{"id":3187,"date":"2014-04-11T10:00:56","date_gmt":"2014-04-11T14:00:56","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3187"},"modified":"2020-02-26T18:58:26","modified_gmt":"2020-02-26T14:58:26","slug":"heartbleed-and-windows-xp","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/heartbleed-and-windows-xp\/3187\/","title":{"rendered":"A Week in the News: Heartbleed and Windows XP"},"content":{"rendered":"<p><b>Dark Times for OpenSSL<\/b><\/p>\n<p>Though it may sound like the title of a Slayer album, Heartbleed actually refers to <a href=\"https:\/\/threatpost.com\/openssl-fixes-tls-vulnerability\/105300\" target=\"_blank\" rel=\"noopener nofollow\">a serious security vulnerability in OpenSSL<\/a>. Nearly ubiquitous, OpenSSL is an open-source cryptographic library that is deployed by perhaps as many as two-thirds of the Internet\u2019s websites. These sites use OpenSSL as a mechanism to implement secure SSL and TLS encrypted connections. TLS and its predecessor SSL are cryptographic protocols that ensure communication security online.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111205\/week-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4454\" alt=\"week\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111205\/week-1.jpg\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>Attacks targeting the Heartbleed vulnerability, <a href=\"https:\/\/threatpost.com\/difficulty-of-detecting-openssl-heartbleed-attacks-adds-to-problem\/105354\" target=\"_blank\" rel=\"noopener nofollow\">which is reportedly pretty easy to exploit and very difficult to detect<\/a>, could have dire consequences for everyday Internet users. A successful exploit of the bug could expose private certificate keys, username and password combinations, and a variety of other sensitive data.<\/p>\n<p>Heartbleed hit the news earlier this week after OpenSSL announced that it had provided a fix for the vulnerability. Since then, <a href=\"https:\/\/threatpost.com\/seriousness-of-openssl-heartbleed-bug-sets-in\/105309\" target=\"_blank\" rel=\"noopener nofollow\">the seriousness of Heartbleed has settled in<\/a>, and it\u2019s pretty much the only thing anyone in the security industry has talked, heard, or read about. Considering <a href=\"https:\/\/threatpost.com\/what-have-we-learned-openssl-heartbleed-bug\/105385\" target=\"_blank\" rel=\"noopener nofollow\">what we know about Heartbleed<\/a>, you\u2019re probably going to want to do a bit of <a href=\"https:\/\/www.kaspersky.com\/blog\/spring-clean-mobile\/\" target=\"_blank\" rel=\"noopener nofollow\">digital spring cleaning<\/a> \u2013 particularly in regards to your passwords. You should definitely read the <a href=\"https:\/\/www.kaspersky.com\/blog\/heartbleed-howto\/\" target=\"_blank\" rel=\"noopener nofollow\">Heartbleed walkthrough<\/a> we published on the Kaspersky Daily yesterday morning. It provides a pretty straightforward explanation of what is \u2013 in fact \u2013 an incredibly complicated problem. It also has tips on who is or was vulnerable and how to proceed from there.<\/p>\n<div class=\"pullquote\">Headlines dominated by just two stories this week: a seriously widespread crypto bug known as Heartbleed and Microsoft\u2019s end of security support for Windows XP<\/div>\n<p>The list of websites affected by Heartbleed is long and ever-changing, and you can use <a href=\"http:\/\/filippo.io\/Heartbleed\/\" target=\"_blank\" rel=\"noopener nofollow\">this tool<\/a> to check individual sites. Beyond that, it\u2019s now become clear that a number of online gaming platforms \u2013 Nintendo, <i>Call of Duty<\/i>, and <i>League of Legends<\/i> among them \u2013 were at some point afflicted with the Heartbleed and are now urging customers to change passwords immediately. <a href=\"https:\/\/www.digitaltrends.com\/computing\/heres-a-list-of-websites-allegedly-affected-by-the-heartbleed-bug\/\" target=\"_blank\" rel=\"noopener nofollow\">You can find a list here at Digital Trends<\/a>.<\/p>\n<p>If you find all this crypto stuff interesting (or are incredibly confused about what encryption is and how it works), then go ahead and read our <a href=\"https:\/\/www.kaspersky.com\/blog\/the-wonders-of-hashing\/\" target=\"_blank\" rel=\"noopener nofollow\">explainer on cryptographic hash functions<\/a>. It\u2019s not directly related to the OpenSSL situation, but it can\u2019t hurt to expand that crypto-vocabulary from time to time.