RedStone Community

Wednesday, October 30, 2013

Hackers Have Seized 38 Million Adobe Customer Records




(Reuters) - Adobe Systems Inc said on Tuesday that the scope of a cyber-security breach disclosed nearly a month ago was far bigger than initially reported, with attackers obtaining data on more than 38 million customer accounts.
The software maker also said that hackers had stolen part of the source code to Photoshop editing software that is widely used by professional photographers.
The company disclosed the breach on October 3, saying attackers took credit card information and other data from nearly 3 million customers' accounts.
Adobe also said that the hackers accessed an undisclosed number of Adobe IDs and encrypted passwords that were stored in a separate database. On Tuesday, it revealed that about 38 million records from that database were stolen.
On October 3, the company also reported that the attackers stole source code to three other products: Acrobat, ColdFusion and ColdFusion Builder.
Adobe spokeswoman Heather Edell said the software maker believes the attackers also obtained access to "many invalid Adobe IDs, inactive Adobe IDs, Adobe IDs with invalid encrypted passwords and test account data."
She said the company is still investigating to determine how much invalid account information was breached and is in the process of notifying affected users.
Even though the company believes the stolen passwords were encrypted, the attackers may have been able to access them in plain text by one of several methods, including breaking the algorithm that Adobe used to scramble them, said Marcus Carey, a security researcher and expert on cyber attacks, who formerly worked as an investigator with the National Security Agency.
They could likely use those passwords to break into other accounts because many people use the same passwords for multiple accounts, he said.
"This is a treasure trove for future attacks," Carey said.
Adobe spokeswoman Heather Edell said that the company was not aware of any unauthorized activity on Adobe accounts as a result of the attack.
Yet Edell said she could not say whether stolen credit cards or passwords had been used to launch follow-on attacks against Adobe customers or conduct other types of cyber crimes.
"Our investigation is still ongoing," she said. "We anticipate the full investigation will take some time to complete."
[Source]
Posted by Asma Khan at 10/30/2013 03:06:00 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Adobe

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Followers

Total Page Views

Visit Us

  • Website
  • Facebook
  • Linkedin

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Translate

Popular Posts

  • Google Glass: what you need to know
    Does Project Glass represent the next big step in mobile communications? Back in early 2012, before the world had heard of Google Glass...
  • UIAppearance for Fun and Profit
    Building custom user interfaces is something our  iOS development team  encounters on a daily basis. Anything you can do to make it faste...
  • Failure to Define Project Scope and Objectives Properly and the Consequences Thereof
    There must be a specific roadmap for the success of the project as well as clear and realistic objectives. Any sort of mistake in this reg...
  • Decision Making… What’s The Big Deal?
    One of the most important tasks a project manager faces on a daily basis is decision making. Project managers are to make all kinds of d...
  • Tips for Talking About Yourself
    [ Source ]
  • Ericsson and Samsung reach agreement on licensing terms
    Settlement ends all ongoing patent related legal disputes Agreement includes global patent cross licensing of cellular technologies ...
  • All you need to know about Mobile Lifecycle Management
    What Is Mobile Lifecycle Management? Nowadays business environments are increasingly relying in smart mobile devices and enterprise ...
  • 3D Systems' Sense scanner is compact, $400 and ready to transform 3D printing as we know it
    "Game changer" isn't a term that ought be thrown around loosely. It's the kind of thing that loses value each time it...
  • Increase Profits from Your Marketing Campaigns
    ...
  • Lifecycle Marketing
    33 ...

