Heartbleed FUD: scarier than Jedward as triplets?
Davey Winder thinks the fact password reset floodgates are about to open...
The potential seriousness of such a vulnerability as Heartbleed cannot be downplayed, that's for sure. However, arm waving and running around informing everyone the sky is falling is not the way to deal with any crisis though. Indeed, even if the sky were falling down it wouldn't do much good.
As the media, the IT security industry, open source pundits and Joe User alike get swept away by the story so the FUD floodgates have opened. And FUD (that's Fear, Uncertainty and Doubt) would be a more unwelcome trio than if Jedward were triplets.
Not every site out there has been touched by this vulnerability, not every site uses OpenSSL. But plenty have and do. It's not the end of the internet, and it's not open day for the bad guys either as although grabbing sensitive data is by all means possible it's by no means a walk in the park.
From the enterprise perspective the FUD-free advice is for your pre-existing disaster plans to kick in and find those machines which are vulnerable, patch them and do the revoke and reissue thing before auditing the nature of any potential exposure and getting on with your business.
From the end user perspective, there are tools out there already which will tell you if a service was vulnerable to Heartbleed and, importantly, whether it has patched, revoked and reissued; if it has it will then recommend you change your password for that service.
As for the bad guys, I expect a flood of fake password reset notifications to start rolling out real soon now. I didn't think I would end this piece with a Celine Dion reference, but I imagine the Heartbleed FUD will go on...
In This Article
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download