edition.cnn.com
Open in
urlscan Pro
2a04:4e42:600::773
Public Scan
Effective URL: https://edition.cnn.com/search?q=openssl
Submission: On November 02 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by GlobalSign Atlas R3 DV TLS CA 2022 Q1 on February 11th 2022. Valid for: a year.
This is the only time edition.cnn.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
ASN54113 (FASTLY, US)
www.cnn.com | |
edition.cnn.com | |
search.api.cnn.com |
ASN20940 (AKAMAI-ASN1, NL)
cdn.optimizely.com |
ASN20940 (AKAMAI-ASN1, NL)
lightning.cnn.com | |
cdn.cnn.com |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 250.253.120.34.bc.googleusercontent.com
tag.bounceexchange.com |
ASN16509 (AMAZON-02, US)
secure.quantserve.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-225-78-77.fra2.r.cloudfront.net
live.rezync.com |
ASN16509 (AMAZON-02, US)
rules.quantcount.com |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 95.72.98.34.bc.googleusercontent.com
assets.bounceexchange.com |
ASN16509 (AMAZON-02, US)
PTR: server-18-66-122-42.fra60.r.cloudfront.net
cdn.boomtrain.com |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-82-57-153.compute-1.amazonaws.com
people.api.boomtrain.com |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-224-153-210.compute-1.amazonaws.com
onsiterecs.api.boomtrain.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
cookielaw.org
cdn.cookielaw.org — Cisco Umbrella Rank: 635 |
240 KB |
7 |
cnn.com
1 redirects
www.cnn.com — Cisco Umbrella Rank: 6205 edition.cnn.com — Cisco Umbrella Rank: 26504 lightning.cnn.com — Cisco Umbrella Rank: 10953 z.cdp-dev.cnn.com — Cisco Umbrella Rank: 15875 search.api.cnn.com — Cisco Umbrella Rank: 927344 cdn.cnn.com — Cisco Umbrella Rank: 8719 |
582 KB |
6 |
bounceexchange.com
tag.bounceexchange.com — Cisco Umbrella Rank: 3966 assets.bounceexchange.com — Cisco Umbrella Rank: 3193 |
341 KB |
3 |
boomtrain.com
cdn.boomtrain.com — Cisco Umbrella Rank: 8472 people.api.boomtrain.com — Cisco Umbrella Rank: 8921 onsiterecs.api.boomtrain.com — Cisco Umbrella Rank: 12366 |
26 KB |
1 |
quantcount.com
rules.quantcount.com — Cisco Umbrella Rank: 1196 |
4 KB |
1 |
rezync.com
live.rezync.com — Cisco Umbrella Rank: 2870 |
1 KB |
1 |
quantserve.com
secure.quantserve.com — Cisco Umbrella Rank: 1410 |
10 KB |
1 |
turner.com
s.cdn.turner.com — Cisco Umbrella Rank: 10835 i2.cdn.turner.com Failed |
18 KB |
1 |
optimizely.com
cdn.optimizely.com — Cisco Umbrella Rank: 844 |
102 KB |
36 | 9 |
Domain | Requested by | |
---|---|---|
11 | cdn.cookielaw.org |
edition.cnn.com
cdn.cookielaw.org |
5 | assets.bounceexchange.com |
tag.bounceexchange.com
assets.bounceexchange.com |
2 | lightning.cnn.com |
edition.cnn.com
lightning.cnn.com |
1 | onsiterecs.api.boomtrain.com |
cdn.boomtrain.com
|
1 | cdn.cnn.com | |
1 | search.api.cnn.com |
edition.cnn.com
|
1 | people.api.boomtrain.com |
cdn.boomtrain.com
|
1 | cdn.boomtrain.com |
edition.cnn.com
|
1 | rules.quantcount.com |
secure.quantserve.com
|
1 | live.rezync.com |
edition.cnn.com
|
1 | secure.quantserve.com |
edition.cnn.com
|
1 | tag.bounceexchange.com |
edition.cnn.com
|
1 | s.cdn.turner.com |
edition.cnn.com
|
1 | z.cdp-dev.cnn.com |
edition.cnn.com
|
1 | cdn.optimizely.com |
edition.cnn.com
|
1 | edition.cnn.com | |
1 | www.cnn.com | 1 redirects |
0 | i2.cdn.turner.com Failed | |
36 | 18 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cnn.com GlobalSign Atlas R3 DV TLS CA 2022 Q1 |
2022-02-11 - 2023-03-15 |
a year | crt.sh |
cdn.optimizely.com DigiCert SHA2 Secure Server CA |
2021-12-24 - 2022-12-24 |
a year | crt.sh |
www.turner.com GlobalSign RSA OV SSL CA 2018 |
2022-10-28 - 2023-11-29 |
a year | crt.sh |
cookielaw.org Cloudflare Inc ECC CA-3 |
2022-05-01 - 2023-05-01 |
a year | crt.sh |
*.cdp.cnn.com GlobalSign Atlas R3 DV TLS CA 2022 Q1 |
2022-02-05 - 2023-03-09 |
a year | crt.sh |
cdn.turner.com GlobalSign RSA OV SSL CA 2018 |
2022-09-06 - 2023-10-08 |
a year | crt.sh |
tag.bounceexchange.com R3 |
2022-09-26 - 2022-12-25 |
3 months | crt.sh |
*.quantserve.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-08-09 - 2023-09-09 |
a year | crt.sh |
*.rezync.com Amazon |
2021-12-26 - 2023-01-23 |
a year | crt.sh |
assets.bounceexchange.com GTS CA 1D4 |
2022-10-03 - 2023-01-01 |
3 months | crt.sh |
*.boomtrain.com Amazon |
2022-03-11 - 2023-04-09 |
a year | crt.sh |
*.api.boomtrain.com Amazon |
2022-10-16 - 2023-11-14 |
a year | crt.sh |
onsiterecs.api.boomtrain.com Amazon |
2022-02-25 - 2023-03-26 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://edition.cnn.com/search?q=openssl
Frame ID: F88C096818D64E70DAB8FFDE8243AFCB
Requests: 37 HTTP requests in this frame
Screenshot
Page Title
Search CNN - Videos, Pictures, and News - CNN.comClose iconBack ButtonSearch IconFilter IconPage URL History Show full URLs
-
https://www.cnn.com/search?q=openssl
HTTP 302
https://edition.cnn.com/search?q=openssl Page URL
Detected technologies
OneTrust (Cookie compliance) ExpandDetected patterns
- cdn\.cookielaw\.org
- otSDKStub\.js
Optimizely (Analytics) Expand
Detected patterns
- optimizely\.com.*\.js
Quantcast Measure (Analytics) Expand
Detected patterns
- \.quantserve\.com/quant\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
140 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: US
Search URL Search Domain Scan URL
Title: World
Search URL Search Domain Scan URL
Title: Politics
Search URL Search Domain Scan URL
Title: Business
Search URL Search Domain Scan URL
Title: Opinion
Search URL Search Domain Scan URL
Title: Health
