Not sure anyone here cares, but in case you do, this site has been doubly tested and is not vulnerable to the Heartbleed exploit plaguing the internet.
Server administrators have to first check if they're using the effected software, patch the hole if it's there, and then regenerate their SSL certificates (because the encryption key might be one of the things that could've been stolen). Until they regenerate their key, DON'T go changing your password. It'd be pointless. You can check if a site is currently vulnerable to HeartBleed here: https://lastpass.com/heartbleed/
XKCD has a great example of how HeartBleed basically works: