Steven B. Roosa is a Partner in our New York office.

We mentioned in our  prior post the potential legal issues that The Heartbleed Bug will create from the standpoint of data breach and safe harbor, especially given the prospect of compromised keys. A number of people, however, have asked how the vulnerability works from a practical standpoint. We caught up with Jesper Jurcenoks from Critical Watch on Twitter, and JJ had this excellent graphical depiction of Heartbleed that he has graciously allowed us to share here:

For more technical details regarding the vulnerability, including a list of products, footnotes and a video, Jesper and Critical Watch have some other excellent materials.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.