Last night our development team patched our systems to protect against Heartbleed.
We have been following developments related to this bug very closely.
Hi, without compromising your security protocols, can you elaborate on what steps were taken to patch your systems and why you are still using an SSL Server Certificate Issued On: 29/05/2013? Your Canadian competitor VoS renewed theirs a couple of days ago.
Here is a statement from our lead developer:
CAVirtEx has been following the heartbleed vulnerability closely. Our systems were patched on April 7th, the day the vulnerability was publicly announced. Our new SSL cert was installed early today to ensure future communication remain secure.
Due to the nature of the vulnerability and like most services that were using OpenSSL, secrets such as passwords may have been exposed. While it's unlikely anything has been leaked, customers should consider changing their passwords and clearing browser cookies to reissue browser verification.