<\/p>\n<p><b>The End of an Era <\/b><\/p>\n<p>If you had asked <a href=\"https:\/\/www.kaspersky.com\/blog\/a-week-in-the-news-april-1\/\" target=\"_blank\" rel=\"noopener nofollow\">last week<\/a> what this week was going to be all about, I would have told you it was going to be a Windows XP exclusive affair. Tuesday, April 8, 2014, marked the very last time Microsoft would issue public security fixes for its more-than-12-year-old Windows XP operating system. It\u2019s long been known that the April 2014 edition of Patch Tuesday would be the last in which Microsoft issued fixes for XP.<\/p>\n<p>Problematically, XP is still a dominant operating system. You see it on the computers at doctors\u2019 offices and hospitals and on the payment interfaces of point-of-sale terminals and ATMs; it is the underlying operating system for an unknown number of embedded devices, and it may even be the operating system you personally rely on every day. All told, I have read estimates of the operating system\u2019s overall market-share ranging from <a href=\"http:\/\/www.securelist.com\/en\/blog\/208213056\/End_of_the_line_for_Windows_XP\" target=\"_blank\" rel=\"noopener nofollow\">18 percent<\/a> to <a href=\"http:\/\/www.netmarketshare.com\/operating-system-market-share.aspx?qprid=10&amp;qpcustomd=0\" target=\"_blank\" rel=\"noopener nofollow\">28 percent<\/a>. Let there be no illusion, Windows XP isn\u2019t going anywhere. The end of support merely means that any new vulnerability found in the operating system will never get patched.<\/p>\n<p>For a full run-down on what this all means, you can read this brief look at the <a href=\"https:\/\/www.kaspersky.com\/blog\/xp-eos-8apr-3\/\" target=\"_blank\" rel=\"noopener nofollow\">history and future of Windows XP<\/a>, which was at one time the world\u2019s most ubiquitous operating system.<\/p>\n<p><b>In other News<\/b><\/p>\n<p>It got buried a bit, but Google made what seems to be a fairly strong, user-security-first move this week. The company bolstered security on its mobile Android operating system with a feature that will <a href=\"https:\/\/threatpost.com\/google-adds-continuous-monitoring-of-android-apps\/105391\" target=\"_blank\" rel=\"noopener nofollow\">continually monitor apps<\/a> on user-devices to make sure they aren\u2019t acting maliciously or exceeding permission with unwanted actions.<\/p>\n<p>The existing systems, known as Bouncer and Verify Apps, scan Google\u2019s Play Store and warn users if there\u2019s a potential problem with an app they\u2019re installing. In some cases, Google will block the installation of those apps outright. The new feature goes a step further, monitoring already-installed applications to safeguard against developers who will sometimes send updates to installed apps, adding malicious or otherwise unwanted functionalities. Altogether, these measures are designed to curb the growing problem of malicious Android applications making their way into the Google Play store.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Headlines dominated by just two stories this week: a seriously widespread crypto bug known as Heartbleed and Microsoft\u2019s end of security support for Windows XP<\/p>\n","protected":false},"author":42,"featured_media":3188,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[561,261,558,570,445,569],"class_list":{"0":"post-3187","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-crypto","9":"tag-encryption","10":"tag-heartbleed","11":"tag-patch-tuesday","12":"tag-security-news","13":"tag-windows-xp"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/heartbleed-and-windows-xp\/3187\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/heartbleed-and-windows-xp\/3306\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/heartbleed-and-windows-xp\/3607\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/heartbleed-and-windows-xp\/3641\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/heartbleed-and-windows-xp\/3673\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/heartbleed-and-windows-xp\/4453\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/heartbleed-and-windows-xp\/3285\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/heartbleed-and-windows-xp\/3673\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/heartbleed-and-windows-xp\/4453\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/heartbleed-and-windows-xp\/4453\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/crypto\/","name":"crypto"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3187"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3187\/revisions"}],"predecessor-version":[{"id":15754,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3187\/revisions\/15754"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3188"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}