Editing Article Page
Title
Content
<div id='article-page'><div id='article-content' data-media-url='//news-app-staging.s3.amazonaws.com' data-base-url='//news-app-staging.herokuapp.com' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/A.wav' data-capture-url='//staging.analytics.lingraphica.com/events/capture_news' data-article-title='Tech Companies Racing to Fix At-Risk Internet Software' data-article-id='5972'><script src='//news-app-staging.herokuapp.com/javascripts/getscripts.js'></script><link rel='stylesheet' href='//news-app-staging.herokuapp.com/stylesheets/article.css' type='text/css' /><div class='article'><p><span data-start-time='0' data-end-time='9417'>Computer security experts around the world are trying to fix one of the worst software weaknesses found in years.</span> <span data-start-time='9417' data-end-time='16771'>The vulnerability is in an open-source program widely used by government and industry. </span> <span data-start-time='16771' data-end-time='23292'>It has become a major threat to organizations around the world.</span> <span data-start-time='23292' data-end-time='28292'>“The internet’s on fire right now," said Adam Meyers. </span> <span data-start-time='28292' data-end-time='34167'>He is the vice president at the cybersecurity company Crowdstrike.</span> <span data-start-time='34167' data-end-time='40271'>The problem is found in an open-source Apache utility called log4j. </span> <span data-start-time='40271' data-end-time='44792'>It is used to run websites and other web services. </span> <span data-start-time='44792' data-end-time='49646'>The vulnerability is known as “Log4Shell.”</span> <span data-start-time='49646' data-end-time='61083'>The software problem's severity was rated 10 on a scale from one to 10 by the Apache Software Foundation, which oversees development of the software.</span> <span data-start-time='61083' data-end-time='68979'>The vulnerability was reported on November 24 by the Chinese technology company Alibaba. </span> <span data-start-time='68979' data-end-time='72875'>It took two weeks to develop a patch.</span> <span data-start-time='72875' data-end-time='80438'>Last week, Meyers said that within 12 hours of discovering the problem it had been "fully weaponized.” He said criminals have already developed and distributed tools to exploit it.</span> <span data-start-time='80438' data-end-time='86604'>He said criminals have already developed and distributed tools to exploit it.</span> <span data-start-time='86604' data-end-time='95833'>Experts say the bug, another word for a software problem, may be the worst computer weakness discovered in years.</span> <span data-start-time='95833' data-end-time='104625'>The Apache software is used in almost all cloud computing servers, across industry and government.</span> <span data-start-time='104625' data-end-time='111500'>Unless it is fixed, the bug gives criminals the ability to easily access internal networks.</span> <span data-start-time='111500' data-end-time='118708'>There, they could steal important data, put malware in place, and do much more damage.</span> </p></div><div class='control-buttons-sticky' style='display:none;'><div class='control-buttons'><button title='Back' class='back' disabled='disabled'></button><button title='Play' class='play' disabled='disabled'></button><button title='Pause' class='pause' style='display:none;'></button><button title='Forward' class='forward' disabled='disabled'></button><button class='finished-reading' style='display:none;'>Done</button></div></div></div><div id='article-media'><div id='media-image'><img src='https://news-app-production.s3.amazonaws.com/articles/5380/A.jpeg'/></div></div><div id='question-content' style='display:none;'><div class='vocabulary_question question-container' data-question-id=18284 data-hint-location='9417' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/what_is_a_vulnerability.wav'>What is a vulnerability?</div><div class='choices' data-correct-choice='something open to attack, harm, or damage'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/something_open_to_attack_harm_or_damage.wav'><span>something open to attack, harm, or damage</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/a_part_of_a_computer_system_or_network_which_is_designed_to_block_unauthorized_access.wav'><span>a part of a computer system or network which is designed to block unauthorized access</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/a_tower_or_pit_on_a_farm_used_to_store_grain.wav'><span>a tower or pit on a farm used to store grain</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/a_town_or_city_with_a_harbor_where_ships_load_or_unload.wav'><span>a town or city with a harbor where ships load or unload</span></div></div></div><div class='multiple_choice_question question-container' data-question-id=18285 data-hint-location='49646' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/on_a_scale_of_1_to_10_what_was_the_severity_rating_of_this_problem.wav'>On a scale of 1 to 10, what was the severity rating of this problem?</div><div class='choices' data-correct-choice='Ten'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/ten.wav'><span>Ten</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/nine.wav'><span>Nine</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/eight.wav'><span>Eight</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/seven.wav'><span>Seven</span></div></div></div><div class='sentence_completion_question question-container' data-question-id=18286 data-hint-location='28292' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/he_is_the_vice__blank__at_the_cybersecurity_company_crowdstrike.wav'>He is the vice <span class='blank'>president</span> at the cybersecurity company Crowdstrike.</div><div class='choices' data-correct-choice='president'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/president.wav'><span>president</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/doctor.wav'><span>doctor</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/presenter.wav'><span>presenter</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5380/preteen.wav'><span>preteen</span></div></div></div><div class='question-buttons'><button class='skip-button'></button><button class='hint-button'></button><button class='speak-button'></button></div></div></div>
Sound name
https://news-app-production.s3.amazonaws.com/articles/5380/A.wav
Show
|
Back