So, it turns out that there's a pretty serious vulnerability in OpenSSL, and a large section of the web is affected. Until this morning, so was TR.
We've updated the version of OpenSSL running on TR to address the problem. According to the Heartbleed test, we are no longer vulnerable.
However, if you have an account here, we strongly recommend updating your password. We cannot guarantee that some user passwords haven't been sniffed. If you use the same password on another site, it may be a good idea to change it there, too—so long as that other site doesn't fail the Heartbleed test.
Credit card information for subscribers was not compromised. That information never traveled through our servers, nor was it ever stored there. All credit card information for TR subscriptions was and will continue to be handled solely by our payment processor, Stripe. When we offer to "save" your credit card information, we're simply saving a reference to the card in Stripe's database.
|1. BIF - $340||2. chasp_0 - $251||3. mbutrovich - $250|
|4. Ryu Connor - $250||5. YetAnotherGeek2 - $200||6. aeassa - $175|
|7. dashbarron - $150||8. Lucky Jack Aubrey - $100||9. Captain Ned - $100|
|10. Anonymous Gerbil - $100|
|Nvidia's GeForce GTX 1080 graphics card reviewed||171|
|Color TV Day Shortbread||44|
|Oculus removes hardware check DRM from Rift exclusives||13|
|Only one month to go before the "second-10th" TR BBQ||7|
|Deals of the week: an affordable Core i7-6700K and gaming gear||19|
|3DMark is getting a full-featured DirectX 12 benchmark||29|
|Swim-a-Lap Day Shortbread||18|
|Steam Summer Picnic sale is all about tasty games||42|
|Corsair Vengeance LED DIMMs are serious about color coordination||22|