More FIX on the NET @ FIX University Cultural Campus
Welcome to Spring Semester 2013
The Best College Radio Stations
Yahoo fixes password-pilfering bug, explains who's at risk
Security experts continue to hammer Yahoo for storing usernames and passwords in plain text
Computerworld - Yahoo today said it has fixed the flaw that allowed hackers to steal more than 450,000 passwords from one of its many services.
The company also provided more information about whose passwords had been pilfered.
"We have...now fixed this vulnerability, deployed additional security measures for affected Yahoo! users, enhanced our underlying security controls and are in the process of notifying affected users," the company announced in a post to its blog early Friday.
Yahoo has offered no specific information about the attack, how it was carried out or even when. It confirmed the attack Thursday.
Data breaches
- Yahoo fixes password-pilfering bug, explains who's at risk
- Hackers publish over 450,000 emails and passwords allegedly stolen from Yahoo
- ATM fraud refunds may not come quickly, if at all
- FTC files lawsuit over data breaches at Wyndham Worldwide
- LulzSec members plead guilty to DDoS attacks on Sony, CIA, others
- Iran targeted by 'massive cyberattack,' official claims
- LinkedIn hit with lawsuit over massive data breach
- UK attorney says US won't extradite LulzSec defendant
- Facebook pushes security tips to all its users
- Hackers claim to steal 110,000 SSNs from Tenn. school system
The hacker group D33Ds Company took responsibility for the breach, saying it had exploited a basic SQL injection vulnerability in a Yahoo service to steal the usernames and passwords associated with 453,000 accounts. The grouppublished the passwords and email addresses on the Web.
Yahoo also confirmed that the stolen account credentials belonged to registered users of its Yahoo Contributor Network, which was previously known as Associated Content.
Yahoo Contributor Network is a platform that generates high-volume, low-cost content by letting writers photographers, and others share their work with Yahoo members and earn money based on the traffic their content generates. Users who contribute to the network are required to sign in using a Yahoo, Google or Facebook ID.
Associated Content, which was founded in 2005, was bought by Yahoo for just over $100 million in May 2010. Yahoo renamed the service in late 2011, when it also launched Yahoo Voices, a portal where users access content posted by the Yahoo Contributor Network.
According to Yahoo, only people who registered as providers with Associated Content before the 2010 acquisition were affected by the password theft. "[The] compromised file was a standalone file that was not used to grant access to Yahoo! systems and services," Yahoo maintained.
Just under a third of the stolen passwords were linked to accounts registered to a yahoo.com email address, security company Rapid7 said Thursday. Significant chunks of the file, however, were composed of Gmail (23.6% of all accounts) and Hotmail (12.2%) addresses.
All users with older Associated Content accounts, no matter the email address used, should immediately change the passwords for those email accounts as well as any identical or similar passwords used to secure other online services or websites, security experts have said.
Rapid7 security researcher Marcus Carey said yesterday that the file published by D33Ds included 123 government email accounts -- ones ending with ".gov" -- and 235 military-related addresses (ending with ".mil"). Among the government email accounts, Carey found several associated with the FBI, the Transportation Security Administration (TSA) and the Department of Homeland Security (DHS).
Security experts have been scathing in their criticism of Yahoo, in large part because the passwords were stored in plain-text, making the hackers' job of exploiting the stolen accounts a breeze.
Yesterday, Mark Bower, a data protection expert and executive at Voltage Security, said, "It's utter negligence to store passwords in the clear."
Also on Thursday, Rob Rachwald, director of security strategy at Imperva, took Yahoo to the woodshed. "To add insult to injury, the passwords were stored in clear text and not hashed (encoded)," Rachwald wrote in a blog post. "One would think the recent LinkedIn breach would have encouraged change, but no. Rather, this episode will only inspire hackers worldwide."
The LinkedIn breach Rachwald referenced came to light last month, and involved approximately 6.5 million encrypted passwords belonging to members of the networking service.
In its Friday blog, Yahoo again apologized to users affected by the password theft.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is gkeizer@computerworld.com.
See more by Gregg Keizer on Computerworld.com.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
FREE Security Resources:
- Excel 2010 Cheat Sheet
- Register for this Computerworld Insider Cheat Sheet and gain access to hundreds of premium content articles, guides, product reviews and more.
- Creating Unified IT Monitoring and Management in Your Environment
- At the very start of the IT industry, "monitoring" meant having a guy wander around inside the mainframe looking for burnt¿out vacuum tubes.
- Configuration, Not Coding How Nimsoft Service Desk Speeds Deployment and Time to Value
- For years, many support teams have been hamstrung by their traditional service desk platforms, which require complex, time-consuming coding for virtually every aspect...
- Virtual Certainty: Best Practices for Gaining Monitoring Clarity in VMware Environments
- This white paper reveals the best monitoring practices to employ in virtualized environments-best practices that are essential in enabling organizations to overcome their...
- Strategies for Assessing Cloud Security
- Read this white paper to learn about the security issues you need to consider and how IBM assessment services and guidelines for securing...
- Taming the data demons: leveraging information in the age of risk
- This white paper explores the framework and advantages of a holistic approach to data risk management, and provides both IT and line-of-business executives... All Cybercrime and Hacking White Papers
- Enabling your service desk to be the front face to IT
- Your service desk should be the one stop shop for internal and external customers. But, in order for IT to be the orchestrator...
