Kanguru Security Products Unaffected by Heartbleed Bug


Wednesday, April 9, 2014


Security researchers have announced a vulnerability in the Open Source "OpenSSL" Cryptographic Library for the internet. OpenSSL is the data encrypted backbone of the web that provides a secure line for sending email, chatting, and for a majority of website transmissions and is indicated by the closed padlock and "s" in the "https" in the URL window. The Heartbleed bug could have potentially exposed information of internet users everywhere even if the padlock is closed. This has a lot of people worried, wondering if their information online has been secure.


How Bad Is It?


"It's really bad," says Business Insider's Kyle Russell, "Web servers keep a lot of information in their active memory, including usernames, passwords, and even the content that users have uploaded to a service..."


According to Russell, people may have been vulnerable for two years now and not even realized it. This weakness can essentially allow attackers to gain access to highly sensitive data including credit card numbers, usernames, passwords and other sensitive data when cast across the internet.


Does This Affect Kanguru's Security Products?


No. Kanguru's Executive Vice President, Nate Cote, released a statement today to customers and partners reassuring them that Kanguru's Security Products are unaffected.


"Valued Customers and Partners, As you may have seen in the news over the past 24 hours, a vulnerability in certain versions of the commonly used Open Source “OpenSSL” cryptographic library has been uncovered. After researching the affected versions, Kanguru’s implementation of products which use the OpenSSL libraries are NOT AFFECTED."


The threat of the Heartbleed Bug to internet users en masse is serious however, and everyone should make an effort to protect their data. Since this threat has largely remained undiscovered for more than two years, personal information could have potentially been exploited directly or indirectly without an individuals' knowledge. Though there is no specific incident that can point to the heartbleed bug as being used to compromise sensitive information, the internet vulnerability leaves no trace if a hacker were to use it.


So how can you protect yourself? Kyle Russell states, "...assume that your accounts may be compromised." One can start by changing all online passwords to bank accounts, online investment sites, shopping carts and other information where personal data could be vulnerable.


Software vendors, operating system vendors and service providers have already started implementing fixes before the announcement was made by security researchers yesterday, but it may take some time before the vulnerability is fully closed and secured.


For more information and a brief overview about the Heartbleed Bug, visit


Written by Kanguru Solutions — April 15, 2014

Kanguru Adds to its Robust, Hardware Encrypted USB Flash Drives with the New Defender Elite200

Kanguru has added a new military-grade, hardware encrypted USB secure flash drive to its arsenal. The Defender Elite200™ joins the secure Kanguru Defender line for protecting the sensitive information of any portable data workforce.


Written by Don Wright — March 04, 2014

How does your local council protect sensitive information?


With changes to statutory Privacy Principles, local government must ensure personal information collected in the course of its operations is protected from misuse, modification, unauthorised access and disclosure.


How to achieve this in a technological landscape geared towards flexibility, without sacrificing convenience, is of critical importance.  


A secure USB offers councils an easy-to-use, affordable solution to the issue at hand. The ability to store large amounts of data in a portable device provides efficiencies when staff are either in transit or remotely located; and its security prevents data breaches should the information be lost or stolen.    


Whilst there are many USBs offering various levels of security, the Kanguru range of 256-bit AES hardware encrypted flash drives is at the frontier of innovation and compliance. In particular, they can be remotely managed so council administrators have the ability to disable or delete jeopardised information, manage the strength and complexity of users' passwords, locate devices via IP addresses and audit drive activity.   


Level 3 FIPS 140-2 certified and in the process of Common Criteria EAL 2+ approval, the Defender 2000 will assist you, as a local government, to take responsibility and protect your data and your people. 

Written by Bellridge Pty Ltd — February 10, 2014

Another Hospital Loses an Unsecured Flash Drive Containing Personal Patient Data


In this day and age of affordable, highly secure USB drives, remote management of portable USB devices, strict HIPAA regulations, and stiff fines placed in unsecured data, one would think that their personal healthcare information is safe. But some healthcare facilities may still be operating with wild abandon - and could be well on their way to a costly data breach.



Written by Kanguru Solutions — February 05, 2014
Designed and Developed By Media3