So, it turns out that there's a pretty serious vulnerability in OpenSSL, and a large section of the web is affected. Until this morning, so was TR.
We've updated the version of OpenSSL running on TR to address the problem. According to the Heartbleed test, we are no longer vulnerable.
However, if you have an account here, we strongly recommend updating your password. We cannot guarantee that some user passwords haven't been sniffed. If you use the same password on another site, it may be a good idea to change it there, too—so long as that other site doesn't fail the Heartbleed test.
Credit card information for subscribers was not compromised. That information never traveled through our servers, nor was it ever stored there. All credit card information for TR subscriptions was and will continue to be handled solely by our payment processor, Stripe. When we offer to "save" your credit card information, we're simply saving a reference to the card in Stripe's database.
|1. Hdfisise - $600||2. Ryszard - $503||3. Andrew Lauritzen - $502|
|4. the - $306||5. SomeOtherGeek - $300||6. Ryu Connor - $250|
|7. doubtful500 - $200||8. Anonymous Gerbil - $150||9. webkido13 - $135|
|10. cygnus1 - $126|
|ASRock serves up a new pair of Kabini embedded mobos||9|
|Hacking Team leak exposes zero-day vulnerability in Flash||1|
|Check out this 18-minute guided tour of No Man's Sky||2|
|Oculus wants to demo the Rift in retail locations||4|
|LG's latest notebook LCDs feature embedded touch sensors||3|
|Samsung Electronics' Q2 guidance shows falling revenues, profits||32|
|AMD issues updated statement on Fury X noise problems||61|
|AMD revises Q2 guidance; gross margin, revenue fall||64|