Amazon And PayPal Users Accounts Unaffected By Heartbleed Bug

PayPal also posted a blog advising users that there was no need to take additional action or change passwords.

    Get the Full Story

    Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required.

    yesSubscribe to our daily newsletter, PYMNTS Today.

    By completing this form, you agree to receive marketing communications from PYMNTS and to the sharing of your information with our sponsor, if applicable, in accordance with our Privacy Policy and Terms and Conditions.

    “While we always advise our customers to be cautious and aware of the security of their personal and financial information, in this case we want to reassure you there is no need to be unduly concerned. When you login to PayPal using your user name and password these details were not exposed to the OpenSSL vulnerability,” the company stated.

    CTO of 3dcart, Jimmy Rodriguez says that the best thing merchants can do to protect their online store from the Heartbleed bug is to ensure that their eCommerce solution provider is PCI compliant.
    “Any merchant using open source shopping carts like OS Commerce and Magento can be at risk because even though the software itself may not be a problem, the hosting environment itself could be responsible for causing the security breach,” said Rodriguez.

    “Part of being a PCI compliant hosting provider includes making sure that the operating system software is constantly updated, and that someone at the organization is constantly on the lookout for new security updates, as new ones appear on a regular basis. While companies will constantly test their software, and release patches, the hosting environment itself needs to be constantly monitored as well.”

    “What’s Hot” is aggregated content. PYMNTS.com claims no responsibility for the accuracy of the content published by the original source.