%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> /XObject << /I1 21 0 R /I2 22 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240517114301+00'00') /ModDate (D:20240517114301+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 11 0 R 13 0 R 15 0 R 17 0 R 19 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 5782 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 87.937 521.469 658.797 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 88.312 520.719 658.047 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(HEARTBLEED WREAKS HAVOC)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(If you read about a computer bug in the)] TJ ET BT 220.613 564.033 Td /F3 9.0 Tf [(YOU)] TJ ET BT 240.116 564.033 Td /F3 9.0 Tf [(, it has to be serious. This is exactly what happened with)] TJ ET BT 467.222 564.033 Td /F3 9.0 Tf [(Heartbleed)] TJ ET BT 511.241 564.033 Td /F3 9.0 Tf [(last )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(week.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(The now already infamous bug surfaced last month and wreaked havoc and )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(many popular websites. You also might have received an e-mail by now )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(requesting you to change your password for certain websites.)] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(Heartbleed)] TJ ET BT 105.035 491.088 Td /F3 9.0 Tf [(indicates a vulnerability in security in OpenSSL software commonly )] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(for web encryption. The vulnerability allows a hacker access to the memory of )] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(data servers. According toNetcraft, a company specialising in interne research, )] TJ ET BT 61.016 458.121 Td /F3 9.0 Tf [(5000 websites might have been infected by it.)] TJ ET BT 61.016 438.132 Td /F3 9.0 Tf [(Unlike some viruses infiltrating your computer via e-mail,)] TJ ET BT 288.572 438.132 Td /F3 9.0 Tf [(Heartbleed)] TJ ET BT 332.591 438.132 Td /F3 9.0 Tf [()] TJ ET BT 335.093 438.132 Td /F3 9.0 Tf [(targets a )] TJ ET BT 61.016 427.143 Td /F3 9.0 Tf [(weakness onweb servers. This implies that someone using a compromised )] TJ ET BT 61.016 416.154 Td /F3 9.0 Tf [(website, runs the risk of having his username, password or credit card details )] TJ ET BT 61.016 405.165 Td /F3 9.0 Tf [(intercepted. Without too much effort your data can be obtained and also access )] TJ ET BT 61.016 394.176 Td /F3 9.0 Tf [(to your account.)] TJ ET BT 61.016 374.187 Td /F3 9.0 Tf [(With)] TJ ET BT 81.518 374.187 Td /F3 9.0 Tf [(Heartbleed)] TJ ET BT 128.039 374.187 Td /F3 9.0 Tf [(hackers can also gain access to the digital keys responsible for )] TJ ET BT 61.016 363.198 Td /F3 9.0 Tf [(encryption on servers and thereby access a company's confidential, internal )] TJ ET BT 61.016 352.209 Td /F3 9.0 Tf [(documents.)] TJ ET BT 61.016 332.220 Td /F3 9.0 Tf [(According to)] TJ ET 0.373 0.169 0.255 rg BT 113.540 332.220 Td /F3 9.0 Tf [(Vocativ)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 113.540 331.069 m 143.051 331.069 l S 0.400 0.400 0.400 rg BT 143.051 332.220 Td /F3 9.0 Tf [(, the term)] TJ ET BT 183.569 332.220 Td /F3 9.0 Tf [(Heartbleed)] TJ ET BT 227.588 332.220 Td /F3 9.0 Tf [()] TJ ET BT 230.090 332.220 Td /F3 9.0 Tf [(was chosen byOssi Herrala, a systems administrator atCodenomicon. The )] TJ ET BT 61.016 321.231 Td /F3 9.0 Tf [(technical name isCVE-2014-0160 and refers to the line of code where the bug is located.)] TJ ET BT 419.198 321.231 Td /F3 9.0 Tf [(Heartbleed)] TJ ET BT 463.217 321.231 Td /F3 9.0 Tf [(refers to an )] TJ ET BT 61.016 310.242 Td /F3 9.0 Tf [(extension inOpenSSL called)] TJ ET BT 179.078 310.242 Td /F3 9.0 Tf [(heartbeat.)] TJ ET BT 219.605 310.242 Td /F3 9.0 Tf [()] TJ ET BT 222.107 310.242 Td /F3 9.0 Tf [(The protocol is used to keep connections open, even if data is not transmitted )] TJ ET BT 61.016 299.253 Td /F3 9.0 Tf [(between connections.)] TJ ET BT 61.016 279.264 Td /F3 9.0 Tf [(If you haven't changed your password for the affected sites, rather play it safe and change it anyway. It still remains good )] TJ ET BT 61.016 268.275 Td /F3 9.0 Tf [(practice to change your passwords on a regular basis. If you want to know which sites have been targeted or what their )] TJ ET BT 61.016 257.286 Td /F3 9.0 Tf [(current status is, you can do so)] TJ ET 0.373 0.169 0.255 rg BT 188.078 257.286 Td /F3 9.0 Tf [(here)] TJ ET 0.18 w 0 J [ ] 0 d 188.078 256.135 m 206.087 256.135 l S 0.400 0.400 0.400 rg BT 206.087 257.286 Td /F3 9.0 Tf [(.)] TJ ET BT 61.016 237.297 Td /F3 9.0 Tf [(More detailed information on)] TJ ET BT 177.566 237.297 Td /F3 9.0 Tf [(Heartbleed)] TJ ET BT 221.585 237.297 Td /F3 9.0 Tf [(is available at:)] TJ ET 0.373 0.169 0.255 rg BT 61.016 217.308 Td /F3 9.0 Tf [(http://www.cnet.com/news/how-to-protect-yourself-from-the-heartbleed-bug/)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 216.157 m 362.615 216.157 l S BT 61.016 206.319 Td /F3 9.0 Tf [(http://www.cnet.com/news/heartbleed-bug-what-you-need-to-know-faq/)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 205.168 m 343.625 205.168 l S BT 61.016 195.330 Td /F3 9.0 Tf [(http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 194.179 m 328.154 194.179 l S 0.400 0.400 0.400 rg BT 61.016 184.341 Td /F3 9.0 Tf [(http://www.vocativ.com/tech/hacking/behind-scenes-crazy-72-hours-leading-heartbleed-discovery/)] TJ ET BT 461.470 164.352 Td /F3 9.0 Tf [(BRON: www.cnet.com)] TJ ET BT 61.016 144.363 Td /F3 9.0 Tf [()] TJ ET BT 61.016 124.374 Td /F3 9.0 Tf [()] TJ ET BT 61.016 105.885 Td /F3 9.0 Tf [(Posted in:Internet,Security | | With 2 comments)] TJ ET q 165.000 0 0 197.250 385.984 344.596 cm /I2 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Annot /Subtype /Link /A 12 0 R /Border [0 0 0] /H /I /Rect [ 113.5397 331.3876 143.0507 340.5451 ] >> endobj 12 0 obj << /Type /Action /S /URI /URI (http://www.vocativ.com/tech/hacking/behind-scenes-crazy-72-hours-leading-heartbleed-discovery/) >> endobj 13 0 obj << /Type /Annot /Subtype /Link /A 14 0 R /Border [0 0 0] /H /I /Rect [ 188.0777 256.4536 206.0867 265.6111 ] >> endobj 14 0 obj << /Type /Action /S /URI /URI (https://lastpass.com/heartbleed/) >> endobj 15 0 obj << /Type /Annot /Subtype /Link /A 16 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 216.4756 362.6147 225.6331 ] >> endobj 16 0 obj << /Type /Action /S /URI /URI (http://www.cnet.com/news/how-to-protect-yourself-from-the-heartbleed-bug/) >> endobj 17 0 obj << /Type /Annot /Subtype /Link /A 18 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 205.4866 343.6247 214.6441 ] >> endobj 18 0 obj << /Type /Action /S /URI /URI (http://www.cnet.com/news/heartbleed-bug-what-you-need-to-know-faq/) >> endobj 19 0 obj << /Type /Annot /Subtype /Link /A 20 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 194.4976 328.1537 203.6551 ] >> endobj 20 0 obj << /Type /Action /S /URI /URI (http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/) >> endobj 21 0 obj << /Type /XObject /Subtype /Image /Width 220 /Height 263 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 1 /Columns 220 /BitsPerComponent 8>> /ColorSpace /DeviceGray /BitsPerComponent 8 /Length 3639>> stream xy|T$ $QVY-  싈ʪ`)CJfd*BXdP"k!33Lf&9n7Ksov}KMSZjjj1fuTfjjJfܜ Y\6.f$5omVnzEzު= k #N)0`>NhkaYD-! &:$?*x7Zu5H\{){WvpmuJk 0fTC[3ybnںlo7VC2tZxqW<5,O{&,ޑ~MzGSnp_"-f)P1t:;w_A}_rgv杀>]+%ٯmJ;3;UфiV[rGpw$= 9`&*Dn씒]CSV3\焔%mS93K8fln83fC6M>Wt\ly1&kSTygߣ<8^E74ݣTm *a `d#?:#)&!q{;C|?D'C.+r[N4:,_ Yo5܌j;a0 r7UzHe%򽤐fMFȺH2<Q&hBc:ǧ"B?2Klyp߽~ "g D}.r!5WQcN4$۬%BOveeR ]Y/$QX )&0^Rh;{ O, X`Є Ϳˆʼn?#y$A="`,++A;e`-'޵,dqFnf5i 6q8 p82j.KV]k{Pz=E3lDX0༶VHNyuf F=lR#iD4 5Z$dY9_MXu}Hts%}ÂH 7ua&&kHZȢ+CM;_vӇ5%[qyI)wM%4Cn |GS![q)溉&d'bz}R 2tiq-\$GV+S [{4]R-eЬm8ÉDΧXH;eg'&)h(Kc*[Gڳ<ñpoeoFi}"Y%.̝aht &GmCa^y ;+yW)R#&aÓ]'—Pq "_TMasEJEtJ4;p-V;sx鸗էn@m=w=X.H8qLeuakQ\$} tgzUKq <(HLOehk8+8'Z'QPeזU. [kvA_8 ʨ]Z_?Bl3%{FLq$6QF} (|TW/^DYe,Ӈaqtc7Q?I qq= h1cFB{iG oia8RF`+Ӓ>QP8CKr,ŋT7 zyq `F\L"$3.HiڂH=C#LGO8r.đ}_HG,;9-`A8䝗 E/w!~t%ό#Uhn~9!W!qB"X) ќD8`5pqx/G+Q < J~pqIpM^Q$>`u5D8RտW\veH_)*FQ&ܴk&zQPZ-4.G}P[\ȰB-2lq8añŅ [-.d/PnI"D\d{"D L}^C)Z!n)5/vqayHo9∣Q! qB-C\&I]jPYđ q6ڴm*x뗯ʼrjK ŅQ-7a[\g[t8Ra֗+~:"[\bTlq-.RE*HD8s0awo> /ColorSpace [ /Indexed /DeviceRGB 43 23 0 R ] /BitsPerComponent 8 /Length 2610>> stream x]b* uiDZq&,ͮ^.)Xp"BȲ`t6lI_]K1-aU:ϿV,GQ *L1MS$xY`oqsS]0{+2xxdO+p>QckRV /q*nrfD[Wvz.;v_-ͅC/ x+Z}sQ?~⽔wma?[~ͧKn@  C=&iԽ@6)ŬN=sKПGꭶ=?xgKetqJ(Tf4]+Zs (lb6p|XMq3΋wᧅi2ԅCƍ7ak4"$[sDR*P9jhOPp.B% fO66j HV.(}DAkɦgD+ZXsӒe*TҒ\;P -mh*Q@xicpCGP?Dm uEj0#"LeXd 0Ίh,k;jr'Kl v 9,z3v+:k`ݰp26=:֢v^%vWX|z6k07ʡ1Yܒs8)r8ɓs8s8TVg{+K y9][!aruCcpR$$.%Vh!BA2bD>-;3@QZޕP6pDOv;>@MR0i%4X9f:1Ѥw-Kf9OcH%PշOA$ڄ=hBv;&zFuj|BsFvv8~ oTj3% i-qAqϼ<#.lW#Ήı]_՝':f /!B9qPY*uT鎺˧İ˅x@A4c)vQ}=u,HxXB]-&v3{c,*`ȅt3)QrLjm"U`#y%(N^au<'g̲L|-9kvxGFzI[ (*ڃ'F>`jf+lM ;0 'g7s!Wz/h||ۉK\o'p+/ݑܪrvO^zJ5lCsk^,Imctv n k"1t{33 o[g"Lq$`jOb1 %]̩~HN2G˃oR8SiQ\ɉ{&mf|ȉBz$W0waEe_h?cUA=<!#<9/v+zC.\6!zDND5$r8(V[7H[Ê&Ug`FnYtIqv9;!a mrꜟ6lRſ_w"+"+"+"+b1tL!y\L,ev#[-HHHHHHHHH0) endstream endobj 23 0 obj << /Length 132 >> stream "" ++''!!##33$$!!""$$!! endstream endobj xref 0 24 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000504 00000 n 0000000614 00000 n 0000006448 00000 n 0000006560 00000 n 0000006667 00000 n 0000006783 00000 n 0000006911 00000 n 0000007057 00000 n 0000007185 00000 n 0000007269 00000 n 0000007396 00000 n 0000007521 00000 n 0000007648 00000 n 0000007766 00000 n 0000007893 00000 n 0000008009 00000 n 0000011894 00000 n 0000014787 00000 n trailer << /Size 24 /Root 1 0 R /Info 5 0 R >> startxref 14971 %%EOF Heartbleed wreaks havoc « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Heartbleed wreaks havoc

