‘Heartbleed—What’s Next? Check Your Clients, Routers, Virtual Machines And VPNs’ – ‘ReadWrite’
The latest post on ‘ReadWrite’ is titled “Heartbleed—What’s Next? Check Your Clients, Routers, Virtual Machines And VPNs”.
Jodi Mardesich says, “What we thought was secure—Web servers, routers, virtual machines, virtual private networks, and even client software—isn’t so safe, after all.
Just about everything that relies on the open source cryptographic software OpenSSL is compromised by the Heartbleed bug, which can leak the contents of the memories of these networks and devices to compromise your security.
Heartbleed can expose data in random 64KB “heartbeats,” and while each leak is limited to 64KB of memory at a time, an attacker can keep connecting to collect more data, which can include sensitive data like passwords, private encryption keys, and website cookies“.
Comments are closed.