Preview

2 Million Stolen Passwords of Facebook, Google and Other Websites Made Public

Satisfactory Essays
Open Document
Open Document
414 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
2 Million Stolen Passwords of Facebook, Google and Other Websites Made Public
2 Million Stolen Passwords of Facebook, Google and Other Websites Made Public By: International Business Times. International Business Times. 20131205. Abstract: In a disturbing report, two million stolen passwords of Facebook, Yahoo, LinkedIn, Twitter and Google were posted online, said security firm Trustware on Tuesday. It hasn 't been determined how old the information is but company experts have said that even outdated information can pose a threat, reported Social News Daily. [ABSTRACT FROM PUBLISHER] (AN: 527624.20131205)
Persistent link to this record (Permalink): http://search.ebscohost.com.ezproxy.sunway.edu.my/login.aspx?direct=true&db=bwh&AN=527624.20131205&site=eds-live Cut and Paste:
2 Million Stolen Passwords of Facebook, Google and Other Websites Made Public
Database:
Regional Business News

2 Million Stolen Passwords of Facebook, Google and Other Websites Made Public
In a disturbing report, two million stolen passwords of Facebook, Yahoo, LinkedIn, Twitter and Google were posted online, said security firm Trustware on Tuesday.
It hasn 't been determined how old the information is but company experts have said that even outdated information can pose a threat, reported Social News Daily.
"We don 't know how many of these details still work. But we know that 30-40% of people use the same passwords on different websites. That 's certainly something that people shouldn 't do," said Graham Cluley, a security researcher in an interview to BBC.
Trustware explained in a blog post that the passwords are most likely to have been harvested by a large botnet that picked up information from users all over the world. Botnets are used to infect computers and steal large amounts of data by hackers which are then sold to others, held for random or posted online for the public to see.
Trustware said they have already notified the effected companies before posting the blog.
Facebook in its defense said the security risk was generated via the infected



References: International Business, T 2013, '2 Million Stolen Passwords of Facebook, Google and Other Websites Made Public ',International Business Times, 5 December, Regional Business New

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Passwords and personal account data obtain by illegal parties could be used for malicious purposes…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Consider the various amounts of social media sites and email accounts, along with the millions of passwords that are used to access these sites. Society continues to crave more social media interactions and email accounts but yet there is not a cohesive effort to secure the passwords that are used for these sites. In a recent article by SC Magazine, it reported the compromise of over two million accounts. The goal of this evaluation will be to reference numerous aspects of this security article, describe each aspect, with comments on its usefulness…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Emails can be hacked by various methods, and no one is immune. Recently even Presidents G.H. and G.W. Bush have had their emails hacked and information downloaded (Kim, 2013), (Rumors, 2013). By using different methods and the internet, Hackers are using Social Engineering, Google Hacking and Workplace Sabotage from a disgruntled former employee or ones who feels that they have an injustice done to them and are motivated for revenge (Link, 2013).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The theft of the records was caused by installing malware on the orgaznization's point of sales systems. These systems were used via third party vendors and had various security issues. This was the reason the hackers were able to break into their systems. The file that contained all the records started taking rounds in the market and was being sold in black. These records were then used to steal money from customer's accounts. There were several fake cards made and identity theft took place. The details were stolen from Faziio Mechanical. The malware was then sent to all the employees in an email. There was a possibility that Citadel malware, a program that steals passwords, was involved.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In order to prevent this, websites could set up web application firewalls or encode their data by adding in special characters only they would know of. For example, in order to avoid being hacked on Facebook, a person could change their password to a password that is hard to guess or set up a firewall to avoid being hacked. When creating or changing a password for Facebook, Gmail, Twitter or any other social networking site, it makes sure the password is…

    • 769 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    However, the issue of trust is on the rise on social networks as many people fear that their personal identifying information can be used for commercial purposes following recent research on impersonations and cyber criminals. In a statement, Facebook spokesman Barry Schnitt told CNN that impersonation schemes affect less than one per cent of Facebook 's 150 million…

