Most of the techies around the world are now acquainted with the heart bleeding “Heartbleed bug” that was discovered 2 months back. Heartbleed had affected over 600,000 servers keeping them vulnerable to be exploited, but according to a report by a security research firm, half of those servers are still affected by the bug. The bug which spread the panicky situation and fury round the corner, was recently discovered by one of the Google engineers.
The worst part of the virus is that it impacts the Open SSL and can trace out the login details and passwords. What makes this bug terribly dangerous is its inherent nature within the Open SSL framework. Open SSL framework is an open source project used by millions of sites online. Unfortunately this keep a good deal of servers exposed to the web.
After the news getting viral in the tech world, security researcher Robert David Graham from Errata Security said that the rough figure comes to be around 600,000 servers are vulnerable to the security flaw. However, after a month’s time, around half of these servers are found to be affected by this virus and have been complaining against the same. Later the left figure if 318,239 servers also found unprotected.
“A patch rate plummeting from double to single percentage digits as only 9,042 new servers has been patched in the last month.”
On this matter, the security researchers has to say that the people stopped looking forward to patch their system and one may find a slight decrease in this viral effect as the older servers are now being replaced. The top-notch companies have already taken the corrective measures in order to protect themselves from this virus but small firms are yet to take a few firm steps.
Meanwhile, you can check your frequently used websites under McAfee’s free heartbleed scanner, which won’t provides remedy, but shows you whether the website you entered still bugged or not. We recommend you to change your important passwords immediately, and make an habit of changing passwords once in ‘at least’ 2-3 months.
[ Source ]