Yahoo! closes security hole

Powered by SC Magazine
 

Promises to beef up security after password breach.

Yahoo has fixed a security vulnerability that allowed hackers to seize roughly 450,000 unencrypted email addresses and passwords belonging to members of its content-sharing platform.

In a blog post, the web giant said the intruders accessed a "standalone file" that contained the login data used by writers who joined Associated Content  prior to May 2010, the month when Yahoo acquired the company for $US100 million.

Now called Yahoo Contributor Network, the business unit specialises in producing freelancer-generated, search-optimised content.

According to experts, the hackers, which claimed to be part of a relatively unknown contingent known as "D33ds Company," obtained the information in clear text through a SQL injection attack, a common technique used to infiltrate vulnerable web applications.

"We have taken swift action and have now fixed this vulnerability, deployed additional security measures for affected Yahoo users, enhanced our underlying security controls and are in the process of notifying affected users," the post said.

"In addition, we will continue to take significant measures to protect our users and their data."

The company declined to specify further.

Affected users will be asked to answer a series of challenge questions to enable them to reset their credentials.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Yahoo! closes security hole
 
 
 
Top Stories
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
Will Nutanix be outflanked before reaching IPO?
VMware muscles in on storage startup in hyper-converged infrastructure.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 640

Vote