If you read about a computer bug in the YOU, it has to be serious. This is exactly what happened with Heartbleed last week.

The now already infamous bug surfaced last month and wreaked havoc and many popular websites. You also might have received an e-mail by now requesting you to change your password for certain websites.

Heartbleed indicates a vulnerability in security in OpenSSL software commonly for web encryption. The vulnerability allows a hacker access to the memory of data servers. According to Netcraft, a company specialising in interne research, 5000 websites might have been infected by it.

Unlike some viruses infiltrating your computer via e-mail, Heartbleed targets a weakness on web servers. This implies that someone using a compromised website, runs the risk of having his username, password or credit card details intercepted. Without too much effort your data can be obtained and also access to your account.

With Heartbleed hackers can also gain access to the digital keys responsible for encryption on servers and thereby access a company’s confidential, internal documents.

According to Vocativ, the term Heartbleed was chosen by Ossi Herrala, a systems administrator at Codenomicon. The technical name is CVE-2014-0160 and refers to the line of code where the bug is located. Heartbleed refers to an extension in OpenSSL called heartbeat. The protocol is used to keep connections open, even if data is not transmitted between connections.

If you haven’t changed your password for the affected sites, rather play it safe and change it anyway. It still remains good practice to change your passwords on a regular basis. If you want to know which sites have been targeted or what their current status is, you can do so here.

More detailed information on Heartbleed is available at:

http://www.cnet.com/news/how-to-protect-yourself-from-the-heartbleed-bug/
http://www.cnet.com/news/heartbleed-bug-what-you-need-to-know-faq/
http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/
http://www.vocativ.com/tech/hacking/behind-scenes-crazy-72-hours-leading-heartbleed-discovery/

BRON: www.cnet.com

 

 

2 Responses to “Heartbleed wreaks havoc”

  1. Sonja van der Westhuizen says:

    Jy’s heeltemal reg Theo.

  2. tpepler says:

    Technically Heartbleed is a “bug”, not a “virus”.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.