- Configure, Don't Customize Your Service Desk
- Join Pink Elephant Analyst George Spalding and Nimsoft Service Desk expert Tim Rochte to learn the perils of customizing your service desk and...
- Customer Video: Oracle Database Applianec Exceeds Expecations at CallSource
- CallSource, Inc. develops and markets call tracking and recording software products that allow companies to measure phone lead and advertising effectiveness. CallSource delivers...
- Banking on the Mainframe
- Date/Time: Wednesday, July 11th at 12:00pm ET
This presentation will look at banking application issues and provide examples on how banks and financial market... - Enterprise Mobile Computing: BlackBerry PlayBook tablet 2.0
- Get the details on how BlackBerry® Mobile Fusion can make managing mobile devices faster, easier and more organized than ever with the ability... All Cybercrime and Hacking Webcasts
- Creating Unified IT Monitoring and Management in Your Environment
- Virtual Certainty: Best Practices for Gaining Monitoring Clarity in VMware Environments
- Taming the data demons: leveraging information in the age of risk
- How Midsize Banks Can Overcome Escalating Security Threats
- How much security do you really need?
- IBM WebSphere Cast Iron Cloud integration: Integrate Microsoft Dynamics in days
- Maximizing enterprise resource planning ROI: A guide for midsize companies
- Microsoft Dynamics AX solutions from IBM: Powerful, agile and simple enterprise resource planning
- Migrate to Red Hat Enterprise Linux: Lower the Total Cost of Ownership
- Time Savings and Ease of Deployment Comparison Study - Database Appliance vs Microsoft SQL Server
- Configuration, Not Coding How Nimsoft Service Desk Speeds Deployment and Time to Value
- Strategies for Assessing Cloud Security
- Security Strategy Roadmap for Cloud Computing
- Security Challenges and Solutions for Midsize Retailers
- The Private Cloud
- Microsoft Dynamics CRM solutions from IBM: Power your productivity
- IBM and SAP: Delivering enterprise solutions for a world on the move
- Linux in the Mainstream: Growing Deployment of Mission-Critical Workloads
- The Total Economic Impact of Migrating from Unix to Red Hat Enterprise Linux
- ESG: Oracle Database Appliance: A Simple, Economical Option for SMBs and Independent Software Vendors
- DOWNLOAD THE EMC 15-MINUTE GUIDE TO SMARTER BACKUP
- Embedded Security. Built-in Peace of Mind.
- Just Released! Diskeeper 12 Accelerates Application Performance for Immediate ROI. Get No-Obligation Quote Now.
- Watch this webcast about how immersive and mobile technologies allow you to collaborate in any location, on any device, with any content.
- Easily create and manage custom iPad & iPhone apps for your business.
- Nytro. Intelligent Solid-State Solutions for Datacenter Application Acceleration. Fast. Smart. Easy.
- Deploy SharePoint quickly & at lower total cost on AWS Cloud-Learn how
- Simple, affordable video conferencing for small groups.
- Connect with IT leaders redefining mobility at the Enterprise Mobile Hub
- The Future of Cloud is Open
- Steps to Transform your Data Center- Learn More at Brocade Federal Forum
- Customized information views & Twitter events at New Fulcrum Point
- IT works better together with HP Converged Infrastructure.
- Elevate storage agility and efficiency with HP 3PAR storage.
- Free SAP paper on managing mobility at the app level. Get yours today!
- Protect your data now and down the road. Use LTO-5 Tape!
- Tolly Performance Report "Citrix NetScaler with nCore Outperforms F5 BIG-IP"
- ITwhitepapers.com - Access thousands of white papers on 300+ technical topics.
- Leverage Your Cisco infrastructure for Superior Application Performance
- Learn about the AMD Virtual Experience
- Turn to EMC to bring new simplicity, power, and efficiency to end user computing
- Instant, anywhere remote support with LogMeIn Rescue. Try it Free
- Be productive all day, every day with Panasonic Toughbook® computers.
- Webcast demonstrates how collaboration can be more immersive and mobile.
- Nytro. Intelligent Solid-State Solutions for Datacenter Application Acceleration. Fast. Smart. Easy.
- Dynamic Case Management & Microsoft products - free Whitepaper
- Get Ethernet speeds from 1 Mbps to 10 Gbps - Comcast Business Class
- BlackBerry® Mobile Fusion. Different mobile devices. One platform.
- 2012 Gartner Backup Magic Quadrant: CommVault in Leaders quadrant
- Introducing the New DellT OptiPlexT desktops and LatitudeT laptops.
- Just Released! New Diskeeper® 12 boosts application and storage performance. Free Trial.
- Master the cloud with the power of convergence from HP
- Better, more meaningful EMR/EHR solutions from Kodak Document Imaging.
- Redefine your data center with HP servers.
- Visit the Virtually There Learning Page to learn how to use virtualization to your competitive advantage.
- Connect with global CIOs now at Enterprise CIO Forum
- Download Microsoft's latest Data Protection Management tool
- Not All QSAs Are Created Equal: What You Should Know Before You Buy
- The arrival of Serial Attached SCSI (SAS) marks a new era in storage scalability
- The AMD Virtual Experience Virtual Trade Show
iPhone Enterprise Management Guide | |
DOWNLOAD TRIAL Forms Processing App | |
Free 90 Day Trial of Device Cloud |
See your link here
Know more about data breaches in the UK Visite Here
ReplyDelete