{"id":15127,"date":"2014-04-10T18:41:35","date_gmt":"2014-04-10T22:41:35","guid":{"rendered":"http:\/\/www.opensource.im\/?p=15127"},"modified":"2014-04-10T18:41:35","modified_gmt":"2014-04-10T22:41:35","slug":"major-security-bug-found-in-web-encryption-tool","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/major-security-bug-found-in-web-encryption-tool.php","title":{"rendered":"Major Security Bug Found in Web Encryption Tool"},"content":{"rendered":"<p><p>    A security flaw found in a popular Internet encryption tool has    sent companies and government agencies scrambling to plug the    leak.  <\/p>\n<p>    The bug in OpenSSL, a widely used encryption method, was    discovered earlier this week by researchers at Google (GOOG) and cyber-security firm Codenomicon.    According to a website created by Codenomicon, Neel Mehta of    Google Security first reported it to the OpenSSL team.  <\/p>\n<p>    In a notice on Tuesday, Amazon.com (AMZN) informed its Amazon Web Services customers    that it applied fixes to resolve the OpenSSL vulnerability.    Some of Amazons AWS services were unaffected.  <\/p>\n<p>    Researchers believe Heartbleed, a nickname given to the OpenSSL    flaw, already allowed cyber thieves to grab Yahoo (YHOO) usernames and passwords. The search giant    said it addressed the problem for most of its properties,    including Yahoo Search, Yahoo Mail, Flickr and Tumblr, by    Tuesday afternoon.  <\/p>\n<p>    As soon as we became aware of the issue, we began working to    fix it, a Yahoo spokesperson said. Our team has successfully    made the appropriate corrections across the main Yahoo    propertiesand we are working to implement the fix across the    rest of our sites right now. Were focused on providing the    most secure experience possible for our users worldwide and are    continuously working to protect our users data.  <\/p>\n<p>    Based on a web tool from security firm Qualys, other major    websites like eBay (EBAY), Google and Microsofts (MSFT) Outlook email service are not vulnerable to    the Heartbleed attack.  <\/p>\n<p>    The Canada Revenue Agency temporarily shut down its online    services on Wednesday due to security concerns, just three    weeks before an April 30 deadline for citizens to file taxes.  <\/p>\n<p>    The security flaw was found in some versions of OpenSSL, a type    of open-source software many websites use to encrypt    communication over the Internet. Heartbleed could compromise    usernames, passwords and credit card numbers that are stored on    a servers memory.  <\/p>\n<p>    Using the loophole, cyber criminals are able to request chunks    of data. While they cant specify what information they want,    such as one persons username and password, hackers can gather    enough data to piece it together.  <\/p>\n<p>    Alex McGeorge, head of threat intelligence at security firm    Immunity Inc., said e-commerce transactions and other online    activities remain secure as they happen, although hackers could    recover enough information to decrypt data as its sent to and    from a server.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.foxbusiness.com\/industries\/2014\/04\/09\/new-heartbleed-bug-poses-major-threat-to-user-data\/\/RS=^ADAGbhkzzbWuCFeJArHFpDM.XBf.JY-\" title=\"Major Security Bug Found in Web Encryption Tool\">Major Security Bug Found in Web Encryption Tool<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A security flaw found in a popular Internet encryption tool has sent companies and government agencies scrambling to plug the leak. The bug in OpenSSL, a widely used encryption method, was discovered earlier this week by researchers at Google (GOOG) and cyber-security firm Codenomicon<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-15127","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/15127"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=15127"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/15127\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=15127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=15127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=15127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}