Protect Yourself From Heartbleed

Protect Yourself From Heartbleed

You’ve probably seen some of the security alerts regarding the Heartbleed Bug. This security vulnerability involves the widely used encryption software known as OpenSSL. OpenSSL is used to encrypt communications on the web, with the purpose of protecting you and your loved ones from hackers and the like. This massive security issue has been estimated to affect as much as 2/3 of the web.

While there is a lot of concern over how widespread and pervasive this issue is, there are things you can do to proactively protect yourself from Heartbleed. Here are the steps that are recommended:

1. Find out whether the website has applied a security patch or whether they are still vulnerable.

First, you need to be concerned about your passwords. Before changing passwords for any given website, you want to be sure that the site is no longer vulnerable and the provider has patched their security by updating their encryption software.

If the website (or application) is vulnerable, it is useless to change passwords, since your new password could also become compromised. If they’ve patched their security, you can move ahead with making the changes.

So, how to find out if a website has applied the Heartbleed Patch?

First of all, it is highly possible the provider has announced this on their blog or sent you an email notification. So, check in the obvious places. However, if you’re still not sure, CNet has also published a list of major sites that have confirmed that they’ve applied the patch; this list is being continuously updated. Mashable has also published a list of websites for which you should immediately change your password. Finally, if you need to take matters into your own hands, you can use this tool to check if a given site is still vulnerable or not.

2. Once you’ve determined that a given site has patched their security, you can move forward with changing your passwords.

You want to be sure your new password is as secure as possible. The following are some tools you can use to generate quality passwords:

  1. 1Password
  2. LastPass
  3. iCloud Keychain

You might also be interested in reading our article about the best-practices around generating your own passwords.

3. Finally, stay informed!

If you’d like to learn more, here is where you can go to read more about the Heartbleed Bug:

The technical details of this major security vulnerability are written about in some detail on the Naked Security Blog. You can also read more about the technical aspects of the Heartbleed Bug.

LimeTech is a creative tech company with a focus on innovation and adaptive change. We use technical know-how, design skills, and deep experience in entrepreneurship to help companies advance their business goals. Do you need IT planningmobile app developmentweb design, or remote work solutions that will take your business to the next level? Get in touch today and find out what we can do for you.

customer support    IT    IT hacks    open source    security    

YaMabrook launch announcement

YaMabrook launch announcement

Today we announce the official launch of the YaMabrook mobile app, and share some of the work we did in the early stages of the product development process.

Read more
Visual storytelling in action

Visual storytelling in action

Today's article, a guest post by Addie Kugler-Lunt of Two for Tea Studio, expands on the topic of visual storytelling. We cover focal point, color dynamics, and more. Let's explore!

Read more
How to make a mobile app that stands out from the crowd

How to make a mobile app that stands out from the crowd

The mobile app landscape is crowded. In fact, a thousand apps are launched each day in Apple’s app store, and much more in the Google Play store. But you’ve got a great idea and you’re determined to push forward. Let's talk about how to build an app that stands out from the crowd.

Read more

Contact us

Type of project
*Don’t worry – we won’t share your email.(Required)
*Don’t worry – we won’t share your email.

This field is for validation purposes and should be left unchanged.