The Heart Bleed Virus
The Heartbleed bug is sending shockwaves throughout the Internet right now, and potentially leaves unimaginable amounts of private data exposed to hackers who take advantage of the flaw in the OpenSSL encryption software used by some of the world’s most popular websites. Considering that the flaw can expose a range of sensitive data, including usernames, passwords, emails, instant messages, credit card numbers, and more, it’s imperative that you do what you can to minimize the damage.
But are there any actions that you can proactively take to ensure that the bug doesn’t hit you? Since this is a problem with the very encryption software that’s supposed to protect your data on the Web, inaction appears to be the best course of action. Simply by avoiding sites that have reportedly been affected, you’ll stay safer. We also recommend you change your passwords, which Yahoo advised as a course of action via Tumblr. So which sites should you quarrantine?
According to a list compiled by a user of Github (a website geared towards the Web development community), popular affected sites include Yahoo.com, dating site OkCupid.com, torrent site kickass.to, and porn site Redtube.com. Flickr.com, steamcommunity.com, and slate.com are also identified on the list as sites affected by the Heartbleed Bug. You can check out the full list here, which also includes a list of sites that aren’t affected by the flaw.
MORE: Heartbleed Web bug might expose vast amount of private data
Amazon and Yahoo are working to apply the fix across all of their services. Yahoo said it’s already done that with a multitude of sites, including the homepage, Yahoo Search, Yahoo Mail, Yahoo Sports, and more. Amazon states that it too has applied the fix to the majority of services. You can read Amazon’s statement on the matter here.
It’s worth noting, however, that the initial reports surrounding last year’s Adobe breaches indicated that the size and scope of the attacks were much smaller than they turned out to be in the end.
The Github post that includes this list of Heartbleed-affected sites states that the scans were conducted “around” April 8, 12:00:00 UTC. Therefore, that list could also include sites that have since plugged the OpenSSL vulnerability.
What do you think? Sound off in the comments below.
Read more: http://www.digitaltrends.com/computing/heres-a-list-of-websites-allegedly-affected-by-the-heartbleed-bug/#ixzz2yUUMFke8
Follow us: @digitaltrends on Twitter | digitaltrendsftw on Facebook