2014-04-10: 20:37 UTC     Statement on Heartbleed

The older OpenSSL version we use for our production services isn't vulnerable to the Heartbleed bug, and so no customer data could have been captured from our systems using this exploit.

You can test our vulnerability to Heartbleed by using this tool:

http://filippo.io/Heartbleed/ (Try mail.mxes.net, smtp.mxes.net webmail.tuffmail.net)

2014-04-09: 05:00 UTC     New *.mxes.net Certificate

A new RapidSSL certificate was installed for mxes.net websites and SMTP/IMAP/POP3/LDAP/MANAGESIEVE services.

Certificate fingerprints:
SHA1: 6F:F0:30:B6:31:6B:61:8E:2B:5F:F7:8F:B6:3F:73:D5:B8:5B:18:B3
MD5: 84:12:EF:B3:22:C1:A4:B0:1C:B3:3C:EA:CA:CE:33:CE

Page delivered in 0.02753 seconds, 40 files included