PayPal also posted a blog advising users that there was no need to take additional action or change passwords.
"While we always advise our customers to be cautious and aware of the security of their personal and financial information, in this case we want to reassure you there is no need to be unduly concerned. When you login to PayPal using your user name and password these details were not exposed to the OpenSSL vulnerability," the company stated.
CTO of 3dcart, Jimmy Rodriguez says that the best thing merchants can do to protect their online store from the Heartbleed bug is to ensure that their eCommerce solution provider is PCI compliant.
"Any merchant using open source shopping carts like OS Commerce and Magento can be at risk because even though the software itself may not be a problem, the hosting environment itself could be responsible for causing the security breach,” said Rodriguez.
"Part of being a PCI compliant hosting provider includes making sure that the operating system software is constantly updated, and that someone at the organization is constantly on the lookout for new security updates, as new ones appear on a regular basis. While companies will constantly test their software, and release patches, the hosting environment itself needs to be constantly monitored as well."
"What's Hot" is aggregated content. PYMNTS.com claims no responsibility for the accuracy of the content published by the original source.