Search URL Search Domain Scan URL
Title: Entertainment
Search URL Search Domain Scan URL
Title: Style
Search URL Search Domain Scan URL
Title: Travel
Search URL Search Domain Scan URL
Title: Sports
Search URL Search Domain Scan URL
Title: Video
Search URL Search Domain Scan URL
Title: US
Search URL Search Domain Scan URL
Title: Arabic
Search URL Search Domain Scan URL
Title: Español
Search URL Search Domain Scan URL
Title: Electronics
Search URL Search Domain Scan URL
Title: Fashion
Search URL Search Domain Scan URL
Title: Beauty
Search URL Search Domain Scan URL
Title: Health & Fitness
Search URL Search Domain Scan URL
Title: Home
Search URL Search Domain Scan URL
Title: Reviews
Search URL Search Domain Scan URL
Title: Deals
Search URL Search Domain Scan URL
Title: Money
Search URL Search Domain Scan URL
Title: Gifts
Search URL Search Domain Scan URL
Title: Travel
Search URL Search Domain Scan URL
Title: Outdoors
Search URL Search Domain Scan URL
Title: Pets
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Crime + Justice
Search URL Search Domain Scan URL
Title: Energy + Environment
Search URL Search Domain Scan URL
Title: Extreme Weather
Search URL Search Domain Scan URL
Title: Space + Science
Search URL Search Domain Scan URL
Title: Africa
Search URL Search Domain Scan URL
Title: Americas
Search URL Search Domain Scan URL
Title: Asia
Search URL Search Domain Scan URL
Title: Australia
Search URL Search Domain Scan URL
Title: China
Search URL Search Domain Scan URL
Title: Europe
Search URL Search Domain Scan URL
Title: India
Search URL Search Domain Scan URL
Title: Middle East
Search URL Search Domain Scan URL
Title: United Kingdom
Search URL Search Domain Scan URL
Title: SCOTUS
Search URL Search Domain Scan URL
Title: Congress
Search URL Search Domain Scan URL
Title: Facts First
Search URL Search Domain Scan URL
Title: 2020 Election
Search URL Search Domain Scan URL
Title: Markets
Search URL Search Domain Scan URL
Title: Tech
Search URL Search Domain Scan URL
Title: Media
Search URL Search Domain Scan URL
Title: Success
Search URL Search Domain Scan URL
Title: Perspectives
Search URL Search Domain Scan URL
Title: Video
Search URL Search Domain Scan URL
Title: Political Op-Eds
Search URL Search Domain Scan URL
Title: Social Commentary
Search URL Search Domain Scan URL
Title: Life, But Better
Search URL Search Domain Scan URL
Title: Fitness
Search URL Search Domain Scan URL
Title: Food
Search URL Search Domain Scan URL
Title: Sleep
Search URL Search Domain Scan URL
Title: Mindfulness
Search URL Search Domain Scan URL
Title: Relationships
Search URL Search Domain Scan URL
Title: Stars
Search URL Search Domain Scan URL
Title: Screen
Search URL Search Domain Scan URL
Title: Binge
Search URL Search Domain Scan URL
Title: Culture
Search URL Search Domain Scan URL
Title: Innovate
Search URL Search Domain Scan URL
Title: Gadget
Search URL Search Domain Scan URL
Title: Foreseeable Future
Search URL Search Domain Scan URL
Title: Mission: Ahead
Search URL Search Domain Scan URL
Title: Upstarts
Search URL Search Domain Scan URL
Title: Work Transformed
Search URL Search Domain Scan URL
Title: Innovative Cities
Search URL Search Domain Scan URL
Title: Arts
Search URL Search Domain Scan URL
Title: Design
Search URL Search Domain Scan URL
Title: Fashion
Search URL Search Domain Scan URL
Title: Architecture
Search URL Search Domain Scan URL
Title: Luxury
Search URL Search Domain Scan URL
Title: Beauty
Search URL Search Domain Scan URL
Title: Video
Search URL Search Domain Scan URL
Title: Destinations
Search URL Search Domain Scan URL
Title: Food & Drink
Search URL Search Domain Scan URL
Title: Stay
Search URL Search Domain Scan URL
Title: Videos
Search URL Search Domain Scan URL
Title: Pro Football
Search URL Search Domain Scan URL
Title: College Football
Search URL Search Domain Scan URL
Title: Basketball
Search URL Search Domain Scan URL
Title: Baseball
Search URL Search Domain Scan URL
Title: Soccer
Search URL Search Domain Scan URL
Title: Olympics
Search URL Search Domain Scan URL
Title: Hockey
Search URL Search Domain Scan URL
Title: Videos
Search URL Search Domain Scan URL
Title: Live TV
Search URL Search Domain Scan URL
Title: Digital Studios
Search URL Search Domain Scan URL
Title: CNN Films
Search URL Search Domain Scan URL
Title: HLN
Search URL Search Domain Scan URL
Title: TV Schedule
Search URL Search Domain Scan URL
Title: TV Shows A-Z
Search URL Search Domain Scan URL
Title: CNNVR
Search URL Search Domain Scan URL
Title: CNN Underscored
Search URL Search Domain Scan URL
Title: CNN Store
Search URL Search Domain Scan URL
Title: Coupons
Search URL Search Domain Scan URL
Title: More
Search URL Search Domain Scan URL
Title: Photos
Search URL Search Domain Scan URL
Title: Longform
Search URL Search Domain Scan URL
Title: Investigations
Search URL Search Domain Scan URL
Title: CNN Profiles
Search URL Search Domain Scan URL
Title: CNN Leadership
Search URL Search Domain Scan URL
Title: CNN Newsletters
Search URL Search Domain Scan URL
Title: Work for CNN
