How to protect yourself from the ‘Heartbleed’ bug

How to protect yourself from the ‘Heartbleed’ bug

A new security bug means that people all across the Web are vulnerable to having their passwords and other sensitive data stolen. Here’s what consumers can do to protect themselves.

 

heartbleed.png
Codenomicon

 

A major new security vulnerability dubbed Heartbleed was disclosed Monday night with severe implications for the entire Web. The bug can scrape a server’s memory, where sensitive user data is stored, including private data such as usernames, passwords, and credit card numbers.

It’s an extremely serious issue, affecting some 500,000 servers, according to Netcraft, an Internet research firm. Here’s what you can do to make sure your information is protected, according to security experts contacted by CNET:

Do not log into accounts from afflicted sites until you’re sure the company has patched the problem. If the company hasn’t been forthcoming — confirming a fix or keeping you up to date with progress — reach out to its customer service teams for information, said John Miller, security research manager for TrustWave, a security and compliance firm.

Some Web sites that appeared to have been affected included Yahoo and OKCupid, though the companies have said their sites are all or partly fixed (see below for details). You can check sites on an individual basis here, though caution is still advised even if the site gives you an “all clear” indication. If you’re given a red flag, avoid the site for now.

The natural response might be to want to change passwords immediately, but security experts suggest waiting for confirmation of a fix because further activity on a vulnerable site could exacerbate the problem.

Once you’ve got confirmation of a security patch, change passwords of sensitive accounts like banks and email first. Even if you’ve implemented two-factor authentication — which, in addition to a password asks for another piece of identifying information, like a code that’s been texted to you — changing that password is recommended.

Don’t be shy about reaching out to small businesses that have your data to make sure they are secure. While the high-profile companies like Yahoo and Imgur certainly know about the problem, small businesses might not even be aware of it, said TrustWave’s Miller. Be proactive about making sure your information is safe.

Keep a close eye on financial statements for the next few days. Because attackers can access a server’s memory for credit card information, it wouldn’t hurt to be on the lookout for unfamiliar charges on your bank statements.

Even after following these guidelines, there is still some riskiness in surfing the Web in the aftermath of the bug. Heartbleed is even said to affect browser cookies, which track users’ activity on a site, so even visiting a vulnerable site without logging in could be risky. The Tor Project, which stresses anonymity and privacy, wrote in a blog post that users with those needs “might want to stay away from the Internet entirely for the next few days while things settle.”

Yahoo seems to be the most major Web to site have been vulnerable to the bug (preliminary tests for Facebook, Google, and Twitter’s Web sites said they appear to be safe). The company said that it has “successfully made appropriate corrections” to the main Yahoo properties: Yahoo Homepage, Search, Mail, Finance, Sports, Food, Tech, Flickr and Tumblr. Still, a Yahoo spokesperson said the company is still working to make the fix across the rest of the Yahoo sites.

“I encourage users to not log in into [Yahoo] and other services that are affected since the credentials could have been leaked if they used the service,” said Jaime Blasco, director of AlienVault Labs, a security research firm. “As soon as Yahoo solves the issue, it will be helpful if users change their password just in case.”

Yahoo has been stressing authentication of late, so that the company would be able to provide a morepersonalized experience to users, a drum CEO Marissa Mayer has been beating almost since she took over the company. Yahoo provides services like email and fantasy sports, requiring passwords to get access to the applications.

The company has already had some trouble in the security arena. In January, the company had to reset the passwords of some email users after an attempted attack on a third-party’s database. In response to the Heartbleed bug, some users have already expressed their outrage on Twitter. Brandon Oxford, from Royal, Ark., wrote: “After this I’m officially done with Yahoo email. I’ve now set up a Gmail. They seem to be more on top of stuff than Yahoo.”

Other companies that were said to be affected chimed in as well. Imgur, the photo-sharing site popular with Reddit users, said: “[We] invalidated sensitive data such as cookies and session IDs, just to be on the safe side. We’re proceeding with caution, since the nature of the attack makes it hard to detect, but we have no reason to believe it has been used against Imgur.” OKCupid said, “The fix is now fully live on OKCupid.”

The question in the aftermath of something like this is whether Web companies will reform their security practices. There has been a move toward Perfect Forward Secrecy (PFS) by many of the major Web companies, but not all of them have implemented the practice. PFS means essentially that encryption keys get a very short shelf life, and are not used forever. “People should want their communications to be secure as possible. PFS is one thing they can push for in the future,” said Miller.

CNET’s Seth Rosenblatt contributed to this report

Advertisements

About skicat56

Snow Sports Industry veteran – Husband – Father – Network IT Ninja & Former Powncer. Old enough to know better but young enough to start a new career.
This entry was posted in Security. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s