Heartbleed security vulnerability, change your passwords now


Due to a programming error there is a serious security vulnerability in certain versions of widespread cryptographic software library OpenSSL. This weakness lays open the potential for the theft of information such as, usernames and passwords, emails, instant messages and banking details, in fact any information that you send or have sent across the internet using this popular back office architecture.


Estimates suggest that the majority of internet traffic uses a version of this architecture although not necessarily the vulnerable version.


How do I know if my information has been compromised?


It may be that this security flaw has been exploited by cyber criminals for many months already. It is possible to remove such sensitive data without detection for vulnerable systems and as such, your information may already be in the hands of those who will use it in an attempt to steal from you. In short, you cannot know.


How to I protect myself against Heartbleed?


Lists of web sites open to this exploit are being compiled and may be a good starting point but will not be comprehensive. The appropriate course of action is to minimize the potential for exploitation of any of your data that may already have been captured by making it obsolete. To do this you must change the passwords you use to access online services starting with your most sensitive data such as banking and email. Even if you have been assured that your data stored with a particular service is safe, if you have stored an identical password with an unsecured site, you are at risk.


Protect yourself from the Heartbleed vulnerability by changing your passwords on sites where the export has been patched. It is important to check that the SSL certificate has been changed prior to changing your password.


Whilst we have been informed that SFN's servers are not running the vulnerable version of OpenSSL I would advise a change in any case.


If you don't already, use a password manager such as LastPass https://lastpass.com


Further reading http://heartbleed.com/


Incomprehensive lists of compromised sites may be a good starting point http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/

Sorry - not sending you my bank details....... ;-)

Hi Dorothy,

Already done. It comes from Amazon's Dublin ip address, there isn't a link in the email, so I think it is genuine - despite a small punctuation error......

Hi Dorothy,

amazon.fr have said that my a/c may have been compromised and have asked me to change my password.

But could have been for a reason other than the Heartbleed vulnerability.

Since Heartbleed, I have installed "LastPass" and am gradually changing all my passwords anyway.

I think that given what an attacker needs to do to recover a password, and that of all the web sites that were potentially vulnerable only some 17% had the relevant functionality activated, the chances of your password or bank details having been stolen are very slim indeed.

You may also be relieved to hear that although the problem code was present for two years, analysis of traffic logs showed that prior to the bug being made public there was no detectable evidence of it being exploited. Once it went public there were exploits in progress in under 10 minutes.

On the other hand if you have had the same password on some sites for a long long time then now is a good time to change them.

Just had an email from amazon.fr telling me to change my password. Seems to be taking some time for some organizations to get their systems sorted.

I have come to the conclusion that we had the answer all along - change passwords regularly.
With a memory like mine, I need a password manager like LastPass to do it all for me. Then I only have to remember one password. Should be able to manage that.........

Best explanation I’ve seen so far Ian :slight_smile:

As with so many aspects of life, xkcd has an interesting take on it.

Mike

Recomended by a well respected security professional, BrianKrebs,http://krebsonsecurity.com

But who tests the test sites?

You can use these sites to check if they are protected

http://filippo.io/Heartbleed/

https://www.ssllabs.com/ssltest/

http://heartbleed.criticalwatch.com/

https://lastpass.com/heartbleed/

As for lastpass, I have been using it for over 4 years now on laptop/phone/tablet and do not know how I would get by without it.

For LastPass users the Security Check feature tells you which of your sites needs a password change. If you trust it. :-)

The advice seems to be to wait until the problem is fully sorted before changing passwords and limiting Internet access in the meantime.

I noticed that Caisse d'Epargne's website has not allowed access to accounts for a couple of days, but is now back in business. Could (or may not be) connected with Heartbleed.

The sensible thing would be for the financial institutions and social networking sites to notify users when it is the right time to change passwords, What's the betting they do that?

I checked 4 financial sites that I use and need to use, the report came back that they all were OK or had been fixed. I would assume that unimportant, incidental sites don't require a change of password, so long as it is different than the password for your important sites.

May not be as bad as thought...

http://www.theverge.com/2014/4/11/5604300/heartbleed-may-not-leak-private-ssl-keys-after-all

Then again, these things move so fast, who knows?