翻訳と辞書 |
2012 Yahoo! Voices hack : ウィキペディア英語版 | 2012 Yahoo! Voices hack
Yahoo! Voices, formerly Associated Content, was hacked in July, 2012. The hack is supposed to have leaked approximately half a million email addresses and passwords associated with Yahoo! Contributor Network.〔(【引用サイトリンク】title=Yahoo hack steals 400,000 passwords. Is yours on the list? )〕 The suspected hacker group, D33ds, used a method of SQL Injection to penetrate Yahoo! Voice servers. Security experts said that the passwords were not encrypted and the website did not use a HTTPS Protocol, which was one of the major reasons of the data breach. Dana Lengkeek, a Yahoo! spokeswoman, was asked about the companies whose credentials were stolen, but Mrs Lengkeek did not respond. The email addresses and passwords are still available to download in a plaintext file in the hacker's website. The hacker group described the hack as a "wake-up call" for Yahoo! security experts.〔(The Yahoo! Hack: How to find if you're affected? ) Publisher: Tapscape.com〕 Joseph Bonneau, a security researcher and a former product analysis manager at Yahoo, said "Yahoo can fairly be criticized in this case for not integrating the Associated Content accounts more quickly into the general Yahoo login system, for which I can tell you that password protection is much stronger" ==Reaction by communities and users== D33DS, the hacker group, said that the hack was a "wake-up call". They said that it was not a threat to Yahoo!, Inc. The IT Security firm, TrustedSec.net, said that the passwords contained a number of email addresses from Gmail, AOL, Yahoo, and more such websites. Yahoo Voice, was a subdomain of Yahoo. The attacker mistakenly forgot to remove the hostname "dbb1.ac.bf1.yahoo.com".〔(【引用サイトリンク】title=Yahoo Password hack 2012:Breach details )〕
抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「2012 Yahoo! Voices hack」の詳細全文を読む
スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース |
Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.
|
|