DROWN ATTACK — MORE THAN 11 MILLION OPENSSL HTTPS WEBSITES AT RISK

test

DROWN ATTACK — MORE THAN 11 MILLION OPENSSL HTTPS WEBSITES AT RISK

A new security vulnerability has been found in OpenSSL that affects more than 11 million websites and e-mail services.

 

Known as DROWN, this critical security hole in OpenSSL was disclosed today as a low-cost attack that could decrypt your secure HTTPS communications.

 

How do I know if I’m protected?

You can find out whether your website is vulnerable to this OpenSSL security breach using the DROWN ATTACK TEST SITE
Luckily, an OpenSSL security patch has been released today that will fix the issue.
The DROWN attack is relativley simple to exploit and takes under a minute to do and now that the vulnerability is in the public domain, it may be actively targeted by hackers.

 

What do I do if I’m vulnerable?

If you’d like some advice on the best way forward, get in touch with one of our server technicians. Drop us an e-mail at hello@d3.io and we’ll get back to you asap.

Stay safe.