February 17, 2016 | Vas Vasiliadis

On February 16, 2016 a new critical vulnerability CVE-2015-7547 - "glibc getaddrinfo() stack-based buffer overflow" was announced. We have reviewed the severity and impact to Globus services, partner services and users, and posted details of our findings in a new security bulletin. We recommend corrective action for users who are operating Globus endpoints on Linux systems - please read the security bulletin for further details.

February 11, 2016 | Vas Vasiliadis

We’re excited to announce changes to the way users access Globus that removes a lot of the “friction” currently associated with signing up and using the service. On February 13th, 2016, we will be upgrading the Globus authentication and authorization mechanisms so that users can access the service with their institutional username and password. This provides a familiar login experience and no longer requires users to create a separate Globus username and password just to use the service.

February 10, 2016 | Vas Vasiliadis

Recently, a new vulnerability was discovered in the Sparkle Updater framework on Mac OS, that is used by Globus Connect Personal to check for, and install, updates. All Mac users who have Globus Connect Personal installed should immediately update to the latest version so they are no longer vulnerable.