<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Heartbleed: the bug that put the internet on high alert &#8211; The Verge</title>
	<subtitle type="text">The Verge is about technology and how it makes us feel. Founded in 2011, we offer our audience everything from breaking news to reviews to award-winning features and investigations, on our site, in video, and in podcasts.</subtitle>

	<updated>2014-05-29T20:48:24+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.theverge.com/2014/4/12/5607614/heartbleed-openssl-bug-storystream" />
	<id>https://www.theverge.com/rss/stream/5371655</id>
	<link rel="self" type="application/atom+xml" href="https://www.theverge.com/rss/stream/5371655" />

	<icon>https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/verge-rss-large_80b47e.png?w=150&amp;h=150&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[New Heartbleed attack hits Android devices and routers over Wi-Fi]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2014/5/29/5762496/new-heartbleed-attack-targets-android-devices-and-routers-over-wi-fi" />
			<id>https://www.theverge.com/2014/5/29/5762496/new-heartbleed-attack-targets-android-devices-and-routers-over-wi-fi</id>
			<updated>2014-05-29T16:48:24-04:00</updated>
			<published>2014-05-29T16:48:24-04:00</published>
			<category scheme="https://www.theverge.com" term="Google" /><category scheme="https://www.theverge.com" term="Report" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Seven weeks after the bug put the web on high alert, Heartbleed is still causing problems. A new report from Portuguese security researcher Luis Grangeia describes how the same bug could be used over Wi-Fi to enable new kinds of attacks that build on the same vulnerability. The damage will be much more contained than [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/14732076/heartbleed.0.1410476734.png?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Seven weeks after the bug <a href="http://www.theverge.com/2014/4/12/5607614/heartbleed-openssl-bug-storystream">put the web on high alert,</a> Heartbleed is still causing problems. <a href="http://www.slideshare.net/lgrangeia/heartbleed-35236317">A new report</a> from Portuguese security researcher Luis Grangeia describes how the same bug could be used over Wi-Fi to enable new kinds of attacks that build on the same vulnerability.</p>
<!-- extended entry --><hr class="widget_boundry_marker hidden page_break"><!-- extended entry --><p><q class="right">The damage will be much more contained than Heartbleed</q></p><p>Dubbed Cupid, the new line of attack would perform the same Heartbleed procedure over Wi-Fi instead of the open web, either pulling data from enterprise routers or using a malicious router to pull data from Android devices as they connect. In each case, the attacker would be able to view snippets of the working memory  …</p>
<p><a href="https://www.theverge.com/2014/5/29/5762496/new-heartbleed-attack-targets-android-devices-and-routers-over-wi-fi">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[More than 300,000 servers are still vulnerable to Heartbleed]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2014/5/8/5695808/more-than-300000-servers-are-still-vulnerable-to-heartbleed" />
			<id>https://www.theverge.com/2014/5/8/5695808/more-than-300000-servers-are-still-vulnerable-to-heartbleed</id>
			<updated>2014-05-08T14:51:33-04:00</updated>
			<published>2014-05-08T14:51:33-04:00</published>
			<category scheme="https://www.theverge.com" term="Verge Archives" />
							<summary type="html"><![CDATA[One month after the critical Heartbleed vulnerability was first revealed, there are still more than 300,000 servers vulnerable to the bug, according to security researcher Robert David Graham. Graham arrived at the number through a global internet scan, which found a full 1.5 million servers that still support the "heartbeat" feature of OpenSSL that allowed [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/14710438/heartbleed.0.1410476779.png?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>One month after <a href="http://www.theverge.com/2014/4/12/5607614/heartbleed-openssl-bug-storystream">the critical Heartbleed vulnerability</a> was first revealed, there are still more than 300,000 servers vulnerable to the bug, according to <a href="http://blog.erratasec.com/2014/05/300k-servers-vulnerable-to-heartbleed.html#.U2vF9a1dX7o">security researcher Robert David Graham</a>. Graham arrived at the number through a global internet scan, which found a full 1.5 million servers that still support the "heartbeat" feature of OpenSSL that allowed the bug, and exactly 318,239 systems that are still vulnerable. The number counts only confirmed cases and there may well be other systems that escaped Graham's accounting, either because of spam blocking or unorthodox OpenSSL setups.</p>
<!-- extended entry --><hr class="widget_boundry_marker hidden page_break">
<p>It's a troubling number, given how available Heartble …</p>
<p><a href="https://www.theverge.com/2014/5/8/5695808/more-than-300000-servers-are-still-vulnerable-to-heartbleed">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Dante D&#039;Orazio</name>
			</author>
			
			<title type="html"><![CDATA[Just two men are tasked with taking care of OpenSSL]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2014/4/27/5658368/two-men-are-tasked-with-taking-care-of-openssl" />
			<id>https://www.theverge.com/2014/4/27/5658368/two-men-are-tasked-with-taking-care-of-openssl</id>
			<updated>2014-04-27T14:13:05-04:00</updated>
			<published>2014-04-27T14:13:05-04:00</published>
			<category scheme="https://www.theverge.com" term="Tech" /><category scheme="https://www.theverge.com" term="TL;DR" /><category scheme="https://www.theverge.com" term="Web" />
							<summary type="html"><![CDATA[OpenSSL is a key security backbone for untold thousands of websites to make sure strangers can't see what you're doing. But as the Heartbleed bug has revealed, this essential tool is in dire need of support; the hodgepodge team in charge of upkeep for the open source protocol is severely understaffed and underpaid. Buzzfeed has [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/14699042/AS2011-12-06_12-05-54_1020.0.1413851953.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>OpenSSL is a key security backbone for untold thousands of websites to make sure strangers can't see what you're doing. But as the Heartbleed bug has revealed, this essential tool is in dire need of support; the hodgepodge team in charge of upkeep for the open source protocol is severely understaffed and underpaid. <a href="http://www.buzzfeed.com/chrisstokelwalker/the-internet-is-being-protected-by-two-guys-named-st"><em>Buzzfeed</em> has published a wonderful feature story</a> on the two men who have been primarily responsible for OpenSSL for more than a decade, and it provides a look into just how a simple flaw like Heartbleed could have made it into the code. Thankfully, if one good thing has come out of this massive security breach, it's that OpenSSL m …</p>
<p><a href="https://www.theverge.com/2014/4/27/5658368/two-men-are-tasked-with-taking-care-of-openssl">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Google, Microsoft and Facebook launch $3.6 million project to stop the next Heartbleed]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2014/4/24/5646178/google-microsoft-and-facebook-launch-project-to-stop-the" />
			<id>https://www.theverge.com/2014/4/24/5646178/google-microsoft-and-facebook-launch-project-to-stop-the</id>
			<updated>2014-04-24T08:00:08-04:00</updated>
			<published>2014-04-24T08:00:08-04:00</published>
			<category scheme="https://www.theverge.com" term="Google" /><category scheme="https://www.theverge.com" term="Microsoft" /><category scheme="https://www.theverge.com" term="Tech" /><category scheme="https://www.theverge.com" term="Web" />
							<summary type="html"><![CDATA[The sudden chaos of the Heartbleed bug drove home just how much of the web relies on OpenSSL software, and just how little was being spent to maintain it. But in the aftermath, some of the biggest players in tech are coming together to change that, and hopefully spot the next Heartbleed before it can [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/14695962/heartbleed.0.1411130188.png?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>The sudden chaos of <a href="http://www.theverge.com/2014/4/12/5607614/heartbleed-openssl-bug-storystream">the Heartbleed bug</a> drove home just how much of the web relies on OpenSSL software, and just how little was being spent to maintain it. But in the aftermath, some of the biggest players in tech are coming together to change that, and hopefully spot the next Heartbleed before it can wreak quite as much havoc.</p>
<!-- extended entry --><hr class="widget_boundry_marker hidden page_break"><p><q class="right">"I wish we had done this a long time ago."</q></p>
