Friday, July 13, 2012

Water... Campus Cultural (Venice of the Valley) in Need of Canals and Waterways



This riverfront property located on the beautiful island of Dominica, ...
480 × 320 - 57 k - jpg
waterfrontrealestatepr...

23 acres of Riverfront Propertylocated in the Cayo District
800 × 572 - 112 k - jpg
belizemadinvestments.com

OTTAWA, IL Waterfront Property ...
480 × 319 - 33 k
lakehomesusa.com

Calypso Bay Riverfront Property. If you are buying Brisbane Property, ...
712 × 448 - 85 k - jpg
calypso-bay.com

Riverfront Property For Sale- Elevator Included
589 × 442 - 60 k - jpg
archives.buffalorising...

keystone lake river creekwaterfront property for sale
1504 × 1000 - 1121 k - jpg
luckymountainhome.com

Amazing Riverfront Property in Coorg for Sale - Real Estate
625 × 417 - 69 k - jpg
mysore.olx.in

Waterfront Properties
195 × 125 - 17 k - gif
45thparallelrealty.net

Premium Riverfront Property
400 × 300 - 37 k - jpg
landandfarm.com

View Northern MichiganRiverfront Property Listings
150 × 150 - 57 k - jpg
kencarlsonrealty.com

Durango Colorado - Vallecito Lake - Riverfront Property
480 × 360 - 19 k - jpg
article.wn.com

Riverfront Property. Riverfront Property. As you awake to the birds chirping ...
350 × 263 - 54 k - jpg
broadriverhighlands.com

87 Acres Of Riverfront Property. XXX Mayberry Rd, Centralia, ...
1024 × 768 - 93 k - jpg
landandfarm.com

Premium Riverfront Property
400 × 300 - 27 k - jpg
landandfarm.com

Elk roam the riverfront property
400 × 300 - 62 k - 12
vrbo.com

Here is nice BUILDABLERIVERFRONT PROPERTY. 136 Branlander Rd, Morton, ...
480 × 360 - 59 k - jpg
landandfarm.com

... the beautiful hawkesbury riverthis riverfront property is located in one ...
800 × 535 - 52 k - jpg
property.mitula.com.au

Waterfront Properties for Sale Florida - Kibler Ranch is for Sale!
480 × 360 - 19 k - jpg
article.wn.com

2170 E Gossamer Ln Boise Luxury Estate, 4.08 Acres ofRiverfront Property, ...
560 × 372 - 51 k - jpg
frontstreetbrokers.com

Costa Rica, real-estate:LargeRiverfront Property in Osa Peninsula: section ...
520 × 390 - 33 k
pics.classifieds1000.com

More FIX on the NET @ FIX University Cultural Campus

Welcome to Spring Semester 2013

Fernando IX University
Locations of visitors to this page
Fernando IX University

The Best College Radio Stations


Click here to find out more!
Click here to find out more!
0
0
0
Submit
0
Click here to find out more!
News

Yahoo fixes password-pilfering bug, explains who's at risk

Security experts continue to hammer Yahoo for storing usernames and passwords in plain text

July 13, 2012 04:09 PM ET

Computerworld - Yahoo today said it has fixed the flaw that allowed hackers to steal more than 450,000 passwords from one of its many services.

The company also provided more information about whose passwords had been pilfered.

"We have...now fixed this vulnerability, deployed additional security measures for affected Yahoo! users, enhanced our underlying security controls and are in the process of notifying affected users," the company announced in a post to its blog early Friday.

Yahoo has offered no specific information about the attack, how it was carried out or even when. It confirmed the attack Thursday.

The hacker group D33Ds Company took responsibility for the breach, saying it had exploited a basic SQL injection vulnerability in a Yahoo service to steal the usernames and passwords associated with 453,000 accounts. The grouppublished the passwords and email addresses on the Web.

Yahoo also confirmed that the stolen account credentials belonged to registered users of its Yahoo Contributor Network, which was previously known as Associated Content.

Yahoo Contributor Network is a platform that generates high-volume, low-cost content by letting writers photographers, and others share their work with Yahoo members and earn money based on the traffic their content generates. Users who contribute to the network are required to sign in using a Yahoo, Google or Facebook ID.

Associated Content, which was founded in 2005, was bought by Yahoo for just over $100 million in May 2010. Yahoo renamed the service in late 2011, when it also launched Yahoo Voices, a portal where users access content posted by the Yahoo Contributor Network.

According to Yahoo, only people who registered as providers with Associated Content before the 2010 acquisition were affected by the password theft. "[The] compromised file was a standalone file that was not used to grant access to Yahoo! systems and services," Yahoo maintained.

