{"id":14935,"date":"2014-04-09T13:44:40","date_gmt":"2014-04-09T17:44:40","guid":{"rendered":"http:\/\/www.opensource.im\/?p=14935"},"modified":"2014-04-09T13:44:40","modified_gmt":"2014-04-09T17:44:40","slug":"heartbleed-bug-may-expose-masses-of-sensitive-data","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/heartbleed-bug-may-expose-masses-of-sensitive-data.php","title":{"rendered":"Heartbleed bug may expose masses of sensitive data"},"content":{"rendered":"<p><p>    By Danny Yadron  <\/p>\n<p>    An encryption tool used by a large chunk of the Internet is    flawed, potentially exposing reams of data meant to be hidden    from prying eyes.  <\/p>\n<p>    ( Have you been affected? Use this tool to check to    see if a website youre visiting is open to attack via the    Heartbleed flaw. And read this    FAQ from the company that discovered the flaw.)  <\/p>\n<p>    The bug, nicknamed Heartbleed by researchers at Google Inc.    \/quotes\/zigman\/30194416\/delayed\/quotes\/nls\/goog GOOG +0.22%     and cybersecurity firm Codenomicon, could have    affected two-thirds of active websites when it was disclosed    Monday, they said.  <\/p>\n<p>    On Tuesday, website operators, including Yahoo Inc.,    \/quotes\/zigman\/59898\/delayed\/quotes\/nls\/yhoo YHOO +2.10% raced    to fix the problem. A Yahoo spokeswoman said the company had    made the appropriate corrections. Several researchers said    earlier that they had been able to capture Yahoo usernames and    passwords.  <\/p>\n<p>    Many other major websites, such as Google, Amazon.com Inc.    \/quotes\/zigman\/63011\/delayed\/quotes\/nls\/amzn AMZN -0.24% and    eBay Inc., \/quotes\/zigman\/76117\/delayed\/quotes\/nls\/ebay EBAY +0.93%     appeared to be safe, based on a test created by a    researcher for cybersecurity company Qualys Inc. \/quotes\/zigman\/12094171\/delayed\/quotes\/nls\/qlys QLYS -0.47%      <\/p>\n<p>    The bug exploits a problem in certain versions of OpenSSL, a    free set of encryption tools used by much of the Internet.    OpenSSL is managed by four core European programmers, only one    of whom counts it as his full-time job. The limited resources    behind the encryption code highlight a challenge for Web    developers amid increased concern about hackers and government    snoops.  <\/p>\n<p>    Websites increasingly use encryption to mask data such as    usernames, passwords and credit-card numbers. That prevents a    hacker lurking at a coffee shop from grabbing personal    information out of the air as it travels to a wireless router.    This type of encryption is called SSL, or secure sockets layer,    or TLS, or transport layer security. When a website is using    these forms of encryption, a padlock appears with the Web    address in a browser.  <\/p>\n<p>    Web servers that use the affected versions of the code store    some data unprotected in memory. Hackers can grab that data,    and reconstruct information about users or keys that would    allow them to monitor past or future encrypted traffic.  <\/p>\n<p>    Anyone can reach out to the Internet and scoop out of the    data, said Thomas Ptacek, a researcher at Matasano Security in    Chicago. I can be in my office here. I can be in Estonia.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.marketwatch.com\/news\/story.asp?guid=%7BE78C28AA-BFD7-11E3-8CC7-00212803FAD6%7D&siteid=rss\/RS=^ADAJnFbLuYitPIxxU71rvTcw52T0sg-\" title=\"Heartbleed bug may expose masses of sensitive data\">Heartbleed bug may expose masses of sensitive data<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By Danny Yadron An encryption tool used by a large chunk of the Internet is flawed, potentially exposing reams of data meant to be hidden from prying eyes. ( Have you been affected? Use this tool to check to see if a website youre visiting is open to attack via the Heartbleed flaw<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-14935","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/14935"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=14935"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/14935\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=14935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=14935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=14935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}