The Heartbleed Bug shakes the foundation of internet security. Fortunately labfolder has always been safe and our users are therefore not affected by the bug. Nonetheless you should be careful and probably change your password anyway!
With the publication of the Heartbleed Bug a few days ago, it became clear that the Open SSL library, a popular open source tool used by many developers and websites, was compromised over years. The bug allowed hackers to read from the memory of the systems which were supposed to be protected by a SSL/TLS encryption, allowing intruders to get access to encrypted communication and data and to digital identities protected by a private key.
The good news first: Your data, your username and your password on labfolder are as safe as ever. The Heartbleed bug affected OpenSSL versions 1.0.1 through 1.0.1f, which have never been used in labfolder. Your user-password combination for labfolder was thus not affected by Heartbleed during the entire lifecycle of the labfolder service.
Since OpenSSL is widespread and used in a lot of web application and software, it cannot excluded that one of the services you were using was potentially compromised. A number of highly prominent services like Google, Facebook, Dropbox and Yahoo reported to have fixed the Heartbleed bug, but since the vulnerability was out for more than two years, a password change is strongly recommended for those services. To make sure your data was not put at risk due to Heartbleed, you might want to contact the providers of other web services that you use frequently and check with them whether they have been using OpenSSL in the compromised versions. If you are using the same user-password-combination for labfolder and other services (which we do not recommend), it might be a good idea to change your labfolder password now.
In the internet, it´s just like in the lab: stay safe by being aware and knowing what you are doing. Inform yourself if you are in doubt, websites like heartbleed.com give answers to the most pressing questions. If you have any further questions, do not hesitate to contact us