Heartbleed Bug

Heartbleed Bug

Heartbleed Bug

By now, most of you must know or at least heard about Heartbleed or Heartbleed Bug. For those who heard about it and didn’t bother much – well, guess what, you should care.

What is Heartbleed?

Heartbleed is a bug – or an error, flaw, mistake, backdoor, vulnerability – in OpenSSL. Now what is OpenSSL? OpenSSL encrypts your data, including password and personal info when it travels to a server. Meaning, everything you do or send on the internet are leaked or exposed to third-party that aren’t supposed to received it.

You may enter a password into your online banking site or online store. As the data traveling through the internet, some or all your data also leaked out.

Secure OpenSSL - Data encrypted and transferred to reviver.

Secure OpenSSL – Data encrypted and transferred to reviver.

Heartbleed - Data leakage to third person and transferred to reviver.

Heartbleed – Data leakage to third person and transferred to reviver.

Am I Using OpenSSL Right Now?

The easiest way to know is by looking at your browser URL address.  If you see the URL starts with https:// and there’s a lock icon beside it – then you are in OpenSSL.

Facebook on OpenSSL

Facebook on OpenSSL

Then, Why Use OpenSSL?

OpenSSL is a type of security on the internet. OpenSLL is a free service and that is why most people use it – even Facebook and Google are using it. Security and data encryption is a must when dealing with sensitive info like banking account and passwords.

Don’t freak out yet, as none of the banking sites are reported being affected by Heartbleed bug.

Am I Affected?

If you use one of this, then unfortunately, YES.

  • Facebook
  • Google
  • Gmail
  • YouTube
  • Google Wallet
  • Play Store
  • Yahoo
  • Etsy
  • GoDaddy
  • Minecraft
  • Netflix
  • Instagram
  • Dropbox
  • Soundcloud
  • Pinterest
  • Flickr
  • Github
  • Wunderlist

From the list, all of them already patched the problem. It is important that you change your password immediately.

What Should I Do Next?

  1. Change your password.
  2. Change your password.
  3. Change your password.

From this time forward, most of the web are already fixed and secured. All your data for the past two years might already been stolen or compromised, but there’s also no indication that hackers knew about the exploit before this week.  As a precautionary measure, AGAIN, make sure you change your password.  You can test the web vulnerabilities using this LassPass webApp.

User Rating: 5.0 (1 votes)