LinkedIn user data was jeopardized Wednesday when reports surfaced that 6.5 million passwords were leaked and posted on a Russian hacker site.
Per the LinkedIn blog article posted by Vicente Silveira, June 7, 2012
“To the best of our knowledge, no email logins associated with the passwords have been published, nor have we received any verified reports of unauthorized access to any member’s account as a result of this event.
Since we became aware of this issue, we have been taking active steps to protect our members. Our first priority was to lock down and protect the accounts associated with the decoded passwords that we believed were at the greatest risk. We’ve invalidated those passwords and contacted those members with a message that lets them know how to reset their passwords.
Going forward, as a precautionary measure, we are disabling the passwords of any other members that we believe could potentially be affected. Those members are also being contacted by LinkedIn with instructions on how to reset their passwords.”
NSTIC-led ID plan earmarks $4 million to secure state government services
The two-year-old initiative to create an identity layer for the internet is backing a set of projects aimed at creating identity-based security to support state and local government services online. Read More
Gesture Recognition & Touch-less Sensing Market Worth $12.21 Billion by 2018
According to a new market research report Gesture Recognition & Touchless Sensing Market (2013 – 2018): By Technology (RFID, IR, Capacitive); Product (Biometric, Gaming, Smartphone); Application (Healthcare, Consumer Electronics, Automotive); Geography (Americas, EMEA, & APAC), the total touchless sensing and gesture recognition market is expected to reach $15.02 billion by 2018 growing at a CAGR of 34.94% from 2013 to 2018. [...]
Two-Step Verification Will End Consensual Impersonation
A couple of months back, I advocated killing your password policies and applying some other techniques instead to make existing use of passwords more effective (including my hobby horse: take the user-experience sting out of rotating ordinary static passwords by pushing them out to users on an alternate channel, à la activation codes and other [...]
Click and Go Vote: PA politician proposes online registration
HARRISBURG — It’s possible in these days of instant connectivity to monitor nearly every financial, physical and social transaction using the Internet – from banking to travel, and from dieting to dinner reservations. Read More
Hunting Botnets In The Cloud
Combining cloud, crowdsourcing, and big data to find and quash botnets on a larger scale. Comparing botnet command-and-control (C&C) traffic or malware within an organization to activity seen in other parts of the Internet isn’t new. It’s just that some security analysts are increasingly going there to gather better intelligence that they can use to [...]