<p>The new project is called <a href="http://www.linuxfoundation.org/programs/CII">the Core Infrastructure Initiative</a>, formed by the Linux Foundation and devoted to plowing money into the critical software infrastructure that needs it. Executive director Jim Zemlin says that after Heartbleed, it was clear something needed to change. …</p>
<p><a href="https://www.theverge.com/2014/4/24/5646178/google-microsoft-and-facebook-launch-project-to-stop-the">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Dante D&#039;Orazio</name>
			</author>
			
			<title type="html"><![CDATA[Healthcare.gov users asked to reset passwords following Heartbleed bug]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2014/4/19/5631020/healthcare-gov-heartbleed-password-reset-requested" />
			<id>https://www.theverge.com/2014/4/19/5631020/healthcare-gov-heartbleed-password-reset-requested</id>
			<updated>2014-04-19T13:04:01-04:00</updated>
			<published>2014-04-19T13:04:01-04:00</published>
			<category scheme="https://www.theverge.com" term="Verge Archives" />
							<summary type="html"><![CDATA[The officials are requesting that Healthcare.gov users reset their passwords after a continuing internal review by the Department of Homeland security flagged the site as possibly being vulnerable to a Heartbleed exploit. The move to reset passwords is being taken "out of an abundance of caution," according to a a notice published on the site, [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/14691387/healthcare-obamacare-website-stock1_2040.0.1410785390.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>The officials are requesting that Healthcare.gov users reset their passwords after a continuing internal review by the Department of Homeland security flagged the site as possibly being vulnerable to a Heartbleed exploit. The move to reset passwords is being taken "out of an abundance of caution," according to a a notice published on the site, which serves as a portal for the health insurance exchanges set up under Obamacare. In addition, the note says that "there's no indication" that any information was revealed through Heartbleed.</p>
<p>Critics of the Affordable Care Act may seize the opportunity to attack the much-maligned Healthcare.gov webs …</p>
<p><a href="https://www.theverge.com/2014/4/19/5631020/healthcare-gov-heartbleed-password-reset-requested">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[The first Heartbleed hacker has been arrested]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2014/4/16/5621506/the-first-heartbleed-hacker-has-been-arrested" />
			<id>https://www.theverge.com/2014/4/16/5621506/the-first-heartbleed-hacker-has-been-arrested</id>
			<updated>2014-04-16T15:15:48-04:00</updated>
			<published>2014-04-16T15:15:48-04:00</published>
			<category scheme="https://www.theverge.com" term="Verge Archives" />
							<summary type="html"><![CDATA[Canadian officials say they've tracked down the man responsible for the last week's Heartbleed-assisted breach at the Canadian Revenue Agency, which compromised the personal data of more than 900 citizens. According to The Calgary Herald, 19-year-old Stephen Arthuro Solis-Reyes from London, Ontario has been officially charged with the attack after five days of investigation. The [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/14688452/untitled-1.0.1411003511.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Canadian officials say they've tracked down the man responsible for the <a href="http://www.theverge.com/2014/4/14/5612904/900-canadian-social-insurance-numbers-stolen-in-first-heartbleed">last week's Heartbleed-assisted breach</a> at the Canadian Revenue Agency, which compromised the personal data of more than 900 citizens. According to <a href="http://www.calgaryherald.com/news/national/Police+charge+Heartbleed+privacy+breach+Canada+Revenue/9744952/story.html"><em>The Calgary Herald</em></a>, 19-year-old Stephen Arthuro Solis-Reyes from London, Ontario has been officially charged with the attack after five days of investigation. The official charges are "unauthorized use of a computer" and "mischief in relation to data."</p>
<!-- extended entry --><hr class="widget_boundry_marker hidden page_break">
<p>The attack took place on Friday, after <a href="http://www.theverge.com/2014/4/12/5607614/heartbleed-openssl-bug-storystream">the Heartbleed bug</a> was made public, but before the CRA was able to patch their servers to protect against it. As a result, attackers were …</p>
<p><a href="https://www.theverge.com/2014/4/16/5621506/the-first-heartbleed-hacker-has-been-arrested">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Kwame Opam</name>
			</author>
			
			<title type="html"><![CDATA[Heartbleed bug responsible for theft of 900 Canadian tax ID numbers]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2014/4/14/5612904/900-canadian-social-insurance-numbers-stolen-in-first-heartbleed" />
			<id>https://www.theverge.com/2014/4/14/5612904/900-canadian-social-insurance-numbers-stolen-in-first-heartbleed</id>
			<updated>2014-04-14T10:47:25-04:00</updated>
			<published>2014-04-14T10:47:25-04:00</published>
			<category scheme="https://www.theverge.com" term="Verge Archives" />
							<summary type="html"><![CDATA[Canada's taxpayers may be the first victims of the Heartbleed bug that put the web on high alert last week. According to the Canada Revenue Agency, 900 social insurance numbers (SINs) were stolen by hackers exploiting the security vulnerability. Even on a small scale, the breach is tantamount to identity theft, and is a situation [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/14685822/untitled-1.0.1409579140.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Canada's taxpayers may be the first victims of the Heartbleed bug that put the web on high alert last week. <a href="http://www.cra-arc.gc.ca/gncy/sttmnt2-eng.html">According to the Canada Revenue Agency</a>, 900 social insurance numbers (SINs) were stolen by hackers exploiting the security vulnerability. Even on a small scale, the breach is tantamount to identity theft, and is a situation the CRA had worked hard to avoid.</p>
<!-- extended entry --><hr class="widget_boundry_marker hidden page_break"><p><q class="right">Taxpayer information stolen in a brief six-hour period</q></p>
<p>In an official statement issued this morning, the CRA said that it removed public access to its online services <a href="http://www.theverge.com/2014/4/8/5594266/how-heartbleed-broke-the-internet/in/5371655">when news broke about Heartbleed last week</a>, and worked "around the clock" to patch the bug. However, the taxpayer in …</p>
<p><a href="https://www.theverge.com/2014/4/14/5612904/900-canadian-social-insurance-numbers-stolen-in-first-heartbleed">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Casey Newton</name>
			</author>
			
			<title type="html"><![CDATA[Hacker successfully uses Heartbleed to retrieve private security keys]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/us-world/2014/4/11/5606524/hacker-successfully-uses-heartbleed-to-retrieve-private-security-keys" />
			<id>https://www.theverge.com/us-world/2014/4/11/5606524/hacker-successfully-uses-heartbleed-to-retrieve-private-security-keys</id>
			<updated>2014-04-11T21:34:44-04:00</updated>
			<published>2014-04-11T21:34:44-04:00</published>
			<category scheme="https://www.theverge.com" term="Tech" /><category scheme="https://www.theverge.com" term="Web" />
							<summary type="html"><![CDATA[This morning, content distribution network Cloudflare gave some hope to those affected by the Heartbleed security flaw with an announcement that the bug might not be as bad as feared. In two weeks of testing, Cloudflare said, its researchers failed to exploit the bug to steal a website's private SSL keys, which secures the data [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/14683833/heartbleed.0.1406919026.png?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>This morning, content distribution network Cloudflare gave some hope to those affected by the Heartbleed security flaw with an announcement that the bug <a href="http://www.theverge.com/2014/4/11/5604300/heartbleed-may-not-leak-private-ssl-keys-after-all">might not be as bad as feared</a>. In two weeks of testing, <a href="http://blog.cloudflare.com/answering-the-critical-question-can-you-get-private-ssl-keys-using-heartbleed">Cloudflare said</a>, its researchers failed to exploit the bug to steal a website's private SSL keys, which secures the data sent to users. It issued <a href="https://www.cloudflarechallenge.com/heartbleed">a challenge</a> to white-hat hackers to successfully retrieve the private security keys - and unfortunately for the web, one of them succeeded.</p>
<p>The hacker, Node.js team member Fedor Indutny, claimed on Twitter that he'd tracked down the SSL keys.</p>
<!-- extended entry --><hr class="widget_boundry_marker hidden page_break"><blockquote class="twitter-tweet" lang="en"> <p>Just cracked <a href="https://twitter.com/CloudFlare">@CloudFlare</a> 's challenge: <a href="https://t.co/8ZPSxyKF4D">https://t. …</a></p></blockquote>
<p><a href="https://www.theverge.com/us-world/2014/4/11/5606524/hacker-successfully-uses-heartbleed-to-retrieve-private-security-keys">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Adi Robertson</name>
			</author>
			
			<title type="html"><![CDATA[Glenn Greenwald and Laura Poitras return to US, blame government for climate of fear]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2014/4/11/5606094/glenn-greenwald-and-laura-poitras-return-to-us-for-polk-awards" />
			<id>https://www.theverge.com/2014/4/11/5606094/glenn-greenwald-and-laura-poitras-return-to-us-for-polk-awards</id>
			<updated>2014-04-11T18:21:41-04:00</updated>
			<published>2014-04-11T18:21:41-04:00</published>
			<category scheme="https://www.theverge.com" term="Policy" /><category scheme="https://www.theverge.com" term="Report" />
							<summary type="html"><![CDATA[At the presentation ceremony for Long Island University's prestigious George Polk Awards in journalism, reporters were recognized for some of the biggest stories of the past year: the NFL's indifference to concussions, the deliberate attempts by New Jersey governor Chris Christie's office to create traffic jams, former Virginia governor Robert McConnell's acceptance of illegal gifts. [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/14683720/theverge1_1020.0.1410661704.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>At the presentation ceremony for Long Island University's prestigious George Polk Awards in journalism, reporters were recognized for some of the biggest stories of the past year: the NFL's indifference to concussions, the deliberate attempts by New Jersey governor Chris Christie's office to create traffic jams, former Virginia governor Robert McConnell's acceptance of illegal gifts. But one of the most dramatic moments was a series of text messages signaling the arrival of two journalists who helped reveal the large and hidden web of NSA surveillance: documentarian Laura Poitras and reporter Glenn Greenwald.</p>
<p>The presentation of the Polk Aw …</p>
<p><a href="https://www.theverge.com/2014/4/11/5606094/glenn-greenwald-and-laura-poitras-return-to-us-for-polk-awards">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[The NSA has exploited Heartbleed bug for years, Bloomberg reports]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2014/4/11/5605444/the-nsa-has-exploited-heartbleed-bug-for-years-bloomberg-reports" />
			<id>https://www.theverge.com/2014/4/11/5605444/the-nsa-has-exploited-heartbleed-bug-for-years-bloomberg-reports</id>
			<updated>2014-04-11T15:10:25-04:00</updated>
			<published>2014-04-11T15:10:25-04:00</published>
			<category scheme="https://www.theverge.com" term="Verge Archives" />
							<summary type="html"><![CDATA[Bloomberg is reporting that the Heartbleed bug, which shocked the web security community this week, has been known and actively exploited by the National Security Agency for at least two years. According to two anonymous sources familiar with the matter, the bug was kept secret in the interest of national security, while the agency used [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/14683539/12388639744_55496ecedb_b.0.1411403885.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p><a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html">Bloomberg is reporting</a> that the Heartbleed bug, which shocked the web security community this week, has been known and actively exploited by the National Security Agency for at least two years. According to two anonymous sources familiar with the matter, the bug was kept secret in the interest of national security, while the agency used it to obtain passwords and other data. Since the bug was first committed in 2012, the report suggests the NSA discovered the bug and maintained access for nearly the entire lifespan of Heartbleed.</p>
<!-- extended entry --><hr class="widget_boundry_marker hidden page_break"><p><q class="right">"They are going to be completely shredded."</q></p>
<p>The vulnerability could have been used to attack many services that w …</p>
<p><a href="https://www.theverge.com/2014/4/11/5605444/the-nsa-has-exploited-heartbleed-bug-for-years-bloomberg-reports">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
	</feed>
