HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED ABOUT A MINUTE AGO.
You are here: Home / Cloud Computing / How To Beat the Heartbleed Bug
Powered by Verisign:
Cloud-based solution to improve Your DDoS Attack Readiness.
Click here to learn more.
How To Beat the Heartbleed Bug
How To Beat the Heartbleed Bug
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
APRIL
16
2014
Heartbleed headlines continue this week as IT admins scramble for answers no one has. Early reports of stolen personal information -- including 900 social insurance numbers in Canada -- are starting to trickle in.

Indeed, the recent discovery of Heartbleed has thrown information security professionals into a tizzy and we may not have seen the worst of it yet. This could be the zero day bug to end all zero day bugs -- at least until the next one.

Security engineers at Codenomicon who found the bug are reporting that the vulnerability is in the OpenSSL cryptographic software library. The weakness, they said, steals information typically protected by the SSL/TLS encryption used to secure the Internet. Current reports suggest up to 60 percent of Web servers could be impacted.

The Canada Revenue Agency said the data was stolen from its systems, which were left vulnerable by the Heartbleed bug, according to reports. The agency said it blocked public access to its online services for several days last week until it addressed the security risk, but despite that measure, a data breach occurred over a six-hour period.

Miles To Go

We caught up with Mark Gazit, CEO of ThetaRay and one of Israel’s sharpest cybersecurity professionals, to get his take on the issue. He told us experts are still looking for ways to patch Heartbleed before malicious actors heavily exploit it. Some advisories are telling organizations to “assume the worst has already happened,” preparing teams to move to detection and post-breach response plans, he noted.

“The immediate thought on everyone’s mind is that when there is a bug, there is a patch, and the first thing to do is apply it to stop the bleeding,” Gazit said. “Although this may appear to be a solution and a way of allaying the panic, applying patches to the many vulnerable platforms can take at least six to 12 months. Months will pass before vulnerable vendors, and all levels of end users, return to safe OpenSSL-dependent activity.”

Patching may help, but Gazit is convinced that Heartbleed will live on well beyond the patch applications because the bug is so-far reaching into internal networks, server communications, and products that were already shipped out to end users. As he sees it, completely fixing the issue will take a very long time. Meanwhile, he said, malicious actors are actively looking for ways to exploit the flaw.

What About Two-Factor Authentication? (continued...)

1  2  Next Page >

Tell Us What You Think
Comment:

Name:

Snake73:
Posted: 2014-04-16 @ 1:09pm PT
Stupid kids today! geez go outside and get some exercise!!

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN CLOUD COMPUTING
Product Information and Resources for Technology You Can Use To Boost Your Business
© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.