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Meet Zerodium, the company that pays $1 million for Apple hacks Apr 07, 2016 There's a vibrant underground market for tools to hack you, but one company is making offers out in the open. Last year, Zerodium publicly offered $1 million for a powerful, new hack that would remotely sneak into an iPhone running Apple's latest software. In November, the firm announced the winner -- an unidentified team of hackers. Zerodium publicly offers up to $100,000 for Android and Windows Phone hacks. It'll pay $80,000 for hacks that involve the Adobe PDF reader or Flash Player. In a sense, Zerodium is a cyber arms dealer. It pays hackers to learn about their tactics, then packages that and sells it to elite subscribers. For $500,000 or more a year, governments could buy a road map for hacking Android phones to spy on people. Companies could learn about a special hacking tactic before it's used on their own Windows computers -- or quietly use it themselves for corporate espionage. Governments can even pay Zerodium a premium to get exclusive rights to a hacking method, though the company says those are rare. Zerodium's business is extremely controversial, because it is selling "zero-days," the golden gun of the cyber world. These are rare, powerful hacks that exploit never-before-seen vulnerabilities. They get their name from the notion that tech companies have had "zero days" to fix them. "This is a weapon," said Zuk Avraham, founder of cybersecurity firm Zimperium. "It takes one man to write an exploit these days -- one man willing to sell his soul to the devil." Selling zero-days on the open market can make the Internet and gadgets less safe to use, experts tell CNNMoney. "This is not good for the security of the public at large," said Patrick Wardle, the research director at cybersecurity firm Synack and one of the top Apple hackers around. But Zerodium has a different point of view. CEO Chaouki Bekrar explained via email that he's on a mission to help law enforcement investigate with better tools at its disposal. "The recent story between the FBI and Apple shows the most interesting aspect of the zero-day business, which is the need for government agencies to get access to unpatched flaws to properly conduct investigations and save lives," he wrote. Bekrar said the alternative is much worse: governments demanding companies give them full, legal access to devices everywhere through a back door. That's something the FBI was requesting until it ultimately managed to find a way to hack the iPhone of the San Bernardino shooter. Zerodium's CEO says the company is picky about whom it does business with, accepting money only from "major corporations and government organizations from western countries." An aggressive business model There's a very different -- and more benevolent -- way to deal with these kinds of dangerous computer flaws. Smart tech companies offer "bug bounties," typically cash prizes given to researchers who spot nasty weak spots. Google uses a bug bounty program to make its Android phones safer, and Facebook has paid $40,000 to spot bugs. Others take creative approaches. Uber has a new loyalty reward program for hackers, while United Airlines gave two hackers 1 million frequent flyer miles. Those bug bounties make everyone's devices safer. Zerodium's business model only protects its customers. "Hackers might be more apt to create weapons that can actively put users at risk -- rather than disclosing it to us," said Denelle Dixon-Thayer. She's the chief legal officer of Mozilla, maker of the web browser Firefox. Nonprofit Mozilla says it has rewarded researchers for spotting 260 bugs in the past two years, paying around $3,000 on average. But compare that to Zerodium, which openly advertises it will pay up to $30,000 for a Firefox hack. Dixon-Thayer said there's now direct pressure on tech companies everywhere to raise their bug bounty prices -- making computer security even more expensive. That might not be a problem for deep-pocketed Big Tech companies like Apple or Google, but it is a huge problem for the Internet's most popular open source projects, which are funded by donors and run by volunteers. (Bekrar said neither Apple nor Google are customers.) For example, Open SSL secures an incredible amount of online communication like banking, email and social media, but its budget is puny. The last sign of federal government support came in the form of a single $20,000 renewal contract from the Department of Defense in 2014. Yet Zerodium will pay up to $40,000 for a flaw in OpenSSL -- one like Heartbleed, the terrible Internet bug that threatened businesses and governments worldwide. "It's an unbalanced playing field," said Casey Ellis, CEO of Bugcrowd, a company that runs one of the largest bug bounty programs. "There's more incentive for people to drop cash on an exploit for offense than for raising defenses." It's imbalanced by design. "Offense market prices are very high to buy silence and are designed to extend the use of the exploit for as long as possible," said Katie Moussouris. She's a bug bounty expert who just founded her own consulting firm, Luta Security, to help companies and governments work with hackers to improve their defenses. And Zerodium isn't the only company selling zero-days to the highest bidder. Experts who closely watch the zero-day market say this business is also conducted by government contractors, like weapons maker Lockheed Martin, consultants at the RAND Corporation and the Florida-based Harris Corporation, which makes a police phone-tracking tool called the Stingray. Austin-based Exodus Intelligence, for example, publicly acknowledges that it has kept hacks secret so that customers "could use the 0-day for as long as necessary before it was patched." And some engage in questionable behavior. Just last year, the Italian firm Hacking Team was caught selling spy tools to evil governments. It's an arms race out there.
