成人小说亚洲一区二区三区,亚洲国产精品一区二区三区,国产精品成人精品久久久,久久综合一区二区三区,精品无码av一区二区,国产一级a毛一级a看免费视频,欧洲uv免费在线区一二区,亚洲国产欧美中日韩成人综合视频,国产熟女一区二区三区五月婷小说,亚洲一区波多野结衣在线

立即打開
領(lǐng)英曝“泄密門”:1.67億條密碼黑市售價(jià)5比特幣

領(lǐng)英曝“泄密門”:1.67億條密碼黑市售價(jià)5比特幣

Robert Hackett 2016年05月22日
領(lǐng)英被盜的用戶賬戶數(shù)量遠(yuǎn)多于人們最初以為的650萬條。

還記得社交網(wǎng)站領(lǐng)英(LinkedIn)2012年的數(shù)據(jù)泄露事件嗎?

當(dāng)時(shí),一名黑客從該網(wǎng)站上竊取了650萬個(gè)用戶密碼,隨后將其上傳至俄羅斯的一個(gè)黑客論壇上。如今看來,“650萬”這個(gè)數(shù)字僅僅是冰山一角。

據(jù)科技媒體Vice Motherboard報(bào)道,近日,一個(gè)網(wǎng)名叫“Peace”的俄羅斯黑客正在網(wǎng)絡(luò)黑市上叫賣1.17億個(gè)電子郵箱地址及密碼的組合,售價(jià)僅為5比特幣,也就是2300美元左右。

科技媒體Motherboard已經(jīng)從一家名叫Leaked Source的已泄露數(shù)據(jù)付費(fèi)搜索引擎那里獲得了部分泄露的數(shù)據(jù)——約100萬條登錄信息。Leaked Source更是稱其已經(jīng)獲得了總計(jì)1.67億條的泄露的登錄信息。Motherboard也表示,經(jīng)過聯(lián)系其中的一名受害者詳細(xì)比對(duì)后可以確認(rèn),那名俄羅斯黑客手上的登錄信息中,至少有一條可以確認(rèn)是真實(shí)的。

已泄露數(shù)據(jù)搜索引擎HaveIBeenPwned.com的負(fù)責(zé)人、網(wǎng)絡(luò)安全專家特洛伊?亨特表示,他已經(jīng)聯(lián)系上了其他兩名受害人并確認(rèn)了細(xì)節(jié)。不過他表示,他目前尚未得到全部泄露信息來升級(jí)他的數(shù)據(jù)庫。

搜索引擎Leaked Source已經(jīng)對(duì)這些泄露數(shù)據(jù)展開了分析。該網(wǎng)站的一位代表通過電子郵件向《財(cái)富》表示,黑客此次在網(wǎng)上售賣的這批被盜賬戶中,有大約1.6億個(gè)賬戶擁有唯一的電子郵件地址,其余的700萬個(gè)賬戶只有數(shù)字登錄賬號(hào)和密碼。這位代表還表示,由于Leaked Source的管理員手上沒有2012年黑客最初發(fā)布的那650萬條登錄信息,因此他們也就無法檢驗(yàn)此次的1.67億條信息中是否包含了上次的那650萬條。

Leaked Source的發(fā)言人還對(duì)《財(cái)富》表示:“這1.67億條登錄信息是我們通過某人免費(fèi)獲得的,而他們則是從俄羅斯人那里弄來的。他們要求我們不得透露他們的身份,否則這將危害到他們與將信息提供給他們的人之間的關(guān)系。”

上本周三,領(lǐng)英公司首席信息安全官柯里?斯科特在該公司的官方博客上發(fā)文稱:“昨天,我們得知又有一些數(shù)據(jù)被發(fā)布出來,據(jù)稱這些數(shù)據(jù)是1億多名領(lǐng)英會(huì)員的電子郵件與密碼的組合,它們也是在2012年的那次事故中被盜的。”

他表示,在2012年的泄露事故發(fā)生后,領(lǐng)英公司已經(jīng)要求“所有我們認(rèn)為已經(jīng)泄露的賬戶”修改其密碼。另外,當(dāng)時(shí)領(lǐng)英還向所有用戶發(fā)出了修改密碼的建議?!拔覀冋诹⒓床扇〈胧?,停用那些受影響賬戶的密碼。我們將很快通知這些會(huì)員重新設(shè)置密碼。我們認(rèn)為,目前沒有跡象顯示這是一次新的安全泄露事故的結(jié)果?!?/p>

斯科特補(bǔ)充道,領(lǐng)英已經(jīng)采取了加“鹽”加密技術(shù),也就是向登錄口令中添加隨機(jī)數(shù)字,然后再對(duì)其進(jìn)行加密。這樣的登錄口令可以“好幾年”都不易被攻破。不過Leaked Source指出,它所獲取的泄露密碼也是加過密的(通過SHA-1 hash功能),但卻并沒有“鹽”功能。因此,領(lǐng)英大概是在2012年的泄露事件后才開始對(duì)密碼進(jìn)行“加鹽”的。

為了保持私人數(shù)據(jù)的安全性,領(lǐng)英用戶應(yīng)及時(shí)更換在該網(wǎng)站的密碼(以及在其他任何網(wǎng)站上使用的與其相同的用戶名及密碼),同時(shí)采取雙因素認(rèn)證的方式保證安全性(即在用戶登陸時(shí)向其手機(jī)發(fā)送安全認(rèn)證碼)。(財(cái)富中文網(wǎng))

譯者:樸成奎

Remember LinkedIn’s 2012 data breach?

