RedStone Community

Wednesday, October 30, 2013

Hackers Have Seized 38 Million Adobe Customer Records




(Reuters) - Adobe Systems Inc said on Tuesday that the scope of a cyber-security breach disclosed nearly a month ago was far bigger than initially reported, with attackers obtaining data on more than 38 million customer accounts.
The software maker also said that hackers had stolen part of the source code to Photoshop editing software that is widely used by professional photographers.
The company disclosed the breach on October 3, saying attackers took credit card information and other data from nearly 3 million customers' accounts.
Adobe also said that the hackers accessed an undisclosed number of Adobe IDs and encrypted passwords that were stored in a separate database. On Tuesday, it revealed that about 38 million records from that database were stolen.
On October 3, the company also reported that the attackers stole source code to three other products: Acrobat, ColdFusion and ColdFusion Builder.
Adobe spokeswoman Heather Edell said the software maker believes the attackers also obtained access to "many invalid Adobe IDs, inactive Adobe IDs, Adobe IDs with invalid encrypted passwords and test account data."
She said the company is still investigating to determine how much invalid account information was breached and is in the process of notifying affected users.
Even though the company believes the stolen passwords were encrypted, the attackers may have been able to access them in plain text by one of several methods, including breaking the algorithm that Adobe used to scramble them, said Marcus Carey, a security researcher and expert on cyber attacks, who formerly worked as an investigator with the National Security Agency.
They could likely use those passwords to break into other accounts because many people use the same passwords for multiple accounts, he said.
"This is a treasure trove for future attacks," Carey said.
Adobe spokeswoman Heather Edell said that the company was not aware of any unauthorized activity on Adobe accounts as a result of the attack.
Yet Edell said she could not say whether stolen credit cards or passwords had been used to launch follow-on attacks against Adobe customers or conduct other types of cyber crimes.
"Our investigation is still ongoing," she said. "We anticipate the full investigation will take some time to complete."
[Source]
Posted by Asma Khan at 10/30/2013 03:06:00 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Adobe

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Followers

Total Page Views

Visit Us

  • Website
  • Facebook
  • Linkedin

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Translate

Popular Posts

  • Dual SIM Samsung Galaxy Trend 3 officially unveiled
    Samsung has introduced a new dual SIM Android smartphone: the Galaxy Trend 3, which comes as the successor to the  Galaxy Trend II  that w...
  • The Breakdown of the Work Breakdown Structure
    When project managers are assigned or take on a new project, it can be a lot of work to determine all the specifications, components, and ...
  • The Best Templates to Use in Project Management
    As professional project managers, we probably work heavily with templates…either using them or creating them. Templates can be a series ...
  • Sense 5.5 and Android 4.3 Update for HTC One in few European Markets
    The latest version of the Jelly Bean the 4.3  version with some refreshed user interface changes,Sense 5.5 update is now being rolled out ...
  • BlackBerry to be broken up into two parts?
    Another day, another rumor dealing with the future of BlackBerry. This time round a  Reuters report  suggests the company has “narr...
  • Google opens up Mirror API to all developers, even more Glassware incoming
    Earlier this week Google gave us a  sneak peek at their upcoming Google Glass Development Kit (GDK) , a set of tools developers will use to...
  • 7 Questions to Gauge Your Project Team’s Potential
    Today’s workforce is comprised of individuals forming a project team for a company or a certain project. Owner-managers need to make sure t...
  • 10 Galaxy S5 features that make sense
    Look at us, it's still 2013, but we're already thinking about next year's Samsung flagship. From the original Galaxy S to the c...
  • The next step of marketing evolution: Google Glass
    A major tech trend like this can definitely turn things over in marketing.  Google Glass  is building its popularity for quite some time n...
  • Leadership in Project Management – 14 Key Principles
    William Deming first introduced the fourteen key principles in his book  Out of the Crisis  which was published in 1986. These principles ...

