Heartbleed bug hits web security

Internet users are being encouraged to change their passwords after a security bug was discovered
10 April 2014

Several major technology firms have urged users to change all their passwords in the wake of the Heartbleed bug security breach.

The bug was first reported on Monday after going undetected for more than 2 years.

It bypasses the OpenSSL cryptographic library, which is used online to digitally scramble sensitive information as it passes between computer servers.

It is best known as the padlock icon that appears in the corner of web browser windows to show the page you are using online is secure when data moves back and forth.

The Heartbleed bug is a flaw in this system that can give anyone access to the data behind that encryption, including passwords and credit card details, without leaving any trace.

Popular blogging site Tumblr, part of Yahoo!, has since posted a warning to its users, encouraging users to update all of their existing passwords.

"This might be a good day to call in sick and take some time to change your passwords everywhere - especially your high-security services like email, file storage and banking, which may have been compromised by this bug," said the post.

Codenomicon, a cyber-security research group, has set up a dedicated website giving information on the bug; heartbleed.com, and said: "The Heartbleed bug allows anyone on the internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software.

"This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users."

However, the online security firm were also quick to acknowledge a positive within the discovery of the flaw.

"For those service providers who are affected, this is a good opportunity to upgrade security strength of the secret keys used. A lot of software gets updates which otherwise would have not been urgent. Although this is painful for the security community, we can rest assured that infrastructure of the cyber criminals and their secrets have been exposed as well."

Create a FREE account to continue reading

eros

Registration is a free and easy way to support our journalism.

Join our community where you can: comment on stories; sign up to newsletters; enter competitions and access content on our app.

Your email address

Must be at least 6 characters, include an upper and lower case character and a number

You must be at least 18 years old to create an account

* Required fields

Already have an account? SIGN IN

By clicking Create Account you confirm that your data has been entered correctly and you have read and agree to our Terms of use , Cookie policy and Privacy policy .

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged in