• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Report: Shadowy Russian hacker group hijacked 1.2 billion usernames, passwords

Wow you just beat me! I GUESS I will be spending a few hours tomorrow changing 20 + passwords!
CBS evening TV news spent about 30 seconds on this, I guess I should not be shocked!
 
Seriously?

SQL security is so 2000, I can't believe those sites would even be vulnerable to those attacks.
 
Seriously?

SQL security is so 2000, I can't believe those sites would even be vulnerable to those attacks.

There are a lot of careless, uneducated, and/or pressured(by management to build functional and fast without care for security) developers out there. A report of harvesting like this is of no surprise to me, and it certainly won't be the last time it happens.
 
where is the nsa on that one?

oh thats right looking at everyones underwear sizes and fapping to facebook photos.

edit: i swore.

thought this was P&N
 
Russian Fight Club coming for everyone I guess, heh.

hope some things stay solid here.

That and they aren't spreading Ebola.

:colbert:
 
Good for them i suppose. Nothing to do about it now.
There will almost always be a way in as long as data is connected to the internet.

There are a lot of careless, uneducated, and/or pressured(by management to build functional and fast without care for security) developers out there. A report of harvesting like this is of no surprise to me, and it certainly won't be the last time it happens.
Careless and lack of time usually go hand in hand. There are always exceptions, but with a large majority of security stuff ups time could be a big culprit.

One of the problems is that once a system is being used in production it's harder to tighten the security because you could damage the system. At that point most production systems are left alone unless management approves a change to tighten security.
 
Last edited:
Back
Top