end-time='28292'>&ldquo;The internet&rsquo;s on fire right now," said Adam Meyers. </span> <span data-start-time='28292' data-end-time='34167'>He is the vice president at the cybersecurity company Crowdstrike.</span> <span data-start-time='34167' data-end-time='40271'>The problem is found in an open-source Apache utility called log4j. </span> <span data-start-time='40271' data-end-time='44792'>It is used to run websites and other web services. </span> <span data-start-time='44792' data-end-time='49646'>The vulnerability is known as &ldquo;Log4Shell.&rdquo;</span> <span data-start-time='49646' data-end-time='61083'>The software problem's severity was rated 10 on a scale from one to 10 by the Apache Software Foundation, which oversees development of the software.</span> <span data-start-time='61083' data-end-time='68979'>The vulnerability was reported on November 24 by the Chinese technology company Alibaba. </span> <span data-start-time='68979' data-end-time='72875'>It took two weeks to develop a patch.</span> <span data-start-time='72875' data-end-time='80438'>Last week, Meyers said that within 12 hours of discovering the problem it had been "fully weaponized.&rdquo; He said criminals have already developed and distributed tools to exploit it.</span> <span data-start-time='80438' data-end-time='86604'>He said criminals have already developed and distributed tools to exploit it.</span> <span data-start-time='86604' data-end-time='95833'>Experts say the bug, another word for a software problem, may be the worst computer weakness discovered in years.</span> <span data-start-time='95833' data-end-time='104625'>The Apache software is used in almost all cloud computing servers, across industry and government.</span> <span data-start-time='104625' data-end-time='111500'>Unless it is fixed, the bug gives criminals the ability to easily access internal networks.</span> <span data-start-time='111500' data-end-time='118708'>There, they could steal important data, put malware in place, and do much more damage.</span> </p></div><div class='control-buttons-sticky' style='display:none;'><div class='control-buttons'><button title='Back' class='back' disabled='disabled'></button><button title='Play' class='play' disabled='disabled'></button><button title='Pause' class='pause' style='display:none;'></button><button title='Forward' class='forward' disabled='disabled'></button><button class='finished-reading' style='display:none;'>Done</button></div></div></div><div id='article-media'><div id='media-image'><img src='https://news-app-production.s3.amazonaws.com/articles/5380/A.jpeg'/></div></div><div id='question-content' style='display:none;'><div class='vocabulary_question question-container' data-question-id=18284 data-hint-location='9417' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/what_is_a_vulnerability.wav'>What is a vulnerability?</div><div class='choices' data-correct-choice='something open to attack, harm, or damage'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/something_open_to_attack_harm_or_damage.wav'><span>something open to attack, harm, or damage</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/a_part_of_a_computer_system_or_network_which_is_designed_to_block_unauthorized_access.wav'><span>a part of a computer system or network which is designed to block unauthorized access</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/a_tower_or_pit_on_a_farm_used_to_store_grain.wav'><span>a tower or pit on a farm used to store grain</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/a_town_or_city_with_a_harbor_where_ships_load_or_unload.wav'><span>a town or city with a harbor where ships load or unload</span></div></div></div><div class='multiple_choice_question question-container' data-question-id=18285 data-hint-location='49646' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/on_a_scale_of_1_to_10_what_was_the_severity_rating_of_this_problem.wav'>On a scale of 1 to 10, what was the severity rating of this problem?</div><div class='choices' data-correct-choice='Ten'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/ten.wav'><span>Ten</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/nine.wav'><span>Nine</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/eight.wav'><span>Eight</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/seven.wav'><span>Seven</span></div></div></div><div class='sentence_completion_question question-container' data-question-id=18286 data-hint-location='28292' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/he_is_the_vice__blank__at_the_cybersecurity_company_crowdstrike.wav'>He is the vice <span class='blank'>president</span> at the cybersecurity company Crowdstrike.</div><div class='choices' data-correct-choice='president'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/president.wav'><span>president</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/doctor.wav'><span>doctor</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/presenter.wav'><span>presenter</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/preteen.wav'><span>preteen</span></div></div></div><div class='question-buttons'><button class='skip-button'></button><button class='hint-button'></button><button class='speak-button'></button></div></div></div>

Sound Name: https://news-app-production.s3.amazonaws.com/articles/5380/A.wav

Preview

Computer security experts around the world are trying to fix one of the worst software weaknesses found in years. The vulnerability is in an open-source program widely used by government and industry. It has become a major threat to organizations around the world. “The internet’s on fire right now," said Adam Meyers. He is the vice president at the cybersecurity company Crowdstrike. The problem is found in an open-source Apache utility called log4j. It is used to run websites and other web services. The vulnerability is known as “Log4Shell.” The software problem's severity was rated 10 on a scale from one to 10 by the Apache Software Foundation, which oversees development of the software. The vulnerability was reported on November 24 by the Chinese technology company Alibaba. It took two weeks to develop a patch. Last week, Meyers said that within 12 hours of discovering the problem it had been "fully weaponized.” He said criminals have already developed and distributed tools to exploit it. He said criminals have already developed and distributed tools to exploit it. Experts say the bug, another word for a software problem, may be the worst computer weakness discovered in years. The Apache software is used in almost all cloud computing servers, across industry and government. Unless it is fixed, the bug gives criminals the ability to easily access internal networks. There, they could steal important data, put malware in place, and do much more damage.

Edit | Back