Avoiding The Heartbleed Bug
As an enterprise cloud solution provider, security within our system and of our clients’ data is of top propriety. On Monday, April 7, a severe security bug affecting many popular e-commerce/user websites was reported. This Heartbleed bug makes it possible for hackers to send a protocol that can unscramble the encrypted code protecting an accounts sensitive information.
Here’s the good news: Both DriveHQ , CameraFTP and our reseller sites are, and continue to be unaffected by the Heartbleed bug. This vulnerability only impacts platforms that run OpenSSL, which DriveHQ does not. While we were fortunate enough to avoid this headache, we understand the number of affected sites, and encourage any users with accounts on these to create a password that is unique for DriveHQ.
Though Heartbleed has existed for more than two years, it is unclear whether or not hackers have been abusing the bug in secret. It is the lack of any trace that concerns many computer experts more than the bug itself.
Huge companies like Ebay, GoDaddy, Instagram, Google and Yahoo all reported to use the vulnerable implementation of OpenSSL. Of course most teams were quick to update servers with a security patch. Still, because there is no way to get a record of any comprised information, it is wise to update detail with all sites that carry sensitive information.
For more detail about the bug, you can visit Heartbleed:
- The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.