Yahoo! closes security hole

Powered by SC Magazine
 

Promises to beef up security after password breach.

Yahoo has fixed a security vulnerability that allowed hackers to seize roughly 450,000 unencrypted email addresses and passwords belonging to members of its content-sharing platform.

In a blog post, the web giant said the intruders accessed a "standalone file" that contained the login data used by writers who joined Associated Content  prior to May 2010, the month when Yahoo acquired the company for $US100 million.

Now called Yahoo Contributor Network, the business unit specialises in producing freelancer-generated, search-optimised content.

According to experts, the hackers, which claimed to be part of a relatively unknown contingent known as "D33ds Company," obtained the information in clear text through a SQL injection attack, a common technique used to infiltrate vulnerable web applications.

"We have taken swift action and have now fixed this vulnerability, deployed additional security measures for affected Yahoo users, enhanced our underlying security controls and are in the process of notifying affected users," the post said.

"In addition, we will continue to take significant measures to protect our users and their data."

The company declined to specify further.

Affected users will be asked to answer a series of challenge questions to enable them to reset their credentials.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Yahoo! closes security hole
 
 
 
Top Stories
Time management tips for CIOs
[Blog post] How to get to the genba.
 
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1108

Vote