A hacker stole 6.5 million encrypted passwords from the site and posted them to a Russian crime forum. Now it appears that data theft was just the tip of the iceberg.

A Russian hacker, who goes by “Peace,” is selling 117 million email and password combinations on a dark web marketplace, Vice Motherboard reports. The going rate for the loot is five Bitcoins, or about $2,300.

Motherboard said it received a portion of the data—about one million credentials—from Leaked Source, a paid search engine for hacked data that claims to have acquired a total of 167 million of the leaked login credentials. The news outlet verified that at least one of the hacked accounts is legitimate by confirming details with one of the victims.

Cybersecurity researcher Troy Hunt, who runs the hacked data search engine HaveIBeenPwned.com, said he confirmed details with two other victims. He added that he doesn’t yet have a full set to upload to his database yet.

A person who represents Leaked Source, which has been analyzing the stolen data, told Fortune in an email that 160 million of the compromised accounts have unique email addresses, while the remaining 7 million only include numerical userids and passwords. The spokesperson said that the site’s administrators do not have access to the 6.5 million credentials initially released in 2012, meaning they are unable to check whether they are included as part of the latest set.

“We acquired the 167 million credentials for free from someone who got them from the Russians,” the Leaked Source rep told Fortune. “We have been asked not to reveal who they are or it would jeopardize their relationship with whomever provided it to them.”

Cory Scott, LinkedIn’s chief information security officer, published a post addressing the incident on the professional network’s official blog on Wednesday. “Yesterday, we became aware of an additional set of data that had just been released that claims to be email and hashed password combinations of more than 100 million LinkedIn members from that same theft in 2012,” Scott wrote.

He mentioned that the company had required “all accounts we believed to be compromised” to reset their passwords in 2012, and that it recommended all other users else reset their passwords as well. “We are taking immediate steps to invalidate the passwords of the accounts impacted, and we will contact those members to reset their passwords,” he said. “We have no indication that this is as a result of a new security breach.”

Scott added that the site had been encrypting and “salting”—or appending random data to the passwords before they’re encrypted to make them less crackable—”for several years.” Leaked Source noted, however, that the leaked passwords it had obtained were encrypted (with the SHA-1 hashing function), but lacked the “salting” security feature. Presumably, LinkedIn began “salting” their passwords after the 2012 incident.

To stay protected, LinkedIn users should update their passwords on the site (and anywhere else they may have reused the same password online) and also implement two-factor authentication—a feature that sends a security code to a user’s phone upon login.

掃碼打開財(cái)富Plus App
亚洲成AV人无码不卡影片| 中文字幕天天躁日日躁狠狠躁免费| 久久人人爽爽爽人久久久| 欧美XXXX做受性欧美88| 岳的又肥又大水多啊喷了视频| 国产精品久久久久久成人影院| 日韩精品免费在线观看视频| 热re99久久精品国99热| 亚洲欧洲美洲无码精品va| 性色AV一区二区三区无码| 亚洲A∨午夜成人片精品网站| 欧美黑人日韩三级破处女视频污片| 麻豆久久婷婷五月综合国产| 日韩精品内射视频免费观看| 国产精品久久久久9999高清| 欧美丰满熟妇XXXX| 无码国产激情在线观看| 无码精品黑人一区二区三区| 亚洲成AV人无码不卡影片| 少妇厨房愉情理9仑片视频| 免费毛片手机在线播放| 久久人人爽人人爽人人片av高| 亚洲av无码一区二区三区观看| 欧美久久网站日韩| 91剧情国产极品高跟丝袜| 国产精品午夜剧场免费观看| 国产A级毛片久久久久久精品| 国产精品边做奶水狂喷无码| 人妻自慰蜜臀喷潮流白浆| 欧美日本一区二区欧美专区一区| 国产精品秘 入口久久熟女| 久久夜色精品国产噜噜| 婷婷国产天堂久久综合亚洲| 国产亚洲午夜高清国产拍精品,| 最新国产AV无码专区亚洲AVn| 国产高清一区二区三区直播| 天堂Aⅴ无码一区二区三区| 人妻高清无码中文字幕在线a | 欧美精品免费一区欧美久久| 国产一区二区精品久久岳√| 国产男人午夜视频在线观看|