[TABLE='width: 100%, align: right']
[tr][/tr]
[tr]
[/tr][tr][td][/td][/tr]
[tr][td]Please login to see this attachment.[/td][/tr]
[tr]
[/tr][tr][td][/td][/tr]
[td][tr]As many of you will now be aware, news of the recent HeartBleed bug has rocked the Internet, sparking fears about safety of data over secure SSL (https) web connections (normal http pages are not affected by this issue).[/tr][/td]
[td][tr]
[/tr][/td]
[td][tr]The bug relates to a recently revealed flaw in OpenSSL, a commonly used cryptography system to gain access to data which is supposed to be inaccessible on a web server, namely the security certificates used to ensure that connections over http are protected from eavesdropping. The flaw potentially allowed hackers to gain access to sensitive user and server data, including user names, email addresses and passwords.[/tr][/td]
[td][tr]
[/tr][/td]
[td][tr]Thankfully, there is no evidence that this happened on the Clickteam servers. We have patched our systems to protect against this attack which you can verify here: Please login to see this link.[/tr][/td]
[td][tr]
[/tr][/td]
[td][tr]The general advice being given globally is that users should take the precaution of changing their passwords for any secured services, once the website has updated their systems and certificates. We have done both things so if you wish to follow this advice, please proceed. If you used the same password in other places, it is recommended that you also update it there too.[/tr][/td]
[td][tr]
[/tr][/td]
[tr][td]You can find more information about the Heartbleed bug here Please login to see this link.
[/td][/tr]
[tr]
[/tr]
[/TABLE]