Search URL Search Domain Scan URL
Title: Heartbleed Part 2: The handshake bug Jun 26, 2014 The safety feature keeping your Web communication private -- the same one recently affected by the nasty Heartbleed bug -- has even more problems. You can call this one the "handshake bug." Computers and Web servers initiate secure conversations with one another in a process known as a "handshake." But this week, security researchers discovered a flaw in the way they shake hands. The bug allows a hacker operating between you and a website -- say, connected to the same public Wi-Fi network -- to snoop in on your Internet session. Here's the good news: The handshake bug isn't as devastating as Heartbleed. The only major browsers it affects are for Google's Android mobile operating system. And for a hacker to exploit the bug, you and the website must both be running vulnerable versions of the encrypting software, known as OpenSSL. But it's yet another wake up call that your Internet security relies on a few volunteers. The OpenSSL Foundation is a tiny team of computer programmers that only recently started getting additional financial support from many companies that rely on this software. The Linux Foundation said OpenSSL has received about half of the $5.4 million that companies have donated so far to the Core Infrastructure Initiative, an effort to better secure the Internet. In fact, many security researchers say the only reason we spotted the handshake bug is because, post-Heartbleed, more volunteers are combing through the OpenSSL computer code. The world can thank Masashi Kikuchi, a software security expert at the small Japanese consulting firm Lepidum who decided to look through the code himself. "The biggest reason why the bug hasn't been found for over 16 years is that code reviews were insufficient," Kikuchi wrote in a blog post. Related story: Fast in-flight Wi-Fi coming to Europe The bug has been fixed, and now it's up to Web browser makers and website servers to update their systems. According to Adam Langley, a senior researcher at Google, these Web browsers are safe: Internet Explorer, Firefox, Chrome (for desktop, iOS) and Safari According to Qualys engineering director Ivan Ristic, these browsers are vulnerable: Android and Chrome (for Android). "We shouldn't be surprised that there are more flaws in OpenSSL," said Jean Taggart, a researcher at antivirus maker Malwarebytes. "Security is a process, not a product." And if you're still worried about the handshake bug? Keep yourself clean. Don't use strangers' Wi-Fi.
Search URL Search Domain Scan URL
Title: Don't assume you're safe from Heartbleed Apr 25, 2014 In the post-Heartbleed world, assume your online communication isn't secure unless proven otherwise. It sounds alarmist, but it's true. Email, social media, banking -- all of it is at risk. The Heartbleed Internet bug is particularly nasty because it's pervasive. It affects apps, hardware and websites. Two weeks on, companies are still moving to address the bug: Apple didn't release a firmware update for its AirPort routers until Tuesday. Dell's SonicWALL app, which lets you connect to corporate networks from home, just got patched Monday. QNAP updated the firmware for its Turbo NAS data storage centers last week. Many of Cradlepoint's 3G and 4G modems, used by businesses, weren't patched until last week. On April 17, there were still 150 million vulnerable apps running on Android smartphones, according to cybersecurity provider FireEye. All must be updated. "The fallout from this is likely to continue for weeks and months to come," said Tom Brennan, a computer security expert who developed a free add-on to the Firefox Web browser that detects if a website is vulnerable. To be safe from Heartbleed, you need to know that everything you use to connect online is updated and fixed: smartphone apps, Wi-Fi routers, office servers, the websites you visit -- and their servers too. The risk is inherent in the complicated way the Internet works. Signing into your bank might bounce you to data centers around the globe. That's why solving the Heartbleed problem is a herculean task that's largely outside of your control. Related story: Your Internet security relies on a few volunteers All you can do is change your passwords often -- all of them -- and update your software to the latest version. And don't trust any app, device, computer environment or website until those in charge specifically say they've patched the problem. "At this point, the best thing the average consumer should do is simply pay close attention to vendors' notices and apply any fixes," said FireEye researcher Hui Xue. Then change all your passwords again. But many companies aren't making it easy for you to figure it out. Banks aren't placing announcements on their website homepages to reassure customers they're safe. Information about whether routers are vulnerable -- and how to fix them -- are located deep within the websites of Apple, D-Link and Netgear. Rick Dakin, CEO of IT department auditor Coalfire, said websites should be alerting customers, and company IT departments should be informing employees about their own company's situation. "If you go to a website today, and they don't have a statement on Heartbleed, I would be wary," Dakin said. It's difficult to overstate the problem. Heartbleed isn't a computer virus that automatically gets deleted by your computer's antivirus program. It's a flaw in the software devices use to talk to one another. And because these are all interconnected, it only takes one weak point to let hackers peek in. Even some versions of Symantec's Norton AntiVirus software were impacted. Bryan Harris, a researcher at analytics software maker SAS, called it "a systemic issue" with a long, uphill road ahead. Related story: Change these passwords right now So severe are the problems with OpenSSL, the encryption software that had the Heartbleed bug, that some are ditching it entirely. A Canadian computer programmer recently created another version of it, called LibreSSL, in an attempt to simplify and clean it up. But even if everything seems patched, we'll never know for sure, said Joe Touch, director of the Postel Center of computer research at the University of Southern California. New computer systems are often built relying on older ones which are no longer maintained. "Like most bugs, there are some systems that will correct very quickly, some less so, some never," he said.
