{"id":269,"date":"2014-04-10T20:20:50","date_gmt":"2014-04-11T02:20:50","guid":{"rendered":"http:\/\/asnaggydime.com\/blog\/?p=269"},"modified":"2014-04-10T20:20:50","modified_gmt":"2014-04-11T02:20:50","slug":"still-safe","status":"publish","type":"post","link":"http:\/\/asnaggydime.com\/blog\/2014\/04\/10\/still-safe\/","title":{"rendered":"Are You Still Safe?"},"content":{"rendered":"<div id=\"attachment_270\" style=\"width: 249px\" class=\"wp-caption alignright\"><a href=\"http:\/\/asnaggydime.com\/blog\/wp-content\/uploads\/2014\/04\/Heartbleed.svg_.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-270\" class=\"size-medium wp-image-270\" alt=\"Heartbleed\" src=\"http:\/\/asnaggydime.com\/blog\/wp-content\/uploads\/2014\/04\/Heartbleed.svg_-239x300.png\" width=\"239\" height=\"300\" srcset=\"http:\/\/asnaggydime.com\/blog\/wp-content\/uploads\/2014\/04\/Heartbleed.svg_-239x300.png 239w, http:\/\/asnaggydime.com\/blog\/wp-content\/uploads\/2014\/04\/Heartbleed.svg_.png 411w\" sizes=\"auto, (max-width: 239px) 100vw, 239px\" \/><\/a><p id=\"caption-attachment-270\" class=\"wp-caption-text\">Heartbleed<\/p><\/div>\n<p>As if the <a title=\"Credit Cards, part 1 \u2013 Safe, Like Target\" href=\"http:\/\/asnaggydime.com\/blog\/2014\/01\/20\/credit-cards-part-1-safe-like-target\/\" target=\"_blank\">Target credit card breach<\/a> four months ago was not enough, we now have another personal data breach to worry about. On Monday, April 7, 2014, an announcement was made that websites using certain versions of OpenSSL cryptographic encryption protocols had a memory handling bug that could be exploited to reveal personal user information, including user names, e-mails, passwords and potentially much, much more. This vulnerability was published on December 31, 2011 and has been used by countless sites for well over two years.<\/p>\n<p>What\u2019s the risk? It\u2019s a hard question to answer. Potentially the bug was not exploited or a particular individual\u2019s data was never directly compromised, so no harm was done. Alternatively, some individual account passwords may have been compromised and someone out there has a list of user names and passwords and can, at their leisure, log into other people\u2019s accounts and access more of their personal information, impersonate them or even access financial or medical records! Overall the risk is probably low, but if you\u2019re the one with compromised information \u2026 it\u2019s a lottery you probably don\u2019t want to win.<\/p>\n<p>So what do you need to do? The easy solution is to prevent potential access to your accounts. You can do this very simply by changing your password. The good news is that not all sites have been impacted by this bug, but a lot have and some are very big and popular and could potentially be very harmful. Both <a title=\"Wikipedia - Heartbleed Bug\" href=\"http:\/\/en.wikipedia.org\/wiki\/Heartbleed_bug\" target=\"_blank\">Wikipedia<\/a> and <a title=\"Mashable - The Heartbleed Hit List\" href=\"http:\/\/mashable.com\/2014\/04\/09\/heartbleed-bug-websites-affected\/\" target=\"_blank\">Mashable<\/a> have published detailed information about the Heartbleed vulnerability and also listed the largest sites that are (and are not) affected. Visit these sites and see where you need to change your password and please do this as soon as you can!<\/p>\n<p>We do have some good news for you. a Snaggy diMe does not use OpenSSL, so we are not vulnerable to Heartbleed. And our payment processor, PayPal, has posted an <a title=\"PayPal - Heartbleed\" href=\"https:\/\/www.paypal-community.com\/t5\/PayPal-Forward\/OpenSSL-Heartbleed-Bug-PayPal-Account-Holders-are-Secure\/ba-p\/797568\" target=\"_blank\">announcement<\/a> that they are not subject to this vulnerability either. But we do urge you to check your other service providers and see if you are impacted by Heartbleed.<\/p>\n<p>[whohit]2014-04-10 Are You Still Safe?[\/whohit]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As if the Target credit card breach four months ago was not enough, we now have another personal data breach to worry about. On Monday, April 7, 2014, an announcement was made that websites using certain versions of OpenSSL cryptographic encryption protocols had a memory handling bug that could be exploited to reveal personal user [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[10],"tags":[],"class_list":["post-269","post","type-post","status-publish","format-standard","hentry","category-finance"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4dcLB-4l","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"http:\/\/asnaggydime.com\/blog\/wp-json\/wp\/v2\/posts\/269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/asnaggydime.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/asnaggydime.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/asnaggydime.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/asnaggydime.com\/blog\/wp-json\/wp\/v2\/comments?post=269"}],"version-history":[{"count":1,"href":"http:\/\/asnaggydime.com\/blog\/wp-json\/wp\/v2\/posts\/269\/revisions"}],"predecessor-version":[{"id":271,"href":"http:\/\/asnaggydime.com\/blog\/wp-json\/wp\/v2\/posts\/269\/revisions\/271"}],"wp:attachment":[{"href":"http:\/\/asnaggydime.com\/blog\/wp-json\/wp\/v2\/media?parent=269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/asnaggydime.com\/blog\/wp-json\/wp\/v2\/categories?post=269"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/asnaggydime.com\/blog\/wp-json\/wp\/v2\/tags?post=269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}