rivonia
Active member
On all news channels and papers. Please do check read up on it. Evidently the hackers are into it big time world wide. Called bleeding heart.
Peter
Peter
The attack is actually called "heartbleed", because it involves exploiting the heartbeat function in certain versions of the TLS protocol, and data is leaked (as in bleeding) from the server process's memory space.
The vulnerability exists only in certain versions of the OpenSSL library, which is widely but not universally used. It tends to be associated with Apache / open source / internet-native type systems, whereas corporate / enterprise / banking types are more likely to be using a vendor-specific commercial crypto system. Though this is not a hard-and-fast rule.
Pete
There is, if you use the same password across different websites. Change your password on sites which have fixed the problem AND have recertified. Change your password on sites which haven't had a problem, if you use the same password on more than one site. If your commonly used password is out in the open with the same username, brute force (very easy to do, competent hackers can use same username and password against loads of sites and see if it works)can use that info. When sites which aren't fixed and don't have new certificates sort themselves out, change your password on those as well.On radio 4 now, not much point changing passwords until you know if the provider actually has a problem and if so, has fixed it.
Thank you for explaining that. I think I will start keeping my money under the mattress again.