Search URL Search Domain Scan URL
Title: Your Internet security relies on a few volunteers Apr 18, 2014 Last week's Heartbleed Internet bug revealed a startling fact. The software protecting banks, email, social media and government is maintained by only a few people. They're all volunteers. And only one does it as a full-time job. Their labor of love is OpenSSL, a free program that secures a lot of online communication. And it was a tiny coding slip-up two years ago that caused the Heartbleed bug, a hole that allows attackers to peer into computers. The bug forced emergency changes last week at major websites like Facebook, Google and Yahoo. But security experts say OpenSSL is severely underfunded, understaffed and largely ignored. The bug wasn't caught until recently, because the OpenSSL Software Foundation doesn't have the resources to properly check every change to the software, which is now nearly half a million lines of code long. And yet that program guards a vast portion of our commerce and government -- including weapon systems and smartphones, the foundation claims. Related story: Heartbleed Bug explained "The mystery is not that a few overworked volunteers missed this bug; the mystery is why it hasn't happened more often," Steve Marquess, the foundation's president, said in an open letter. When weighed against its critical importance to Internet security, OpenSSL has a shoestring budget. It has never received more than $1 million a year, Marquess said. The only federal support listed online was a single $20,000 renewal contract from the Department of Defense. While the foundation receives money from the Department of Homeland Security, Citrix and others, the vast majority of its funding is from specific work-for-hire contracts. A company wants a certain feature added here, a specific function there. It keeps developers busy. But Marquess said there's no money going toward reviewing the code or performing audits. In fact, the only person working on this full-time is Stephen Henson, an extremely private mathematician living in England who referred to Marquess for comment. Only a handful of other developers pitch in with any consistency, and Marquess told CNN their total labor amounts to maybe two full-time workers. Even in the aftermath of Heartbleed, the foundation has received only $9,000 -- sparking Marquess to publicly call out companies that use OpenSSL for free. "I'm looking at you, Fortune 1000 companies," he wrote. In the wake of Heartbleed, this lack of funding for OpenSSL may prove a wake-up call. Startups and major corporations frequently use open-source software because it's freely distributed and costs nothing. But they rarely contribute back in dollars or donated time. Without significant outside help -- donating dedicated staff and money without strings attached -- open-source projects like this are at risk of fizzling out or blowing up in our faces, said Azorian Cyber Security founder Charles Tendell. "If you bought your car and knew it was put together by volunteers, how would you feel about that?" Tendell asked. A select few firms provide some help. Facebook and Microsoft sponsor bug bounties via the HackerOne program -- essentially paying hackers to find mistakes that need fixing. And it was a Google security researcher, Neel Mehta, who discovered the Heartbleed bug. Others are convinced it's time to chip in. The initial response by Marc Gaffan, cofounder of cloud-security provider Incapsula, was: "What do you expect? You got this for free. You get what you pay for." But it turns out his company relies on OpenSSL too. When asked if he would lead by example, Gaffan promised his firm would make its first donation. Related story: Post-Heartbleed, change these passwords now This recent scare has gotten the White House's attention. The Obama administration is now "taking a hard look at widely used tools such as OpenSSL to see if there is more that the federal government needs to do -- including supporting research and development," said National Security Council spokeswoman Laura Lucas Magnuson. There's a catch, however. The government can only get so close without triggering fears that it's actually undermining the security of online communications, especially after Edward Snowden's disclosures about the National Security Agency's extensive surveillance programs. Former NSA crypto engineer Randy Sabett, now a tech privacy attorney at the Cooley law firm, expects the open-source community will be apprehensive. "The public does not want the government involved in the design of the commercial Internet," he said. "They don't want back doors put in."
Search URL Search Domain Scan URL
Title: IRS: File your taxes now, ignore Heartbleed bug Apr 14, 2014 Millions of people are filing their taxes just as governments grapple with Heartbleed, the worst privacy-killing Internet bug ever. Is your information at risk? It depends on where you live. The IRS said its systems weren't vulnerable to the computer bug, so U.S. folks are instructed to keep filing their taxes. But if you want a look at the potential dangers, just turn your attention to the United States' northern neighbor. Related story: Change these passwords right now Canada's taxing authority slammed on the brakes -- taking down its website for a few days -- after realizing its computers were exposed. Sure enough, there was a breach. On Monday, the Canada Revenue Agency discovered that someone had exploited the Heartbleed bug to tap into its systems for six hours and grab the Social Insurance Number of 900 taxpayers. The agency has since brought its website back online, with Canadian revenue commissioner Andrew Treusch assuring it's now "safe and secure." There's no sign the same thing has happened at the IRS. But with so many people filing taxes via big tax preparers and local independent accountants, there's cause for concern. The nation's largest tax preparers say they dodged the bullet. Intuit, maker of the popular TurboTax software program, said it wasn't affected by Heartbleed. But just in case, the company has taken security measures to make sure no one can trick your computer into visiting a fake TurboTax website. H&R Block said it's still reviewing its computer systems but has "found no risk to client data." It isn't clear whether the H&R Block was ever vulnerable or if it was, then patched it. The tax preparer told CNN its websites weren't using the vulnerable version of OpenSSL, the program that encrypts sensitive information for security purposes. However, there's no way to make sure you weren't spied on while filing your taxes, even if the chances were probably slim. The way Heartbleed works -- poking a hole in the way people communicate online -- is complicated. And it affects a lot of the equipment used by websites, big employers and small businesses everywhere. That means online communication might not have been safe at work or at home. It's difficult to be certain you were never exposed. Small businesses aren't likely to upgrade their systems anytime soon, so it's worth asking your accountant if they've reviewed their computer system. It's not an easy task. If you filed online, your best bet is to check that the website you use doesn't rely on the vulnerable version of the OpenSSL program -- or at least patched it right away. Some companies are issuing statements online to guide customers. Related story: Heartbleed 101 Tom Cross is the director of security research at Lancope, which makes hardware that helps companies investigate breaches. He offers this as consolation: Most major websites moved fast to fix this. But the reality is that the bug left many systems exposed for more than two years now. And the last week has provided a brief window that's especially unsafe because now the vulnerability is known publicly. There is another option though. You can just file your taxes the old way: slip the check into an envelope, lick it shut and drop it into a mailbox. That's the advice of Darren Hayes, a cybersecurity researcher. It sounds odd coming from someone who teaches computer science at Pace University. But he said, "The more you know tech, the more tech you shy away from sometimes."
Search URL Search Domain Scan URL
Title: The 'Heartbleed' security flaw that affects most of the Internet Apr 09, 2014 A major online security vulnerability dubbed "Heartbleed" could put your personal information at risk, including passwords, credit card information and e-mails. Heartbleed is a flaw in OpenSSL, an open-source encryption technology that is used by an estimated two-thirds of Web servers. It is behind many HTTPS sites that collect personal or financial information. These sites are typically indicated by a lock icon in the browser to let site visitors know the information they're sending online is hidden from prying eyes. Cybercriminals could exploit the bug to access visitors' personal data as well as a site's cryptographic keys, which can be used to impersonate that site and collect even more information. It was discovered by a Google researcher and an independent Finnish security firm called Codenomicon. The researchers have put up a dedicated site to answer common questions about the bug. They even gave it an adorably gruesome custom icon. Heartbleed is the result of a small coding error but it could have far-reaching consequences and affect the majority of Internet users. Researchers discovered the issue last week and published their findings on Monday, but said the problem has been present for more than two years, since March 2012. Any communications that took place over SSL in the past two years could have been subject to malicious eavesdropping. What makes the bug particularly problematic is that there is no simple fix. Action needs to be taken by both the compromised sites and individuals who have visited them. To protect their user data and encryption keys, sites must upgrade to the patched version of OpenSSL, revoke compromised SSL certificates and get new ones issued. Many major websites including Google, Facebook, Yahoo and Amazon have said they've taken steps to secure their sites. Security researchers demonstrated the flaw by stealing Yahoo e-mail logins on Tuesday morning, but Yahoo has since fixed the issue across its major sites, including Tumblr. It's not just an issue for major sites. Smaller online stores and services use OpenSSL, and those sites might take longer to make the necessary fixes. Websites don't typically publicize whether they're using OpenSSL, so the process will also be bumpy for consumers. Individuals should update their passwords across the various Web pages they use, but only once they have confirmed a site has already taken the proper measures to address Heartbleed. If they don't and that site is still at risk, the new password could also be compromised. Many sites will also likely send e-mails instructing customers to update passwords if necessary.
Search URL Search Domain Scan URL
Title: The Biden Presidency
Search URL Search Domain Scan URL
Title: US Elections
Search URL Search Domain Scan URL
Title: News
Search URL Search Domain Scan URL
Title: Audio
Search URL Search Domain Scan URL
Title: Weather
Search URL Search Domain Scan URL
Title: Climate
Search URL Search Domain Scan URL
Title: Storm Tracker
Search URL Search Domain Scan URL
Title: Wildfire Tracker
Search URL Search Domain Scan URL
Title: Video
Search URL Search Domain Scan URL
Title: Terms of Use
Search URL Search Domain Scan URL
Title: Privacy Policy
Search URL Search Domain Scan URL
Title: Ad Choices
Search URL Search Domain Scan URL
Title: Accessibility & CC
Search URL Search Domain Scan URL
Title: About
Search URL Search Domain Scan URL
Title: Newsletters
Search URL Search Domain Scan URL
Title: Transcripts
Search URL Search Domain Scan URL
Title: Affiliates
Search URL Search Domain Scan URL
Title: Privacy Policy
Search URL Search Domain Scan URL
Title: Affiliates
Search URL Search Domain Scan URL
Title: Transparency and Consent Framework.
Search URL Search Domain Scan URL
Title: | View Full Legal Text Opens in a new Tab
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.cnn.com/search?q=openssl
HTTP 302
https://edition.cnn.com/search?q=openssl Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
36 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
search
edition.cnn.com/ Redirect Chain
|
1 MB 425 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
articlenorailprod.js
cdn.optimizely.com/public/125375509/s/ |
370 KB 102 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
launch-2878c87af5e3.min.js
lightning.cnn.com/launch/7be62238e4c3/97fa00444124/ |
287 KB 72 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otSDKStub.js
cdn.cookielaw.org/scripttemplates/ |
21 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
zion-web-client.min.js
z.cdp-dev.cnn.com/zion-web-client/3.0/ |
237 KB 45 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
57 KB 57 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
EX1d194815a3a24f70a72344c972c1a2fa-libraryCode_source.min.js
lightning.cnn.com/launch/7be62238e4c3/97fa00444124/24aca35cad92/ |
33 KB 12 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
streamsense.5.2.0.160629.min.js
s.cdn.turner.com/analytics/comscore/ |
91 KB 18 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
i.js
tag.bounceexchange.com/340/ |
283 KB 121 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
quant.js
secure.quantserve.com/ |
25 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sync
live.rezync.com/ |
739 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3d9a6f21-8e47-43f8-8d58-d86150f3e92b.json
cdn.cookielaw.org/consent/3d9a6f21-8e47-43f8-8d58-d86150f3e92b/ |
4 KB 2 KB |
XHR
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rules-p-D1yc5zQgjmqr5.js
rules.quantcount.com/ |
16 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main_c2fa90390f08075f4857a9bb98f1fd1c.br.js
assets.bounceexchange.com/assets/smart-tag/versioned/ |
348 KB 69 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otBannerSdk.js
cdn.cookielaw.org/scripttemplates/6.36.0/ |
362 KB 86 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
en.json
cdn.cookielaw.org/consent/3d9a6f21-8e47-43f8-8d58-d86150f3e92b/cbb9eab8-8d42-4e88-a79e-72dd7fd0a53e/ |
342 KB 54 KB |
Fetch
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iab2Data.json
cdn.cookielaw.org/vendorlist/ |
360 KB 52 KB |
Fetch
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otTCF.js
cdn.cookielaw.org/scripttemplates/6.36.0/ |
68 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otFlat.json
cdn.cookielaw.org/scripttemplates/6.36.0/assets/ |
13 KB 3 KB |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otPcCenter.json
cdn.cookielaw.org/scripttemplates/6.36.0/assets/v2/ |
59 KB 13 KB |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otCookieSettingsButton.json
cdn.cookielaw.org/scripttemplates/6.36.0/assets/ |
5 KB 2 KB |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
otCommonStyles.css
cdn.cookielaw.org/scripttemplates/6.36.0/assets/ |
21 KB 4 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
p13n.min.js
cdn.boomtrain.com/p13n/cnn/ |
80 KB 26 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
inbox_ff39b67feb7efb3b74df724f531434eb.br.js
assets.bounceexchange.com/assets/smart-tag/versioned/ |
73 KB 19 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
onsite_7b7ad9585fbe78de250b9a262619c688.br.js
assets.bounceexchange.com/assets/smart-tag/versioned/ |
160 KB 34 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads_5b5a4dceda4f00741f5933760e05275e.br.js
assets.bounceexchange.com/assets/smart-tag/versioned/ |
360 KB 67 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
poweredBy_ot_logo.svg
cdn.cookielaw.org/logos/static/ |
3 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
resolve
people.api.boomtrain.com/identify/ |
137 B 452 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
content
search.api.cnn.com/ |
35 KB 13 KB |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery-3.5.1.min.js
assets.bounceexchange.com/assets/bounce/ |
87 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
160407164515-zerodium-phone-hack-00002712-300x169.jpg
i2.cdn.turner.com/money/dam/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
140606120624-handshake-hack-300x169.jpg
i2.cdn.turner.com/money/dam/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
140417161628-t-hackers-heartbleed-solutions-00000417-300x169.jpg
i2.cdn.turner.com/money/dam/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
140416140644-internet-security-heartbleed-300x169.png
i2.cdn.turner.com/money/dam/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
140414095120-heartbleed-taxes-300x169.jpg
i2.cdn.turner.com/money/dam/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
140408200914-heartbleed-icon-story-body.jpg
cdn.cnn.com/cnnnext/dam/assets/ |
14 KB 15 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
selectors
onsiterecs.api.boomtrain.com/api/v1/ |
17 B 232 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- i2.cdn.turner.com
- URL
- http://i2.cdn.turner.com/money/dam/assets/160407164515-zerodium-phone-hack-00002712-300x169.jpg?c=original&q=h_720,w_1280,c_fill
- Domain
- i2.cdn.turner.com
- URL
- http://i2.cdn.turner.com/money/dam/assets/140606120624-handshake-hack-300x169.jpg?c=original&q=h_720,w_1280,c_fill
- Domain
- i2.cdn.turner.com
- URL
- http://i2.cdn.turner.com/money/dam/assets/140417161628-t-hackers-heartbleed-solutions-00000417-300x169.jpg?c=original&q=h_720,w_1280,c_fill
- Domain
- i2.cdn.turner.com
- URL
- http://i2.cdn.turner.com/money/dam/assets/140416140644-internet-security-heartbleed-300x169.png?c=original&q=h_720,w_1280,c_fill
- Domain
- i2.cdn.turner.com
- URL
- http://i2.cdn.turner.com/money/dam/assets/140414095120-heartbleed-taxes-300x169.jpg?c=original&q=h_720,w_1280,c_fill
Verdicts & Comments Add Verdict or Comment
94 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| 3 object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| env object| CNN object| ntvConfig object| WM object| zeta function| OptanonWrapper object| OneTrust function| __uspapi function| __tcfapi object| optimizely undefined| _ object| _satellite boolean| __satelliteLoaded object| adobe function| Visitor object| s_c_il number| s_c_in object| wminst boolean| is_expansion object| _jsmd object| PubSub function| setJSMDVideoEvent function| trackAudioProgress function| trackVideoProgress function| trackMetrics function| trackVideoEvent function| sendInteractionEvent function| sendHP10Interaction function| sendGameInteraction function| sendVideoClick function| sendVideoEvent function| sendVideo2Event function| sendAudioEvent function| sendNewsPulse function| sendHTML5Event function| sendOpenStoryPerspective function| trackExitLinkMetrics function| mountLegacyServices function| tryToMount function| mountComponentModules object| modules function| require object| process object| regeneratorRuntime object| OneTrustStub function| AppMeasurement function| s_gi function| s_pgicq string| s_account number| s_objectID number| s_giq object| s object| ZION_MESSAGE_BUS object| ZION object| zion_analytics object| ZION_SDK function| quantserve function| __qc object| _qevents object| ezt object| _qoptions object| bouncex string| OnetrustActiveGroups string| OptanonActiveGroups object| dataLayer object| otStubData object| ns_ object| otTCF object| otIabModule object| Optanon function| bt object| _bt object| __core-js_shared__ function| reload_campaigns function| setBounceCookie function| getBounceCookie function| setBounceVisitCookie function| getBounceVisitCookie function| clearBounceCookie undefined| $ function| jQuery14 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.cnn.com/ | Name: countryCode Value: DE |
|
.cnn.com/ | Name: stateCode Value: ST |
|
.cnn.com/ | Name: geoData Value: merseburg|ST|06217|DE|EU|100|broadband|51.360|12.010|276007 |
|
.cnn.com/ | Name: FastAB Value: 0=9814,1=0808,2=6946,3=1775,4=3676,5=5114,6=7089,7=8284,8=4543,9=3225,10=3913,11=3103,12=3139,13=8415,14=1584,15=2453,16=9295,17=0066,18=1404,19=1453 |
|
.cnn.com/ | Name: usprivacy Value: 1--- |
|
.cnn.com/ | Name: FastAB_Zion Value: 5.1 |
|
.rezync.com/ | Name: zync-uuid Value: 482c9741-d1d4-4989-8498-63508e396d6b:1667421435.2645328 |
|
