Beginning Next Week: InsideCounsel will become part of Corporate Counsel. Bringing these two industry-leading websites together will now give you comprehensive coverage of the full spectrum of issues affecting today's General Counsel at companies of all sizes. You will continue to receive expert analysis on key issues including corporate litigation, labor developments, tech initiatives and intellectual property, as well as Women, Influence & Power in Law (WIPL) professional development content. Plus we'll be serving all ALM legal publications from one interconnected platform, powered by, giving you easy access to additional relevant content from other InsideCounsel sister publications.

To prevent a disruption in service, you will be automatically redirected to the new site next week. Thank you for being a valued InsideCounsel reader!


‘Heartbleed’ bug poses major data security risk for all Internet users

The bug exploited a flaw in the code that is designed to keep servers secure

The bug itself may be called “Heartbleed,” but what should really get your blood pumping is the potential loss of personally identifiable information (PII), including credit card info and passwords.

The bug, which has been on the Internet undetected for roughly two years, does not attack individual websites or companies like recent hacks into the systems of Target, Mt. Gox, and others. Instead, Heartbleed exploits a flaw in the code that is designed to keep servers secure.

That means that, this time, tens of thousands of servers that house data for thousands of websites could be affected by this bug. In essence, all Internet users who conduct business transactions or even have passwords saved on websites could be affected by this bug.

Finnish security firm Codenomicon, which helped discover the bug, says that this could be one of the worst invasions of privacy in Internet history. “This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content,” the firm said. “This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.”

The firm said that it tested the exploitable code on its own servers, and it was able to enter and leave without a trace. Those who made the popular code, Open SSL, has released a fixed version that does not have this vulnerability, although widespread adoption may take some time. In one key instance, Yahoo confirmed to Reuters that Yahoo Mail was vulnerable to the bug, but a spokesman said all major Yahoo sites have been patched since the bug’s discovery.

It’s currently unclear whether the security bug has been exploited on a widespread basis. As Lindsey Bever of the Washington Post writes, “It’s as if someone went on vacation not knowing the lock on the front door was broken. Could someone walk in? Yes. Will they? Did they? Who knows?”

For in-house counsel, the most important move will be to consult with IT and other technology experts within the company to determine whether the company’s private information is at risk. If so, make sure your company’s information is secure as quickly as possible, and consult with the IT department to attempt to determine the level of your company’s overall vulnerability.


For more data security news, check out these recent InsideCounsel articles:

SCOTUS declines to take an early look at spy program case

Addressing the impact of mobile devices on in-house counsel

How closely is the board paying attention to cyber risks?

Pointers to prevent departing employees from taking confidential information

Assistant Editor

author image

Zach Warren

Zach Warren is Assistant Editor of InsideCounsel magazine, where he oversees online content submissions and administers InsideCounsel's enewsletters. Zach specializes in new media and multimedia...

Bio and more articles

Join the Conversation

Advertisement. Closing in 15 seconds.