    • 2024 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The World Wide Web was created far enough back for me not to care about the specific date. It is a great asset for school, work, and general entertainment. But, with all good things there are some negatives as well. The online, once was a new place of discovery, is now a place of caution with danger lurking around the corner. Lori Andrews writes about the privacy issues of the web in her essay, “George Orwell…Meet Mark Zuckerburg.” Already, in her title she emphasizes Orwell’s rational fear of “Big Brother” is happening now on Zuckerburg’s social media site, Facebook. It is not just Facebook that has fallen to data aggregators invading the privacy of anyone online. Peggy Orenstein also discusses online privacy issues in her essay, “Just between…

    • 235 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    Vijayan, J. (2012, November 15). NASA breach update: stolen laptop had data on 10,000 users. Retrieved from Computerworld.com: http://www.computerworld.com/s/article/9233701/NASA_breach_update_Stolen_laptop_had_data_on_10_000_users…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    The World Wide Web was created far enough back for most people not to care about the specific date. It is a great asset for school, work, and general entertainment. But, with all the good things it brings, there are some negatives as well. The internet, once a new place of discovery, is now a place of caution with danger lurking around every corner. Lori Andrews writes about the privacy issues of the web in her essay, “George Orwell…Meet Mark Zuckerburg.” Already, in her title she emphasizes Orwell’s rational fear of “Big Brother” is happening now on Zuckerburg’s social media site, Facebook. It is not just Facebook that has fallen to data aggregators invading the privacy of anyone online. Andrews describes data aggregators as people or companies…

    • 1630 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 252 Words
    • 2 Pages

    In agreement to the FTC, “hackers” could access anyone’s personal information at ease, change protected passwords without security questions, look at chats sent back and forth to a friend, and “send tweets” while using another person’s Twitter (Sangani, par. 21). According to Sangani, these so-called specialists accessed this information between January and May of 2009. Specialists had achieved information from over 45 different accounts in January, says Twitter, and approximately 10 in April of 2009. Luckily, it was only “for short periods of time.” (Sangani, par. 22).…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The word 'privacy' means different things to different people, it affect both personal and business. As individuals, we need some amount of privacy to succeed. As a person we need to protect our thoughts from intruders because if others new our must intimate thoughts they could use that information to manipulate our decision making process. Business, need to protect their trade secret and information they collect from their customer to succeed. My objectives for this week e-activity consist of, evaluating the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Facebook is an online social network that allows users to create detailed online profiles and connect with other users, with an emphasis on social relationships such as friendship. This network let users share information with other approved users, such as one’s gender, age, interests, educational background and employment, as well as files and links to music, photos and videos. As concerns about online privacy grow, users of social media sites are increasingly looking for new way to improve their social media experience by posting more personal information and intimate picture about themselves. A class action…

    • 820 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Annotated Bibliography

    • 943 Words
    • 3 Pages

    Facebook has more than five hundred million users and fifty percent are logged on every day, because of this it makes it a large target for online hackers. Many applications on social networking sites can access a user’s personal information. An increasing number of Facebook users are adding “friends” on their Facebook that they do not know and because they accept the friend request, it is not abuse since the friend request was accepted. Spambots send informal messages to users which contain a link which once opened can contain any type of computer virus. Cyber attackers are also using natural disasters as a way to gain credit card information. They will start a group titled “Help Haiti Rebuild” or something similar with a link to insert credit card information to send money to those affected. Some hackers also take part in “phishing” which is a way to gain login names and passwords by presenting a fake login page. an excessive amount of spam was sent by a using account from which the passwords were phished and post a link to the malware.…

    • 943 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Studies and surveys show that Facebook, the biggest social-networking website, has over 500 million members. Those 500 million people, surprisingly, only make up 22 percent of all internet users. More than 25 billion public posts are made each month on the Facebook community by its users, which is made up of photos, videos, status updates, blogs, and news stories. Another social-networking site that has recently become quite popular is called Twitter and has over 100 million users. The Library of Congress announced recently that all of the archive made public on Twitter will be obtained and permanently recorded for their use if it is ever…

    • 950 Words
    • 4 Pages
    Good Essays