Labels

Management Project Google Apple iPhone Android iOS Agile Microsoft Tool Facebook Mobile Review Development Glass Samsung iPhone 6 Apps Developers Leadership Marketing Presentation Software Social Media iOS 7 Risk CEO Galaxy SmartPhone Windows iPhone 5s ipad Blackberry Client Communication HTC Human Resources Interview Nexus 5 Process Tablet Team Template Time Windows Mobile Windows Phone Amazon Apple Pay Board China Critical Path Cyber Crime IT ITIL Improvement Internet Explorer Job KitKat LG Lawsuit Lifecycle Linkedin Manager Manifesto One PMI Patent Procurement Qualcomm Resume S5 Sense Stakeholder Successful Surface Testing Twiter UI WhatsApp business eBay iOS 8 iPhone 5 iPhone 5c iWatch nexus 128GB 16GB 365 3D 3G 4.4 4G 80/20 Rule API Adobe Amazon Air Prime Andreno 330 Android apps App Store App Usage Apple Store Arianna Huffington Asus Atmosphere Audience BBM Brain Brainstorming Brand Budget Buffer Bug CV Certification Chairman Change Chromebooks Cisco Cloud Coca Cola Cocoa Company Consultant Cover Letter Cross Platform Mobile Development Dayparting Deloitte Design Desktop Disney Documentation Downloads Drones Engineering Enterprise Entrepreneur Ericsson Evolution FTC Fairfax FedEx Federal Trade Commission Follow Up Ford Framework GE GSMA Galaxy S5 Google Now Guy Kawasaki HDMI HTC One Hudway IBM IR blaster Infographic Infringement Investment Java JavaFX Jelly Bean LTE LaTeX Licence Logo Loyalty MWC 2014 Malware Marketplace Marriott Meeting Mobile World Congress Moto X My Phone NASA NSA NX500 Network Nexus 7 Nordstrom Note Notifier OIS OPM3 Objective-C Oracle PIN PMBOK 5 PMBOK4 PMP Palm PayPal Payment People Persona PfMP PhoneBloks Price Principles Product QA Qualcomm Snapdragon 800 Quickoffice RIM Request Requirement Roku SALT Salessforce.com Scanner Scope Scroogled Security Segmentation Self Self Employment Skype Snapdragon Solar Sony Space Grey Sprint Starbucks Steve Jobs Stick Streaming SwiftKey Technology Tim Cook Unit Testing Values Vanguard View Controller Virtual Vivo WBS Wallet Waterfall Windows Mobile 6 Work Workplace Wrist Xperia Xplay Yahoo Youtube Z10 Zenbook boot animation christmas eCommerce efficiency emoji hangouts hp iOS 6 iPad Air iPad mini iPad mini 2 iPhone5 iPhone5c iPhone5s icon launcher linux lock screen merger message music printer privacy sales smart caller id technical ubantu wallpapers wireless

Blog Archive

  • ►  2016 (1)
    • ►  July (1)
  • ►  2014 (80)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (8)
    • ►  June (5)
    • ►  May (8)
    • ►  April (25)
    • ►  March (10)
    • ►  February (3)
    • ►  January (10)
  • ▼  2013 (123)
    • ►  December (8)
    • ►  November (31)
    • ▼  October (40)
      • 4G vs LTE – key differences explained
      • iPhone 6: Release date, rumours, features and news
      • Hackers Have Seized 38 Million Adobe Customer Records
      • 10 Galaxy S5 features that make sense
      • BBM for Android and iOS Rollout Started Again
      • 5 Things that Good Job Candidates Hate
      • The Power of Brainstorming
      • Sense 5.5 and Android 4.3 Update for HTC One in fe...
      • How To Escalate Project Issues
      • Unit testing is out, Vertical Slice Testing is in
      • Portfolio Management Professional (PfMP)SM Creden...
      • The Importance of Work Atmosphere
      • The Power of Split Testing in eCommerce
      • Apple recalls last year's MacBook Air due to fault...
      • Microsoft Remote Desktop app allows Android and iO...
      • Apple Shows Off Wicked Scale Model of Their Propos...
      • SwiftKey 4.3 merges smartphone and tablet apps, in...
      • Agile or Traditional: How to Choose
      • Why Agile?
      • Agile vs Traditional Project Management
      • Agile Project Management: Part 2
      • Agile Project Management: Part 1
      • ITIL V3F Overview: Part II
      • ITIL V3F Overview: Part I
      • 10 reasons you should upgrade to Windows 8.1
      • Unveiling LinkedIn’s 100 Most InDemand Employers o...
      • Four Ingredients to a Successful Project Team
      • The Breakdown of the Work Breakdown Structure
      • 100 rules for NASA Project Managers
      • Are You Living Your Eulogy or Your Resume?
      • The Art of Creating a Community
      • 5 Key Project Management Processes
      • Why You Should LOVE Your Worst Clients
      • When Facts Are Not Enough – 10 Tips for Communicat...
      • The World of Project Management and Its Many Hats
      • Infographic: Agile vs. Waterfall
      • Why Are You In So Many Meetings?
      • LG Z: First Flexible Display Device
      • Agile, to Scale
      • Apple is world's most valuable brand, Samsung up t...
    • ►  September (34)
    • ►  August (4)
    • ►  July (3)
    • ►  May (1)
    • ►  March (1)
    • ►  January (1)
  • ►  2012 (49)
    • ►  November (7)
    • ►  October (5)
    • ►  September (3)
    • ►  August (1)
    • ►  July (10)
    • ►  June (6)
    • ►  May (4)
    • ►  April (3)
    • ►  March (3)
    • ►  February (7)
  • ►  2011 (5)
    • ►  November (1)
    • ►  October (4)
  • ►  2010 (1)
    • ►  May (1)
Awesome Inc. theme. Powered by Blogger.