![]() ![]() The password reset will apply not only to Evernote logins, but to all apps that users have given access to their Evernote accounts. I’m wondering if there’s some serious service based 0-day exploit out there people are leveraging (Apache? nginx? MySQL?) or something else perhaps.Īll Evernote users were required to reset their passwords in case the attackers are able to recover passwords from the salted hashed list. The user information accessed by the attackers also included user Ids and e-mail addresses.Įvernote joins the ranks of numerous other large companies which have been hacked recently (including Apple, Facebook & others compromised by the Java exploit). Happily, the company’s announcement notes, the passwords accessed were salted hashes, which should mean they last longer than the passwords lifted from the Australian Broadcasting Corporation recently. ![]() As a precaution, Evernote forced a password reset on its entire userbase.Įvernote has joined the growing list of companies whose cloud-based services have suffered a serious security breach, announcing over the weekend that it had implemented a service-wide password reset after attackers accessed user information. Thankfully the passwords are salted hashes, so it’s unlikely they’ll get brute forced any time soon. The big news in the past week or so was the Evernote hack, being a user of Evernote I was interested by this one – it seems to be a pretty pervasive hack with user IDs and e-mail addresses being leaked. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |