Yahoo! closes security hole

Powered by SC Magazine
 

Promises to beef up security after password breach.

Yahoo has fixed a security vulnerability that allowed hackers to seize roughly 450,000 unencrypted email addresses and passwords belonging to members of its content-sharing platform.

In a blog post, the web giant said the intruders accessed a "standalone file" that contained the login data used by writers who joined Associated Content  prior to May 2010, the month when Yahoo acquired the company for $US100 million.

Now called Yahoo Contributor Network, the business unit specialises in producing freelancer-generated, search-optimised content.

According to experts, the hackers, which claimed to be part of a relatively unknown contingent known as "D33ds Company," obtained the information in clear text through a SQL injection attack, a common technique used to infiltrate vulnerable web applications.

"We have taken swift action and have now fixed this vulnerability, deployed additional security measures for affected Yahoo users, enhanced our underlying security controls and are in the process of notifying affected users," the post said.

"In addition, we will continue to take significant measures to protect our users and their data."

The company declined to specify further.

Affected users will be asked to answer a series of challenge questions to enable them to reset their credentials.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Yahoo! closes security hole
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 343

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote