Access your Pro+ Content below.
LinkedIn password leak: Lessons to be learned from LinkedIn breach
This article is part of the Information Security magazine issue of July/August 2012
The seemingly never-ending stream of data breaches could make it easy to become rather numb to news of another. But the massive LinkedIn password leak, which came to light in June, caught a lot of attention and deservedly so. There were similar password leaks at dating site eHarmony and radio streaming site Lastfm, but the scale of the LinkedIn breach – some 6.5 million passwords – and the fact that LinkedIn is a social networking giant for business professionals, put it in the data breach hall of shame. You’d expect a publicly traded company with more than 160 million members, including executive managers at Fortune 500 businesses, to be diligent about security. But after the millions of LinkedIn passwords were posted to a Russian hacker forum, security experts were shaking their heads at the company’s lax efforts. The company quickly became the butt of jokes in the security community, and its reputation took a beating. “It tends to be viewed as an organization that would give more resources, care and attention to security ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Learn pen testing best practices and how to build an internal pen testing team.
New techniques are emerging to help organizations analyze security data and improve security defenses.
SharePoint has become ubiquitous in the enterprise, but organizations can overlook security. Learn SharePoint security best practices in this article.
Restricting user permissions, server hardening and dedicated service accounts are critical.
Experts say malware toolkit isn’t unique, but warn of cyberweapons falling into the wrong hands.
Columns in this issue
Mobile systems have a lot of moving parts, but securing them is as simple as practicing software security.
Government and private sector collaboration is critical to surviving in cybespace.
Breach at the professional networking site highlights password practices, storage procedures.