People across the world are in fear of the deadly Heartbleed Bug that has affected millions of Internet users. However, people who use Internet over their smartphones are still seem to be clueless about how to protect their devices and their accounts on the websites vulnerable to the bug.
Millions of Android users out there are facing the risk of compromising their crucial security code as the devices running on a particular version of Google-made Android firmware.
According to a recent updated post on Google’s blog, all the versions of Android are not affected by the Heartbleed bug but smartphones and tablets running Android 4.1.1 Jelly Bean, which relies on the vulnerable version of OpenSSL, are under the threat.
Google has promised a patch for the affected versions of the Android (Android 4.1.1 and Android 4.1.2) but the bug fix related information will be sent directly to the smartphone and tablet users.
“All versions of Android are immune to CVE-2014-0160 (with the limited exception of Android 4.1.1; patching information for Android 4.1.1 is being distributed to Android partners),” Google said in the post.
Apart from Android, Google has talked about its other services such as Search, Gmail, YouTube, Wallet, Play, Apps, and App Engine.
The search giant claims to be working on developing patches for its different services such as Cloud SQL, Google Compute Engine and Google Search Appliance (GSA).
Google has also encouraged the users of its services to report the bugs like Heartbleed so it can work and find a patch before these kind of vulnerabilities are exploited by the hackers.
“We’ve assessed this vulnerability and applied patches to key Google services such as Search, Gmail, YouTube, Wallet, Play, Apps, and App Engine. Google Chrome and Chrome OS are not affected. We are still working to patch some other Google services. We regularly and proactively look for vulnerabilities like this — and encourage others to report them — so that that we can fix software flaws before they are exploited,” Google added in the post.