4.3 • 720 Ratings
🗓️ 14 April 2014
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | This is Steva Robbins. Welcome to the Get It Done Guys quick and dirty tips to work less and do more. |
| 0:09.0 | You've probably heard about the heart bleed internet bug everywhere, and if you haven't done anything |
| 0:13.8 | about it yet, today's episode will give you the full scoop. We always thought that the zombie |
| 0:19.4 | apocalypse would come from outside. We were wrong. |
| 0:23.2 | Apparently, it's been with us the whole time. We were infiltrated from within. |
| 0:28.6 | The heartbleed bug is a problem in the way that websites handle security. When you connect to a |
| 0:33.3 | secure website, you can see a little lock icon on your web browser. That means your connection |
| 0:38.8 | is secure, and you can feel safe and sound. Ha ha, fooled you. Thanks to Heartbleed, it turns |
| 0:45.4 | out that for the last two years, all the little lock icon has meant is that your browser |
| 0:49.2 | thinks of it's secure. It's kind of like hiding under your blanket to escape monsters. You may feel safe, |
| 0:54.9 | but the blanket just makes it easier for the monster to pick you up and eat you like some |
| 0:58.4 | sort of delectable flannel burrito. The Hartley problem happens at the website end. For the last |
| 1:04.6 | two years, the program that makes some websites secure has had a teensy-weensy little bug that |
| 1:09.9 | allowed nefarious shadowy figures to peek |
| 1:11.9 | into the website's memory. Who cares, you say? What could a website possibly have to hide anyway? |
| 1:18.3 | Well, the username and password you just use to log into the site might be in the website's memory. |
| 1:23.2 | Made any purchases lately? The credit card number might also be there. Phone numbers, birth dates, |
| 1:28.5 | clothing sizes, real clothing sizes, not just the ones you've been telling your friends. In short, |
| 1:33.7 | everything the website was dealing with could have been stolen. Even better for the criminals is that |
| 1:39.0 | it's undetectable. There's no way to know if a site was actually affected and if it was what |
| 1:43.9 | information was exposed. |
| 1:45.4 | The safest course of action is to assume that anything you typed into a website during the last |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Macmillan Holdings, LLC, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Macmillan Holdings, LLC and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.