For the curious, we would like to quickly explain why this particular vulnerability could be a risk across the Internet. The bug — dubbed “Heartbleed” — allows anybody to read the memory on a system that is supposed to be protected by SSL.
An anonymous attacker could potentially steal any information from an SSL-secured communication when the issue is not addressed. Best practices dictate that websites and web service providers should always use SSL-encrypted communication when dealing with sensitive information like usernames, passwords, and bank info. Heartbleed could breach that information to anybody who knows how to extract it without leaving a trace.
Once more, Sprout’s got your back. We’ve ensured our web and mobile applications are not vulnerable, and are safe for you to use. Our security team will continue closely monitoring new vulnerability developments to ensure any issues that may affect Sprout users are quickly addressed.
If you would like more information about Heartbleed, please read the helpful Q&A that’s making the rounds.