Skip to main content

Adobe Hacked

PCMag reported yesterday that Adobe was hacked and data of million customers stolen.

If you missed the news, here's the link where I found out about it. This justify that you are NOT completely safe when you're connected online whether a small or big company's like Adobe, Twitter, Facebook, Google, Microsoft, Oracle. It's just a matter of time. I always shared to my boss and friends in the security/network industry, SECURITY is NOT a PRODUCT it's a PROCESS.

As customer of Adobe using their cloud service. Today, I received an email from Adobe asking me to update my password.

Here's an excerpt from the email.
Title: Important Customer Security Alert 
"We recently discovered that attackers illegally entered our network. The attackers may have obtained access to your Adobe ID and encrypted password. We currently have no indication that there has been unauthorized activity on your account. If you have placed an order with us, information such as your name, encrypted payment card number, and card expiration date also may have been accessed. We do not believe any decrypted card numbers were removed from our systems.

To prevent unauthorized access to your account, we have reset your password. Please visit www.adobe.com/go/passwordreset to create a new password. We recommend that you also change your password on any website where you use the same user ID or password. As always, please be cautious when responding to any email seeking your personal information.

and continue ... "

I think it's about time for Adobe to implement a two-factor authentication to minimize risk of customers account information.
Here's some related articles I posted in the past regarding two-factor authentication.:
http://www.whaddya.com/2013/04/wordpress-two-factor-authentication.html
http://www.whaddya.com/2012/08/securing-your-gmail-using-two-factor.html
http://www.whaddya.com/2013/05/step-up-your-godaddy-account-security.html
http://www.whaddya.com/2011/10/gmail-security-two-factor.html
http://www.whaddya.com/2009/01/namecom-offers-two-factor.html

Be safe, change your password every 90 days especially if you're not using a two-factor authentication. I hope my banks will apply this extra security soon.



Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp