<html>
  <head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <br>
<a class="moz-txt-link-freetext" href="https://threatpost.com/serious-tcp-bug-in-linux-systems-allows-traffic-hijacking/119804/">https://threatpost.com/serious-tcp-bug-in-linux-systems-allows-traffic-hijacking/119804/</a><br>
    <br>
    … The vulnerable TCP implementation (CVE-2016-5696) could affect an
    untold number of devices running Linux, including embedded
    computers, mobile phones and more. …<br>
    <br>
    … Attacks can disrupt or degrade supposedly encrypted traffic,
    including connections over the Tor network, the researchers wrote. …<br>
    <br>
    <div style="left: -99999px; position: absolute;"><br>
      ...Systems Allows Traffic Hijacking <a
        href="https://wp.me/p3AjUX-vak">https://wp.me/p3AjUX-vak</a>
      <div style="left: -99999px; position: absolute;">Attacks can
        disrupt or degrade supposedly encrypted traffic, including
        connections over the Tor network, the researchers wrote.<br>
        <br>
        See more at: Serious TCP Bug in Linux Systems Allows Traffic
        Hijacking <a href="https://wp.me/p3AjUX-vak">https://wp.me/p3AjUX-vak</a></div>
    </div>
    <div style="left: -99999px; position: absolute;">Attacks can disrupt
      or degrade supposedly encrypted traffic, including connections
      over the Tor network, the researchers wrote.<br>
      <br>
      See more at: Serious TCP Bug in Linux Systems Allows Traffic
      Hijacking <a href="https://wp.me/p3AjUX-vak">https://wp.me/p3AjUX-vak</a></div>
    <div style="left: -99999px; position: absolute;">Attacks can disrupt
      or degrade supposedly encrypted traffic, including connections
      over the Tor network, the researchers wrote.<br>
      <br>
      See more at: Serious TCP Bug in Linux Systems Allows Traffic
      Hijacking <a href="https://wp.me/p3AjUX-vak">https://wp.me/p3AjUX-vak</a></div>
  </body>
</html>