• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Everybody's password stolen - almost

Massive hack? Seriously? What a misnomer and grossly errant fear-mongering statement.

That was a cumulative total, accumulated over time from organized keylogging malware that managed to get spread quite well.

If they spread malware and only have that which they directly captured from individual infections, that's not hacking.
If they obtained access into the central servers to these services and obtained a large number of credentials straight from the source... that's hacking. 😉
 
Not a breach of a centralized store, though. These were stolen at the client-side by keyloggers, so unless you hang out on certain kinds of sites and click every emailed link you are probably ok on this one.

Edit: destrekor beat me to it.
 
Massive hack? Seriously? What a misnomer and grossly errant fear-mongering statement.

That was a cumulative total, accumulated over time from organized keylogging malware that managed to get spread quite well.

If they spread malware and only have that which they directly captured from individual infections, that's not hacking.
If they obtained access into the central servers to these services and obtained a large number of credentials straight from the source... that's hacking. 😉

yar, my first thought as well.
 
Not a breach of a centralized store, though. These were stolen at the client-side by keyloggers, so unless you hang out on certain kinds of sites and click every emailed link you are probably ok on this one.

Edit: destrekor beat me to it.

Except for:
"Of all the compromised services, Miller said he is most concerned with ADP. Those log-ins are typically used by payroll personnel who manage workers' paychecks. Any information they see could be viewed by hackers until passwords are reset."

Doesn't help you to be careful if others with your info aren't.
 
Since I have accounts with a few of those things... I bothered to read the article in full. It looks like they were stolen using client-side key loggers and not a central database break-in. All I know is that I'm not changing anything.
 
Not a breach of a centralized store, though. These were stolen at the client-side by keyloggers, so unless you hang out on certain kinds of sites and click every emailed link you are probably ok on this one.

Edit: destrekor beat me to it.

Most of the users who succumb to these avenues of credential theft probably have passwords easily guessed by modern smart brute-force all-source "dictionary attack" tools (which all have character replacement algorithms to deal with the "clever" passwords that are still actually easy for these recent tools), surely available in the darknet somewhere if not easily found on the normal nets.

i.e. people who just don't understand basic system security. It's not difficult to keep Windows clean (don't any of you start singing the praises of *nix or anything dammit! although that too helps 😛), but your safety also demands passwords that algorithms just can't get because there is no essential human-understood reference (which is what makes it easy for the current algorithms).
But it also helps having some basic security - I keep most of my regular browsing in Chrome because I love the integration and it's snappy, and I like the extensions I do have. For browsing anywhere I find possibly suspect, it goes into Firefox (private browsing mode), where noscript locks things down tight. Still have to have caution because for many sights you have to allow through noscript, which removes the security. But most sites themselves are fine, it's something embedded that has a proxy or another web source entirely, and that link is blocked until given permission. I only allow the most minimum number of given webtraffic at any site until I can fully utilize what I need. Might even leave basic google ad links or anything denied, everything but the core experience. And you obviously have to be careful about what websites you even trust the core web data.
and of course keeping Javascript, Flash, Adobe Reader, and any other plugin of that nature always up to date. One can practice all safe tips, forget those and stumble upon a website making use of a security flaw that exists in your version but not in the emergency patch that was released the other day, and succumb to a wide range of malware.
 
Most of the users who succumb to these avenues of credential theft probably have passwords easily guessed by modern smart brute-force all-source "dictionary attack" tools (which all have character replacement algorithms to deal with the "clever" passwords that are still actually easy for these recent tools), surely available in the darknet somewhere if not easily found on the normal nets.

i.e. people who just don't understand basic system security. It's not difficult to keep Windows clean (don't any of you start singing the praises of *nix or anything dammit! although that too helps 😛), but your safety also demands passwords that algorithms just can't get because there is no essential human-understood reference (which is what makes it easy for the current algorithms).
But it also helps having some basic security - I keep most of my regular browsing in Chrome because I love the integration and it's snappy, and I like the extensions I do have. For browsing anywhere I find possibly suspect, it goes into Firefox (private browsing mode), where noscript locks things down tight. Still have to have caution because for many sights you have to allow through noscript, which removes the security. But most sites themselves are fine, it's something embedded that has a proxy or another web source entirely, and that link is blocked until given permission. I only allow the most minimum number of given webtraffic at any site until I can fully utilize what I need. Might even leave basic google ad links or anything denied, everything but the core experience. And you obviously have to be careful about what websites you even trust the core web data.
and of course keeping Javascript, Flash, Adobe Reader, and any other plugin of that nature always up to date. One can practice all safe tips, forget those and stumble upon a website making use of a security flaw that exists in your version but not in the emergency patch that was released the other day, and succumb to a wide range of malware.

how fast do you type?
 
how fast do you type?

Faster than I can think, more often than not. 😉

No idea, haven't measured WPM in forever. I've been tested before to reach 80-90+, but I can be sloppy too, especially if I'm just typing by way of a stream of consciousness moment.
 
Except for:
"Of all the compromised services, Miller said he is most concerned with ADP. Those log-ins are typically used by payroll personnel who manage workers' paychecks. Any information they see could be viewed by hackers until passwords are reset."

Doesn't help you to be careful if others with your info aren't.

you mean I have to worry about what the employees of ADP and hundreds of other companies click on at work? article is silly
 
FB...nope
Twitts....nope
gmail...nope

ATOT....hacked..."esquared, my account was hacked. No way I would have posted that."
 
Except for:
"Of all the compromised services, Miller said he is most concerned with ADP. Those log-ins are typically used by payroll personnel who manage workers' paychecks. Any information they see could be viewed by hackers until passwords are reset."

Doesn't help you to be careful if others with your info aren't.

It's ADP's job to keep their payroll data secure, and the loss of a few employees' passwords is no excuse for not doing so. Anything involving SSNs should be using multi-factor authentication.
 
Massive hack? Seriously? What a misnomer and grossly errant fear-mongering statement.

That was a cumulative total, accumulated over time from organized keylogging malware that managed to get spread quite well.

If they spread malware and only have that which they directly captured from individual infections, that's not hacking.
If they obtained access into the central servers to these services and obtained a large number of credentials straight from the source... that's hacking. 😉

You're part of a society who calls it hacking when they find somebody still logged into Facebook, so I think you're fighting a losing battle.
 
Massive hack? Seriously? What a misnomer and grossly errant fear-mongering statement.

That was a cumulative total, accumulated over time from organized keylogging malware that managed to get spread quite well.

If they spread malware and only have that which they directly captured from individual infections, that's not hacking.
If they obtained access into the central servers to these services and obtained a large number of credentials straight from the source... that's hacking. 😉
According to mainstream news: "Any bad thing done to a computer system = hacking," even if you gained access by using login information that you got simply by asking someone for it.
 
So what is the point of having someone's Facebook password or Twitter what can you do with that?

Well...you can get A LOT of information about a person from Facebook at least, that could be used for identity theft.

Also, the main point is most people use 1 or 2 passwords for everything..so more than likely most of those Facebook passwords could be useful for other more dangerous areas of the persons life (such as online bank accounts etc).
 
Back
Top