Heartbleed is a recently discovered security flaw that affects millions of web servers.
Heartbleed affects enough servers that you should just change all your web site passwords. It allows theft of the server's security key, your credentials, your session with the web site and cookies that can be used to impersonate you.
Because the security certificates could be stolen, there are some extra steps.
First, apply security updates to all of your devices: computers, laptops, tablets, and phones. Be especially vigilant about making sure web browsers and mail clients have all security updates. Please do this now, I will wait while you apply the updates.
Second, be glad this was Free Software. The software can be studied and security problems can't be ignored or supressed. The bug was announced, the proof was given and the fix was immediately available.
Fourth, for each web site where you have an account either update your password or delete your account. The following task list will help you safely update your accounts.
For each web site you need to check:
Now that you've updated computers and accounts, apply security updates for anything else that is used to log into web sites: TVs, DVRs, printers, cars, etc.
Also change passwords for anything that used a password that had been used for a web site. For instance, if you log into your home or work computer using the same password as you use for a social media site, then change that password as well. This time use different passwords for each of the services.
Thankfully this is Free Software. We have access to the code and proof of the bug. There was no need to wait on a vendor or project to approve us fixing it. Luckly, the OpenSSL project moved quickly to fix the bug, but that wasn't required.
The Free Software nature of the project enabled quick action. The bug was announced on April 7th. A bug fix was available April 7th. New packages were available April 7th. Tools for detecting the bug were available April 7th. 60% of the websites using a flawed version of OpenSSL had been updated by April 9th. That was millions of web sites updated in less than 48 hours.
In contrast, a couple of months ago a bug was found in a proprietary vendor's SSL implementation. The company's mobile product was fixed on a Friday. The desktop and laptop product was not fixed until Tuesday. That means customers were vulnerable and waiting 4+ days for a fix to a known and exploitable security flaw. In that particular case, everyone could have switched to Firefox, a Free Software web browser, rather than waiting :).
Bugs happen, but security flaws need to be immediately acknowledged and fixed! The security code also has to be auditable.
Use a Free Software password manager such as KeePass or KeePassX or you can't have much confidence that the password manager is secure.
May's PLUG meeting will have a presentation about online security, privacy and password management prominently featuring the KeePassX password manager.
xkcd illustrated explanation of Heartbleed
Heartbleed testing tools: Perl Python
Demonstration of hijacking data via Heartbleed
List of sites and whether or not they were vulnerable to Heartbleed
Commentary on the article can be made via Google+.