Over 300,000 servers are still vulnerable to Heartbleed

TECHi's Author Lorie Wimble
Opposing Author Theverge Read Source Article
Last Updated
TECHi's Take
Lorie Wimble
Lorie Wimble
  • Words 131
  • Estimated Read 1 min

Over 300,000 servers out of the 600,000 that were vulnerable to Heartbleed are still unpatched two months after the nasty vulnerability in OpenSSL was discovered by a Google engineer. The numbers were announced by security researcher Robert David Graham who found that although half of the 600,00 servers were patched a month after Heartbleed was discovered, only about 9,000 were patched in the last month. It’s safe to assume that most of the bigger sites have been patched. But the fact that more than half the servers haven’t bothered to implement the fix should give you cause for concern. Heartbleed, after all, was little more than a dumb coding mistake that could easily be exploited by hackers to get all sorts of sensitive information like usernames, passwords, encryption keys and more from websites.

Theverge

Theverge

  • Words 200
  • Estimated Read 1 min
Read Article

Two months ago, security experts and web users panicked when a Google engineer discovered a major bug — known as Heartbleed — that put over a million web servers at risk. The bug doesn’t make the news much anymore, but that doesn’t mean the problem’s solved. Security researcher Robert David Graham has found that at least 309,197 servers are still vulnerable to the exploit. Immediately after the announcement, Graham found some 600,000 servers were exposed by Heartbleed. One month after the bug was announced, that number dropped down to 318,239. In the past month, however, only 9,042 of those servers have been patched to block Heartbleed. That’s cause for concern, because it means that smaller sites aren’t making the effort to implement a fix. Considering the numbers, it’s likely that the lightly-trod corners of the internet will remain vulnerable for many years to come, as sites with sub-par security standards continue to leave themselves — and their users — exposed. The danger is particularly real now since the exploit has been widely publicized. The bug, which affects the OpenSSL protocol used widely online, can cause some serious damage — it can be exploited to give hackers encryption keys, passwords, and other sensitive information.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Theverge

Why Microsoft Windows 11 Copilot AI Falls Short of Expectations?
Why Microsoft Windows 11 Copilot AI Falls Short of Expectations?

Microsoft's Copilot AI in Windows 11 falls short of user expectations, especially when compared to the company’s high-profile advertisements.  Real-world…

Apple’s Switch to OLED Displays Could Make the iPad Mini More Expensive
Apple’s Switch to OLED Displays Could Make the iPad Mini More Expensive

Apple's idea to use OLED screens for gadgets shows how keen they are to boost how things look and feel.…

Pixel Watch 4: Sleeker design, new fitness tools, and smarter AI
Pixel Watch 4: Sleeker design, new fitness tools, and smarter AI

The Pixel Watch 4 is a new milestone in the world of smartwatches offered by Google. It brings several firsts,…

Apple Unintentionally Revealed Details About Some of Its Upcoming Chip Upgrades
Apple Unintentionally Revealed Details About Some of Its Upcoming Chip Upgrades

This most recent leak of Apple has got everybody talking in the tech world. The emerging code suggests substantial updates…