Just under a third of the stolen passwords were linked to accounts registered to a yahoo.com email address, security company Rapid7 said Thursday. Significant chunks of the file, however, were composed of Gmail (23.6% of all accounts) and Hotmail (12.2%) addresses.

All users with older Associated Content accounts, no matter the email address used, should immediately change the passwords for those email accounts as well as any identical or similar passwords used to secure other online services or websites, security experts have said.

Rapid7 security researcher Marcus Carey said yesterday that the file published by D33Ds included 123 government email accounts -- ones ending with ".gov" -- and 235 military-related addresses (ending with ".mil"). Among the government email accounts, Carey found several associated with the FBI, the Transportation Security Administration (TSA) and the Department of Homeland Security (DHS).

Security experts have been scathing in their criticism of Yahoo, in large part because the passwords were stored in plain-text, making the hackers' job of exploiting the stolen accounts a breeze.

Yesterday, Mark Bower, a data protection expert and executive at Voltage Security, said, "It's utter negligence to store passwords in the clear."

Also on Thursday, Rob Rachwald, director of security strategy at Imperva, took Yahoo to the woodshed. "To add insult to injury, the passwords were stored in clear text and not hashed (encoded)," Rachwald wrote in a blog post. "One would think the recent LinkedIn breach would have encouraged change, but no. Rather, this episode will only inspire hackers worldwide."

The LinkedIn breach Rachwald referenced came to light last month, and involved approximately 6.5 million encrypted passwords belonging to members of the networking service.

In its Friday blog, Yahoo again apologized to users affected by the password theft.

covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at Twitter @gkeizer, on Google+ or subscribe to Gregg's RSS feed Keizer RSS. His email address is gkeizer@computerworld.com.

See more by Gregg Keizer on Computerworld.com.

Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.



Additional Resources
Security KnowledgeVault
WHITE PAPER
Security is not an option. This KnowledgeVault Series offers professional advice how to be proactive in the fight against cybercrimes and multi-layered security threats; how to adopt a holistic approach to protecting and managing data; and how to hire a qualified security assessor. Make security your Number 1 priority.

Read now.

Cut Communications Costs Once and for All
WHITE PAPER
New IP-based communications systems are being deployed by small and midsized businesses at a rapid rate. Learn how these organizations are enabling faster responsiveness, creating better customer experiences, speeding office or mobile interactions, and dramatically reducing existing communications costs.

Read now.

Comments powered by Our Commenting Network | Policies | Privacy

Add New Comment

Showing 0 comments

    Reactions

    Click here to find out more!
    Cybercrime and Hacking White Papers
    Creating Unified IT Monitoring and Management in Your Environment
    At the very start of the IT industry, "monitoring" meant having a guy wander around inside the mainframe looking for burnt¿out vacuum tubes.
    Configuration, Not Coding How Nimsoft Service Desk Speeds Deployment and Time to Value
    For years, many support teams have been hamstrung by their traditional service desk platforms, which require complex, time-consuming coding for virtually every aspect...
    Virtual Certainty: Best Practices for Gaining Monitoring Clarity in VMware Environments
    This white paper reveals the best monitoring practices to employ in virtualized environments-best practices that are essential in enabling organizations to overcome their...
    Strategies for Assessing Cloud Security
    Read this white paper to learn about the security issues you need to consider and how IBM assessment services and guidelines for securing...
    Taming the data demons: leveraging information in the age of risk
    This white paper explores the framework and advantages of a holistic approach to data risk management, and provides both IT and line-of-business executives...
    All Cybercrime and Hacking White Papers
    Cybercrime and Hacking Webcasts
    Enabling your service desk to be the front face to IT
    Your service desk should be the one stop shop for internal and external customers. But, in order for IT to be the orchestrator...
    Configure, Don't Customize Your Service Desk
    Join Pink Elephant Analyst George Spalding and Nimsoft Service Desk expert Tim Rochte to learn the perils of customizing your service desk and...
    Customer Video: Oracle Database Applianec Exceeds Expecations at CallSource
    CallSource, Inc. develops and markets call tracking and recording software products that allow companies to measure phone lead and advertising effectiveness. CallSource delivers...
    Banking on the Mainframe
    Date/Time: Wednesday, July 11th at 12:00pm ET

    This presentation will look at banking application issues and provide examples on how banks and financial market...
    Enterprise Mobile Computing: BlackBerry PlayBook tablet 2.0
    Get the details on how BlackBerry® Mobile Fusion can make managing mobile devices faster, easier and more organized than ever with the ability...
    All Cybercrime and Hacking Webcasts
    Newsletter Sign-Up

    Receive the latest news test, reviews and trends on your favorite technology topics

    1. View all newsletters | Privacy Policy
    Click here to find out more!
    Click here to find out more!

    1 comment:

    Followers

    Blog Archive