Note about Heartbleed - we recommend changing your passwords

Connect Asia Data learn, and optimize business database management.
Post Reply
ashammi228
Posts: 13
Joined: Mon Dec 23, 2024 4:55 am

Note about Heartbleed - we recommend changing your passwords

Post by ashammi228 »

On April 7, the world learned of a critical vulnerability in the infrastructure that protects much of the information transmitted over the Internet. The vulnerability, dubbed the Heartbleed Bug, was in the OpenSSL library, which millions of websites used to encrypt information transmitted between their servers and users’ web browsers. Using this vulnerability, hackers could eavesdrop on private communications between a user and a website, and with time taiwanese numbers and luck, use the information they obtained to impersonate users and gain access to private information.

Like millions of other services, from Google to Facebook, Vtiger also uses the OpenSSL library. Within hours of receiving the vulnerability report, our servers were patched to address the vulnerability. Rest assured that your data is safe.

Although the vulnerability was made publicly available on April 7, it has existed in the OpenSSL library since March 2012. During this period, interested parties with knowledge of the bug may have been able to obtain the private security key used to decrypt data transmitted between Vtiger and your browser. While our investigations have not yet uncovered any such attempts, as a precaution we have replaced our site's security certificates, removing any previously existing keys.

As an additional safeguard, we strongly recommend our users to change their Vtiger passwords.

If you are having trouble logging into Vtiger due to a newly deployed certificate, please clear your browser cache and try again ( instructions on how to clear your browser cache ).

For more information about the Heartbleed error, visit:

Heartbleed.com
XKCD - Graphical Explanation of Heartbleed Error
If you have any questions regarding the Heartbleed error, please send us an email at
Post Reply