{"id":14933,"date":"2014-04-09T13:44:32","date_gmt":"2014-04-09T17:44:32","guid":{"rendered":"http:\/\/www.opensource.im\/?p=14933"},"modified":"2014-04-09T13:44:32","modified_gmt":"2014-04-09T17:44:32","slug":"internet-security-flaw-puts-millions-at-risk","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/internet-security-flaw-puts-millions-at-risk.php","title":{"rendered":"Internet security flaw puts millions at risk"},"content":{"rendered":"<p><p>    Internet users have been warned that sensitive    information such as passwords and credit card details have been    at risk of theft due to a flaw in the internet's most common    encryption software.  <\/p>\n<p>    The bug, dubbed Heartbleed, was in place for more two years    until a fix was announced on Tuesday, andwould have    allowed hackers to snoop on encrypted information held and    processed by up to 500,000 web servers using the software.  <\/p>\n<p>    Affected websites and service providers were told to install    the update as soon as possible, before hackers were able    exploit the now-public flaw.  <\/p>\n<p>    Tor, the internet anonymity project, said in a statement that users    \"might want to stay away from the internet entirely for the    next few days while things settle\".  <\/p>\n<p>    The flaw was discovered by researchers at the Finnish security    firm, Codenomicon.  <\/p>\n<p>    \"We have tested some of our own services from    attacker'sperspective. We attacked ourselves from    outside, without leavinga trace,\" Codenomicon said on its    website, heartbleed.com.  <\/p>\n<p>    The breach involves OpenSSL, the most common internet    encryption technology which is marked by the small, closed    padlock and \"https:\" on web browsers. The bug meant traffic was    subject to snooping even if the padlock was \"closed\".  <\/p>\n<p>    The internet company, Yahoo, said its services such as email,    Flickr and Tumblr were affected by the flaw, but said it had    implemented the fix and there was no evidence security had been    compromised.  <\/p>\n<p>    The company said in a statement Tumblr: \"This might be a good    day to call insick and take some time to change your    passwords everywhere - especially your high-security services    like email, file storage, and banking, which may havebeen    compromised.''  <\/p>\n<p>    273  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.aljazeera.com\/news\/europe\/2014\/04\/internet-security-flaw-puts-millions-at-risk-2014490147141440.html\/RS=^ADA11AZaoYG4Xboc7MezEuHMZnYD80-\" title=\"Internet security flaw puts millions at risk\">Internet security flaw puts millions at risk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Internet users have been warned that sensitive information such as passwords and credit card details have been at risk of theft due to a flaw in the internet's most common encryption software. The bug, dubbed Heartbleed, was in place for more two years until a fix was announced on Tuesday, andwould have allowed hackers to snoop on encrypted information held and processed by up to 500,000 web servers using the software. Affected websites and service providers were told to install the update as soon as possible, before hackers were able exploit the now-public flaw<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-14933","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/14933"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=14933"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/14933\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=14933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=14933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=14933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}