RedStone Community

Wednesday, October 30, 2013

Hackers Have Seized 38 Million Adobe Customer Records




(Reuters) - Adobe Systems Inc said on Tuesday that the scope of a cyber-security breach disclosed nearly a month ago was far bigger than initially reported, with attackers obtaining data on more than 38 million customer accounts.
The software maker also said that hackers had stolen part of the source code to Photoshop editing software that is widely used by professional photographers.
The company disclosed the breach on October 3, saying attackers took credit card information and other data from nearly 3 million customers' accounts.
Adobe also said that the hackers accessed an undisclosed number of Adobe IDs and encrypted passwords that were stored in a separate database. On Tuesday, it revealed that about 38 million records from that database were stolen.
On October 3, the company also reported that the attackers stole source code to three other products: Acrobat, ColdFusion and ColdFusion Builder.
Adobe spokeswoman Heather Edell said the software maker believes the attackers also obtained access to "many invalid Adobe IDs, inactive Adobe IDs, Adobe IDs with invalid encrypted passwords and test account data."
She said the company is still investigating to determine how much invalid account information was breached and is in the process of notifying affected users.
Even though the company believes the stolen passwords were encrypted, the attackers may have been able to access them in plain text by one of several methods, including breaking the algorithm that Adobe used to scramble them, said Marcus Carey, a security researcher and expert on cyber attacks, who formerly worked as an investigator with the National Security Agency.
They could likely use those passwords to break into other accounts because many people use the same passwords for multiple accounts, he said.
"This is a treasure trove for future attacks," Carey said.
Adobe spokeswoman Heather Edell said that the company was not aware of any unauthorized activity on Adobe accounts as a result of the attack.
Yet Edell said she could not say whether stolen credit cards or passwords had been used to launch follow-on attacks against Adobe customers or conduct other types of cyber crimes.
"Our investigation is still ongoing," she said. "We anticipate the full investigation will take some time to complete."
[Source]
Posted by Asma Khan at 10/30/2013 03:06:00 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Adobe

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Followers

Total Page Views

Visit Us

  • Website
  • Facebook
  • Linkedin

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Translate

Popular Posts

  • What is the Reason Behind Your Process and How Can That Lead to Success?
    Proper understanding of your project is necessary to ensure success. The success of a project can be easily defined by meeting your deadli...
  • Playing the Blame Game
    The Blame Game sounds like fun, doesn’t it? The words even rhyme. We’ve all played it before and some of us are much better at it than...
  • Budget Running Out? Some Useful Tips for a Project Manager
    Properly estimating the overall budget of a project is absolutely an indispensable matter. Budget should be prepared comprehensively befor...
  • Apple Shows Off Wicked Scale Model of Their Proposed 'Spaceship' HQ & Campus
    Tomorrow, the Cupertino City Council will cast their final ...
  • Identifying the Bottleneck in Your Project
    Recently I happened to read a funny but insightful anecdote about routine work of a project manager in the IT sphere. The project was to...
  • Product Manager as Storyteller
    There is no clearly defined path to becoming a product manager. When I started, I was a graduate student in history at the University of...
  • Do You Want A Curved iPhone 6 In 2014?
    The hot, early rumor is that Apple is finally going to make good on the curved iPhone rumor by introducing an  iPhone 6  with a curved s...
  • Risk Management: A Serious Concern for any Project Manager
    One of the most important jobs of a project manager is to predict any sort of problems or risks that might hamper the project progress. Th...
  • Apple Rumored To Be Testing 4.9 Inch iPhone 6
    The  iPhone 5S  hasn’t been available for very long, yet we’re already hearing more and more about its successor, the iPhone 6. Rumo...
  • The Who, What, and When of iPhone and iPad Usage
    All advertisers seek to deliver the right message to the right person at the right moment. If content is king, then context is queen – part...

Labels

Management Project Google Apple iPhone Android iOS Agile Microsoft Tool Facebook Mobile Review Development Glass Samsung iPhone 6 Apps Developers Leadership Marketing Presentation Software Social Media iOS 7 Risk CEO Galaxy SmartPhone Windows iPhone 5s ipad Blackberry Client Communication HTC Human Resources Interview Nexus 5 Process Tablet Team Template Time Windows Mobile Windows Phone Amazon Apple Pay Board China Critical Path Cyber Crime IT ITIL Improvement Internet Explorer Job KitKat LG Lawsuit Lifecycle Linkedin Manager Manifesto One PMI Patent Procurement Qualcomm Resume S5 Sense Stakeholder Successful Surface Testing Twiter UI WhatsApp business eBay iOS 8 iPhone 5 iPhone 5c iWatch nexus 128GB 16GB 365 3D 3G 4.4 4G 80/20 Rule API Adobe Amazon Air Prime Andreno 330 Android apps App Store App Usage Apple Store Arianna Huffington Asus Atmosphere Audience BBM Brain Brainstorming Brand Budget Buffer Bug CV Certification Chairman Change Chromebooks Cisco Cloud Coca Cola Cocoa Company Consultant Cover Letter Cross Platform Mobile Development Dayparting Deloitte Design Desktop Disney Documentation Downloads Drones Engineering Enterprise Entrepreneur Ericsson Evolution FTC Fairfax FedEx Federal Trade Commission Follow Up Ford Framework GE GSMA Galaxy S5 Google Now Guy Kawasaki HDMI HTC One Hudway IBM IR blaster Infographic Infringement Investment Java JavaFX Jelly Bean LTE LaTeX Licence Logo Loyalty MWC 2014 Malware Marketplace Marriott Meeting Mobile World Congress Moto X My Phone NASA NSA NX500 Network Nexus 7 Nordstrom Note Notifier OIS OPM3 Objective-C Oracle PIN PMBOK 5 PMBOK4 PMP Palm PayPal Payment People Persona PfMP PhoneBloks Price Principles Product QA Qualcomm Snapdragon 800 Quickoffice RIM Request Requirement Roku SALT Salessforce.com Scanner Scope Scroogled Security Segmentation Self Self Employment Skype Snapdragon Solar Sony Space Grey Sprint Starbucks Steve Jobs Stick Streaming SwiftKey Technology Tim Cook Unit Testing Values Vanguard View Controller Virtual Vivo WBS Wallet Waterfall Windows Mobile 6 Work Workplace Wrist Xperia Xplay Yahoo Youtube Z10 Zenbook boot animation christmas eCommerce efficiency emoji hangouts hp iOS 6 iPad Air iPad mini iPad mini 2 iPhone5 iPhone5c iPhone5s icon launcher linux lock screen merger message music printer privacy sales smart caller id technical ubantu wallpapers wireless

Blog Archive

  • ►  2016 (1)
    • ►  July (1)
  • ►  2014 (80)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (8)
    • ►  June (5)
    • ►  May (8)
    • ►  April (25)
    • ►  March (10)
    • ►  February (3)
    • ►  January (10)
  • ▼  2013 (123)
    • ►  December (8)
    • ►  November (31)
    • ▼  October (40)
      • 4G vs LTE – key differences explained
      • iPhone 6: Release date, rumours, features and news
      • Hackers Have Seized 38 Million Adobe Customer Records
      • 10 Galaxy S5 features that make sense
      • BBM for Android and iOS Rollout Started Again
      • 5 Things that Good Job Candidates Hate
      • The Power of Brainstorming
      • Sense 5.5 and Android 4.3 Update for HTC One in fe...
      • How To Escalate Project Issues
      • Unit testing is out, Vertical Slice Testing is in
      • Portfolio Management Professional (PfMP)SM Creden...
      • The Importance of Work Atmosphere
      • The Power of Split Testing in eCommerce
      • Apple recalls last year's MacBook Air due to fault...
      • Microsoft Remote Desktop app allows Android and iO...
      • Apple Shows Off Wicked Scale Model of Their Propos...
      • SwiftKey 4.3 merges smartphone and tablet apps, in...
      • Agile or Traditional: How to Choose
      • Why Agile?
      • Agile vs Traditional Project Management
      • Agile Project Management: Part 2
      • Agile Project Management: Part 1
      • ITIL V3F Overview: Part II
      • ITIL V3F Overview: Part I
      • 10 reasons you should upgrade to Windows 8.1
      • Unveiling LinkedIn’s 100 Most InDemand Employers o...
      • Four Ingredients to a Successful Project Team
      • The Breakdown of the Work Breakdown Structure
      • 100 rules for NASA Project Managers
      • Are You Living Your Eulogy or Your Resume?
      • The Art of Creating a Community
      • 5 Key Project Management Processes
      • Why You Should LOVE Your Worst Clients
      • When Facts Are Not Enough – 10 Tips for Communicat...
      • The World of Project Management and Its Many Hats
      • Infographic: Agile vs. Waterfall
      • Why Are You In So Many Meetings?
      • LG Z: First Flexible Display Device
      • Agile, to Scale
      • Apple is world's most valuable brand, Samsung up t...
    • ►  September (34)
    • ►  August (4)
    • ►  July (3)
    • ►  May (1)
    • ►  March (1)
    • ►  January (1)
  • ►  2012 (49)
    • ►  November (7)
    • ►  October (5)
    • ►  September (3)
    • ►  August (1)
    • ►  July (10)
    • ►  June (6)
    • ►  May (4)
    • ►  April (3)
    • ►  March (3)
    • ►  February (7)
  • ►  2011 (5)
    • ►  November (1)
    • ►  October (4)
  • ►  2010 (1)
    • ►  May (1)
Awesome Inc. theme. Powered by Blogger.