live.rezync.com/ | Name: sd-session-id Value: eyJfcGVybWFuZW50Ijp0cnVlLCJzZXNzaW9uX2lkIjoiNDgyYzk3NDEtZDFkNC00OTg5LTg0OTgtNjM1MDhlMzk2ZDZiOjE2Njc0MjE0MzUuMjY0NTMyOCJ9.Y2LU-w.qKv1C7mG1XjuBw_bHK3pR9EGKpw |
|
.cnn.com/ | Name: OptanonConsent Value: isIABGlobal=false&datestamp=Wed+Nov+02+2022+20%3A37%3A15+GMT%2B0000+(GMT)&version=6.36.0&hosts=&consentId=141be6dc-f10e-496c-8f10-0e97f11adad6&interactionCount=0&landingPath=https%3A%2F%2Fedition.cnn.com%2Fsearch%3Fq%3Dopenssl&groups=dsa%3A1%2Ccad%3A1%2Cpad%3A1%2Cpap%3A1%2Cpcd%3A1%2Cpcp%3A1%2Cmap%3A1%2Cmcp%3A1%2Cmra%3A1%2Cpdd%3A1%2Csec%3A1%2Ctdc%3A1%2Ccos%3A1%2Cdlk%3A1%2Cdid%3A1%2Creq%3A1%2Csm%3A1%2Cpzv%3A1%2Cpfv%3A1%2Csav%3A1%2Csa%3A1%2Csmv%3A1%2Cadv%3A1%2Cpf%3A1%2Cad%3A1%2Cven%3A1%2Ctc%3A1%2Cfc%3A1%2Cai%3A1 |
|
.cnn.com/ | Name: btIdentify Value: 5c2c87ae-caeb-4494-bafb-69c7c62612ca |
|
.cnn.com/ | Name: _bts Value: 5c669dbc-164b-4241-abe8-ba7f91f36ebc |
|
.cnn.com/ | Name: bounceClientVisit340v Value: N4IgNgDiBcIBYBcEQM4FIDMBBNAmAYnvgKYAmAlguQPYB2AdAMa0OPUC2RKxAhgE6M4mfAEdMAEWoRitFCjAgANCD4wQIAL5A |
|
.cnn.com/ | Name: _bti Value: %7B%22app_id%22%3A%22cnn%22%2C%22bsin%22%3A%220aTDWvJYnb1eiHY60xEFABqLEoBdavbBH3sCOmb8xuV88eWELzbqKTBeD51TmWwM%2BUB2GXI3Mevf6dqgV2DY9g%3D%3D%22%2C%22is_identified%22%3Afalse%7D |
|
.cnn.com/ | Name: OptanonControl Value: ccc=DE&csc=ST&cic=0&otvers=6.36.0&pctm=0®=gdpr&ustcs=1---&vers=3.1.15 |
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | default-src 'self' blob: https://*.cnn.com:* http://*.cnn.com:* *.cnn.io:* *.cnn.net:* *.turner.com:* *.turner.io:* *.ugdturner.com:* courageousstudio.com *.vgtf.net:*; script-src 'unsafe-eval' 'unsafe-inline' 'self' *; style-src 'unsafe-inline' 'self' blob: *; child-src 'self' blob: *; frame-src 'self' *; object-src 'self' *; img-src 'self' data: blob: *; media-src 'self' data: blob: *; font-src 'self' data: *; connect-src 'self' data: *; frame-ancestors 'self' https://*.cnn.com:* http://*.cnn.com https://*.cnn.io:* http://*.cnn.io:* *.turner.com:* courageousstudio.com; |
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.bounceexchange.com
cdn.boomtrain.com
cdn.cnn.com
cdn.cookielaw.org
cdn.optimizely.com
edition.cnn.com
i2.cdn.turner.com
lightning.cnn.com
live.rezync.com
onsiterecs.api.boomtrain.com
people.api.boomtrain.com
rules.quantcount.com
s.cdn.turner.com
search.api.cnn.com
secure.quantserve.com
tag.bounceexchange.com
www.cnn.com
z.cdp-dev.cnn.com
i2.cdn.turner.com
13.225.78.77
18.66.122.42
2600:9000:211e:6e00:6:44e3:f8c0:93a1
2606:4700::6810:9540
2620:116:800d:21:93ca:31d8:d86e:38f6
2a02:26f0:3400:187::13b8
2a02:26f0:3400:19b::3134
2a02:26f0:780::5f65:36e8
2a04:4e42:200::323
2a04:4e42:600::773
34.120.253.250
34.224.153.210
34.98.72.95
54.82.57.153
00bab1a0ca70bae23e6e733c1b78045476a2d2688aa0c5cf26fc7efa81ccaa0b
0a3207ed6ac144bb58e9ea8a9a44d3e121e1ffb5444e72256017e2d5e7266873
0ad349cc5c635fbf821147c00c55093061abb7fee8318587ca218bcde06898f5
1c6443e56a8d88c1734afadf22d91420afa0c321e7387077aca580735a046b57
1f94185bf320b088eb3c40b75de95ac8516680f4036bd287131b34f9c058146a
295ae8c796080e33cb82bdabee9903acbae1ccbf7958514623b30129252dacf2
37a48ca00a5f831f12706debb94e1004fcdad1936f33bfb5b8636155165327a0
3b1c64a79e312f44a4adc3fdf7acb0f37fafb2a5af3d494c9a1ef8b4181c5a23
49b9b4996d1ff0a8e3de643a0c623255bf631f298f2799b949c29de93926ee7a
6ad3bd842806e6a4bed782bee73728a073fb5b21ad3e088f6c9845f7999ce6ac
6ee4bad62631e77d0b78672906b9bfe20349027f6a38f92ecd7afdfb39e37ae9
74c39b5ec5a61c19ff20d81c0418fabd61d6deb6ac0c967da28761d6b895ff7d
7a6bb419cbbf58307abefc7224a57c0be452ab88446b0c2ced7be294fa50e0cf
8ae30f6f2162279a812bf9e00efd0c985e20e76efece9444125b410f3a6822a6
8b25e4caa6a7ecc72b195e3d1acd82204979ea8ed948a802afc3eb151aa07c34
9f75b6ed44e4ebe23485687cba13db56f5af8df7eae7aebd3d4509e936fac9b6
a09d0f89e99cf5a081315ff701187632005dabd23f3ca116a75790003faa7e8f
a69138d0d40754726a2300f4985df53d56503eb588d6e4391acfb415aa4714f3
aba732d484e884f06b32e4dcae81f3c5ccbfe820ded02cfb4cd416cd709d4e6f
b74420758de35d9e305c4be91525ace39bc3961b99841ab0624834b863b7cd01
bbc4456bca95006683a8f081d0d2ed645eef5b14c62eca12c70f7e1cec26c1a0
be548c881f31d5ab83f259e1dd157db22b44754a0293db5a0cfcacc1f5fbbc64
ce387349c57c275bf0cbae4dace578180fcdf195d0e8934a1b1f8e061dd7b702
cedb4994fd803cd32fc403b56f0d5402fd680e317584564ac8146d98b8a0e918
cfe9c981c4b6a98bcf7bad851a321d94cd5d6b52166581a1ee054607aa1727a3
d15767a3a30bf950aab22ad4eadeef3c16af96b8cb7370fbe1fec73b87d1c346
d338942229ff300382b383f3fe0a3e9603511aea04491596f19855d3c5c95f24
d825411605092a3ac887bb28aad592039c6afaab7102b3593a82908abc438449
d9c7b080d50d2a9255306bfa277ca8356245e2a19585d54cae0181f371c2ab71
e4ba4116003df4bce659ed5ddb82188aafae756087da27ba2e5920bb7d2d6fa8
e99f1decbf0c3b01a9d82cd0d430460653a7845a8eaf00025350f7421dd88d80
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d