Discus Systems PLC - IT Support Company in Birmingham West midlands
0800 880 3360
replica watches
 
Posted by Damien Biddulph on Tue 12th Jun 2012



  Business IT Support (4 hour response)
Server Support £166.00 + VAT per month
Workstation Support £20.00 + VAT per month
Cloud Service Support £66.00 + VAT per month
On-site Technican £680.00 + VAT per day

Please call 0800 880 3360 (01675430080) for more information or email u2us@discus.co.uk
 

Arrange A Callback
Your Name:
E-Mail Address:
Tel Number:
Mobile Number:


Click 'Call Me' to request a callback.


Tackling user questions on what's known so far on what happened to stolen LinkedIn data, and what can be done about it
By Jaikumar Vijayan
June 7, 2012 01:08 PM ET

Computerworld - Hackers have apparently accessed close to 6.5 million hashed passwords from a LinkedIn database and posted them and data associated with them online. So far, researchers say, about 60% of the unique passwords in the dump have been cracked and there are signs that the rest will soon be as well.

Here's some information for LinkedIn users specifically, and all Internet users in general.

What happened? Surprisingly, it's not clear yet exactly what happened.

Earlier this week, a 118MB file containing 6,458,020 hashed password was posted on a Russian hacker forum. The posters said they needed help in cracking the passwords.

 

How has LinkedIn responded publicly to the reports? The company has said precious little so far. Apart from a brief blog post confirming that "some" member passwords were compromised, the company has said nothing about the nature or scope of the compromise.

The company says it is investigating the incident.

Did the hackers obtain email addresses associated with the passwords? That remains unclear as well. To this point, only the passwords have surfaced online. But security analysts believe it's likely the hackers have accessed email addresses and other account data as well.

If User IDs were not obtained what's the big deal? If so, that would diminish the seriousness of the compromise. Typically however, password data is stored along with other account details. So if someone had access to the passwords, they very likely had access to other account information as well. The fact that the data has not surfaced could mean that either the hackers don't have it, or they simply haven't released it.

What does it mean to me? If you're a LinkedIn user, it's a good idea to change your password, especially if you use the same password to access other online accounts. Make sure to use a STRONG password.

If your password was compromised, you will not be able to use it to log into your LinkedIn account. LinkedIn has said that it is contacting users whose password has been compromised with instructions on how to reset their password. The company has made clear that the email with instructions on how to reset the password will NOT contain any links. If you have not received an email yet, or if you are still able to access your account using your old password, it means that either your password was not compromised, or that LinkedIn doesn't it yet.

What measures had LinkedIn taken to protect member passwords? Embarrassingly little, or so it appears so far, researchers say.

The breached passwords were all masked using a basic hashing algorithm known as SHA-1. Though SHA-1 offers a degree of protection against password cracking attempts, the protocol is by no means foolproof. Numerous password cracking tools tools and tables that contain pre-computed hashes for billions of passwords are easily available. Almost anyone can use these tables to decrypt almost any SHA-1 hash and recover it in plain text in in a matter of minutes. That explains why nearly all of the hashed passwords have been cracked already.

How could LinkedIn have done to protect the passwords better? Security experts say the company should have used a method known as "salting" to make its hashed passwords a lot harder to crack. In the salting process, a string of totally random characters is appended to a plaintext password before it is hashed. A salted hash is considered to be magnitudes times harder to crack than a regular SHA-1 hash. Salting is considered today to be an almost basic security practice for protecting passwords.

Mobile VideoSponsored by SybaseProtecting iPhone Data
Phones contain a significant amount of enterprise data. Learn how to configure and secure them centrally.How can users be sure that more data was not accessed? That information must come from LinkedIn. It's possible that only password data was stolen. It's equally possible that the intruders gained access to email addresses as well.

Data breachesLinkedIn provides breach update -- sort ofVupen Security denies it's been hackedFAQ: LinkedIn breach -- what members (and others) need to knowHackers crack more than 60% of breached LinkedIn passwordsUpdate: LinkedIn probing reports of massive breachSecurity Utah CTO Steps Down Following Data BreachUndergrad suspected in massive Univ. of Nebraska breachGameReplays lets hackers probe site after data breachRomanian authorities dismantle hacker group targeting government websitesN.J. mayor arrested on hacking, conspiracy chargesMore in Data Security
Similarly, it's possible that a lot more than 6.5 million passwords were compromised. LinkedIn has over 100 million members. It's possible that the hackers released the 6.5 million passwords to show they have the goods to anyone interested in purchasing the purloined data from them. LinkedIn can be a goldmine for identity thieves and phishers.

Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is jvijayan@computerworld.com.

 

+0

-0

 
corner spacer corner


Related News

   
corner spacer corner
Veeam Specialist Microsoft Small Business Specialists Birmingham Microsoft Gold Certified Partner Birmingham Siemens Solution 1 Reseller Birmingham Sonicwall Specialists Birmingham Business Link Approved Birmingham Fujitsu Primergy Certified Partner Birmingham Facebook Follow us on Twitter ESET NOD32 VMWare
IT Support
IT Services
IT Solutions
Get Support Now
Sitemap
© 2020 Discus Systems plc. All rights reserved. Content Management by Verve Digital