SlideShare a Scribd company logo
1 of 14
Download to read offline
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
Epidemic
what
is
the
Heartbleed
Brought to you by:
PASS IT ON
Click this button to share information on each slide.
CVE-2014-0160
Official designation is
CVE (Common Vulnerabilities and Exposures)
a vulnerability that exists
in the OpenSSL security
software, which is used to
create secure connections.
HEARTBLEED
VIEW THE INFOGRAPHIC
This vulnerability existed for 2 years
before it was caught!
VIEW THE INFOGRAPHIC
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
Version 1.0.1 of OpenSSL introduced
the vulnerability known as heartbleed,
and was released on March 14, 2012.
Heartbleed was discovered by Neel
Mehta, an engineer at Google Security,
and a team of security engineers (Riku,
Antti and Matti) at Finnish security
firm, Codenomicon.
!!!
VIEW THE INFOGRAPHIC
A computer that is on a secure
connection to a server will send out
a request to confirm that the
connection is still active.
The server takes that request and
stores the data.
Then it returns that same
packet of data.
This secure connection (SSL/TSL),
is called a “heartbeat.” It includes
two things: a payload, and padding.
HOW IT WORKS
VIEW THE INFOGRAPHIC
THIS IS WHERE THE BLEEDING HAPPENS
Servers using the protocol do not check to confirm that the
packet of data actually matches the size indicated.
So, for example, if a heartbeat was sent with
a single byte of data, and claimed to have
30 bytes of data.
Rather than confirm that the data was
only 1 byte, the server would grab not only
that, but the next 29 bytes from memory
as well and send it back the user.
VIEW THE INFOGRAPHIC
1 byte (30 bytes) (30 bytes)
VIEW THE INFOGRAPHIC
Imagine what could be in those extra 29 bytes?
No data is safe!
Passwords Addresses Full Names
Credit Card NumbersEncryption Keys
***
Social Security Numbers
VIEW THE INFOGRAPHIC
Not only that,
A malicious user could make as many heartbeat requests
as they’d like. With NO TRACE being left behind.
Including heavily trafficked websites such as:
Facebook, Google, YouTube and Wikipedia.
VIEW THE INFOGRAPHIC
are using the vulnerable
heartbeat extension.
About 500,000 sites
By automatically detecting, blocking and logging attempted
Heartbleed attacks, Blue Coat’s SSL Visibility Appliance provides
enterprises with the security assurance they require.
PROTECT & PREVENT
START NOW
Brought to you by:
VIEW THE INFOGRAPHIC
SOURCES:
http://heartbleed.com
http://vimeo.com/91425662
http://www.pewinternet.org/2014/04/30/heartbleeds-impact/
http://readwrite.com/2014/04/13/heartbleed-security-codenomicon-discovery#awesm=~oE3W6PSiCIxWOz
http://www.digitaltrends.com/mobile/heartbleed-bug-apps-affected-list/#!MOLoi

More Related Content

Viewers also liked

CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
Blue Coat
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
Blue Coat
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
ChessBall
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
idsecconf
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus Network
Blue Coat
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
vfmindia
 

Viewers also liked (12)

CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
 
Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus Network
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentation
 
Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
 
How to master Blue Coat Proxy SG
How to master Blue Coat Proxy SGHow to master Blue Coat Proxy SG
How to master Blue Coat Proxy SG
 

Similar to What is Heartbleed?

How To Deliver a 5-Star Experience for IoT-Enabled Services
How To Deliver a 5-Star Experience for IoT-Enabled ServicesHow To Deliver a 5-Star Experience for IoT-Enabled Services
How To Deliver a 5-Star Experience for IoT-Enabled Services
AppDynamics
 

Similar to What is Heartbleed? (20)

Connecting the physical world to the cloud
Connecting the physical world to the cloudConnecting the physical world to the cloud
Connecting the physical world to the cloud
 
IoT State of the Union - IOT210 - re:Invent 2017
IoT State of the Union - IOT210 - re:Invent 2017IoT State of the Union - IOT210 - re:Invent 2017
IoT State of the Union - IOT210 - re:Invent 2017
 
AWS IoT Update - re:Invent Comes to London 2.0
AWS IoT Update - re:Invent Comes to London 2.0AWS IoT Update - re:Invent Comes to London 2.0
AWS IoT Update - re:Invent Comes to London 2.0
 
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
 
[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기
[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기
[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기
 
AWS Simple Workflow: Distributed Out of the Box! - Morning@Lohika
AWS Simple Workflow: Distributed Out of the Box! - Morning@LohikaAWS Simple Workflow: Distributed Out of the Box! - Morning@Lohika
AWS Simple Workflow: Distributed Out of the Box! - Morning@Lohika
 
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
 
Open source and its career benefits
Open source and its career benefitsOpen source and its career benefits
Open source and its career benefits
 
How to use AWS IoT Analytics to unlock the value from IoT data
How to use AWS IoT Analytics to unlock the value from IoT dataHow to use AWS IoT Analytics to unlock the value from IoT data
How to use AWS IoT Analytics to unlock the value from IoT data
 
How To Deliver a 5-Star Experience for IoT-Enabled Services
How To Deliver a 5-Star Experience for IoT-Enabled ServicesHow To Deliver a 5-Star Experience for IoT-Enabled Services
How To Deliver a 5-Star Experience for IoT-Enabled Services
 
[Infographic] Empower Your Business With Digital Business Transformation
[Infographic] Empower Your Business With Digital Business Transformation[Infographic] Empower Your Business With Digital Business Transformation
[Infographic] Empower Your Business With Digital Business Transformation
 
Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018
Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018
Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018
 
Cdma basics
Cdma basicsCdma basics
Cdma basics
 
Artificial intelligence (ai)
Artificial intelligence (ai)Artificial intelligence (ai)
Artificial intelligence (ai)
 
A4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyA4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiency
 
Unlock the value of big data with the DX2000 from NEC - Infographic
Unlock the value of big data with the DX2000 from NEC - InfographicUnlock the value of big data with the DX2000 from NEC - Infographic
Unlock the value of big data with the DX2000 from NEC - Infographic
 
Not Dead Yet: Designing Great Experiences with Bad Data
Not Dead Yet: Designing Great Experiences with Bad DataNot Dead Yet: Designing Great Experiences with Bad Data
Not Dead Yet: Designing Great Experiences with Bad Data
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
[Infographic] How ransomware gets into your system
[Infographic] How ransomware gets into your system[Infographic] How ransomware gets into your system
[Infographic] How ransomware gets into your system
 
Informe simulacion digital yolfred uzcategui - 25.242.800
Informe simulacion digital   yolfred uzcategui - 25.242.800Informe simulacion digital   yolfred uzcategui - 25.242.800
Informe simulacion digital yolfred uzcategui - 25.242.800
 

More from Blue Coat

Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Blue Coat
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
Blue Coat
 

More from Blue Coat (8)

Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
 
How To Catch A Hidden Spammer
How To Catch A Hidden SpammerHow To Catch A Hidden Spammer
How To Catch A Hidden Spammer
 

Recently uploaded

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 

Recently uploaded (20)

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 

What is Heartbleed?