Our Response to the Heartbleed bug
The engineering team at TrafficWave.net has been working to assess the impact for our customers in the wake of April 7th’s disclosure of CVE-2014-0160, known colloquially as Heartbleed.
We join nearly every service provider on the Internet responding to this critical vulnerability in OpenSSL’s handling of heartbeat packets and conducted a comprehensive security review in response. We also believe it’s important to let you know what we know, what you need to do and where you can find additional help from us.
We consider ourselves fortunate that our servers were not affected by this bug, and TrafficWave.net user credentials or account credentials were never compromised. However, the Heartbleed bug has had a profound impact on the transmission of secure data throughout the Internet. It is for that reason that we are encouraging all of our customers to reset their member area password and review their account details at the earliest convenience as a matter of common password maintenance. Please remember to always make your passwords unique, random, and periodically rotate them.
We hope this answers your questions about the impact of CVE-2014-0160 on your TrafficWave.net account. Feel free to contact our Customer Support team with follow up questions.
TrafficWave.net Engineering Team