Labels

Management Project Google Apple iPhone Android iOS Agile Microsoft Tool Facebook Mobile Review Development Glass Samsung iPhone 6 Apps Developers Leadership Marketing Presentation Software Social Media iOS 7 Risk CEO Galaxy SmartPhone Windows iPhone 5s ipad Blackberry Client Communication HTC Human Resources Interview Nexus 5 Process Tablet Team Template Time Windows Mobile Windows Phone Amazon Apple Pay Board China Critical Path Cyber Crime IT ITIL Improvement Internet Explorer Job KitKat LG Lawsuit Lifecycle Linkedin Manager Manifesto One PMI Patent Procurement Qualcomm Resume S5 Sense Stakeholder Successful Surface Testing Twiter UI WhatsApp business eBay iOS 8 iPhone 5 iPhone 5c iWatch nexus 128GB 16GB 365 3D 3G 4.4 4G 80/20 Rule API Adobe Amazon Air Prime Andreno 330 Android apps App Store App Usage Apple Store Arianna Huffington Asus Atmosphere Audience BBM Brain Brainstorming Brand Budget Buffer Bug CV Certification Chairman Change Chromebooks Cisco Cloud Coca Cola Cocoa Company Consultant Cover Letter Cross Platform Mobile Development Dayparting Deloitte Design Desktop Disney Documentation Downloads Drones Engineering Enterprise Entrepreneur Ericsson Evolution FTC Fairfax FedEx Federal Trade Commission Follow Up Ford Framework GE GSMA Galaxy S5 Google Now Guy Kawasaki HDMI HTC One Hudway IBM IR blaster Infographic Infringement Investment Java JavaFX Jelly Bean LTE LaTeX Licence Logo Loyalty MWC 2014 Malware Marketplace Marriott Meeting Mobile World Congress Moto X My Phone NASA NSA NX500 Network Nexus 7 Nordstrom Note Notifier OIS OPM3 Objective-C Oracle PIN PMBOK 5 PMBOK4 PMP Palm PayPal Payment People Persona PfMP PhoneBloks Price Principles Product QA Qualcomm Snapdragon 800 Quickoffice RIM Request Requirement Roku SALT Salessforce.com Scanner Scope Scroogled Security Segmentation Self Self Employment Skype Snapdragon Solar Sony Space Grey Sprint Starbucks Steve Jobs Stick Streaming SwiftKey Technology Tim Cook Unit Testing Values Vanguard View Controller Virtual Vivo WBS Wallet Waterfall Windows Mobile 6 Work Workplace Wrist Xperia Xplay Yahoo Youtube Z10 Zenbook boot animation christmas eCommerce efficiency emoji hangouts hp iOS 6 iPad Air iPad mini iPad mini 2 iPhone5 iPhone5c iPhone5s icon launcher linux lock screen merger message music printer privacy sales smart caller id technical ubantu wallpapers wireless

Blog Archive

  • ►  2016 (1)
    • ►  July (1)
  • ►  2014 (80)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (8)
    • ►  June (5)
    • ►  May (8)
    • ►  April (25)
    • ►  March (10)
    • ►  February (3)
    • ►  January (10)
  • ▼  2013 (123)
    • ►  December (8)
    • ►  November (31)
    • ▼  October (40)
      • 4G vs LTE – key differences explained
      • iPhone 6: Release date, rumours, features and news
      • Hackers Have Seized 38 Million Adobe Customer Records
      • 10 Galaxy S5 features that make sense
      • BBM for Android and iOS Rollout Started Again
      • 5 Things that Good Job Candidates Hate
      • The Power of Brainstorming
      • Sense 5.5 and Android 4.3 Update for HTC One in fe...
      • How To Escalate Project Issues
      • Unit testing is out, Vertical Slice Testing is in
      • Portfolio Management Professional (PfMP)SM Creden...
      • The Importance of Work Atmosphere
      • The Power of Split Testing in eCommerce
      • Apple recalls last year's MacBook Air due to fault...
      • Microsoft Remote Desktop app allows Android and iO...
      • Apple Shows Off Wicked Scale Model of Their Propos...
      • SwiftKey 4.3 merges smartphone and tablet apps, in...
      • Agile or Traditional: How to Choose
      • Why Agile?
      • Agile vs Traditional Project Management
      • Agile Project Management: Part 2
      • Agile Project Management: Part 1
      • ITIL V3F Overview: Part II
      • ITIL V3F Overview: Part I
      • 10 reasons you should upgrade to Windows 8.1
      • Unveiling LinkedIn’s 100 Most InDemand Employers o...
      • Four Ingredients to a Successful Project Team
      • The Breakdown of the Work Breakdown Structure
      • 100 rules for NASA Project Managers
      • Are You Living Your Eulogy or Your Resume?
      • The Art of Creating a Community
      • 5 Key Project Management Processes
      • Why You Should LOVE Your Worst Clients
      • When Facts Are Not Enough – 10 Tips for Communicat...
      • The World of Project Management and Its Many Hats
      • Infographic: Agile vs. Waterfall
      • Why Are You In So Many Meetings?
      • LG Z: First Flexible Display Device
      • Agile, to Scale
      • Apple is world's most valuable brand, Samsung up t...
    • ►  September (34)
    • ►  August (4)
    • ►  July (3)
    • ►  May (1)
    • ►  March (1)
    • ►  January (1)
  • ►  2012 (49)
    • ►  November (7)
    • ►  October (5)
    • ►  September (3)
    • ►  August (1)
    • ►  July (10)
    • ►  June (6)
    • ►  May (4)
    • ►  April (3)
    • ►  March (3)
    • ►  February (7)
  • ►  2011 (5)
    • ►  November (1)
    • ►  October (4)
  • ►  2010 (1)
    • ►  May (1)
Awesome Inc. theme. Powered by Blogger.