As an enterprise cloud solution provider, security within our system and of our clients’ data is of top propriety. On Monday, April 7, a severe security bug affecting many popular e-commerce/user websites was reported. This Heartbleed bug makes it possible for hackers to send a protocol that can unscramble the encrypted code protecting an accounts sensitive information.
Here’s the good news: Both DriveHQ , CameraFTP and our reseller sites are, and continue to be unaffected by the Heartbleed bug. This vulnerability only impacts platforms that run OpenSSL, which DriveHQ does not. While we were fortunate enough to avoid this headache, we understand the number of affected sites, and encourage any users with accounts on these to create a password that is unique for DriveHQ.
Though Heartbleed has existed for more than two years, it is unclear whether or not hackers have been abusing the bug in secret. It is the lack of any trace that concerns many computer experts more than the bug itself.
Huge companies like Ebay, GoDaddy, Instagram, Google and Yahoo all reported to use the vulnerable implementation of OpenSSL. Of course most teams were quick to update servers with a security patch. Still, because there is no way to get a record of any comprised information, it is wise to update detail with all sites that carry sensitive information.
For more detail about the bug, you can visit Heartbleed: