Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Cloud Computing
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Evernote Limits Hack Damage with Good Security Practices
Evernote Limits Hack Damage with Good Security Practices

By Jennifer LeClaire
March 4, 2013 10:24AM

    Bookmark and Share
Security researcher Beth Jones said Evernote did a great job in its security precautions and in dealing with the breach. "First, they did salt and hash the passwords, making them much more difficult to crack," she said. "They owned up to the breach quickly, and even though the passwords were secure, Evernote did a forced reset of all user passwords."
 



Evernote has been hacked, forcing the online note-taking software to reset passwords for its 50 million users, although any password data that was accessed was protected with encryption. What does this mean for enterprise IT security?

"In our security investigation, we have found no evidence that any of the content you store in Evernote was accessed, changed or lost," Evernote's Dave Engberg said in a blog post. "We also have no evidence that any payment information for Evernote Premium or Evernote Business customers was accessed."

Richard S. Westmoreland, a Level III security analyst and team lead at SilverSky, told us the breach was limited and Evernote should be given credit for its fast response and communication to its customers.

"Evernote customers do need to be warned that since their e-mail addresses were mined they should be on the lookout for phishing attempts," he said. "As always, never re-use the same password on multiple sites. But in case anybody has, be sure to change those passwords as well. A breach of an SaaS [software as a service] provider is not limited to that provider but serves as recon for the rest of the cloud.

Evernote Handled It Well

Beth Jones, a senior threat researcher at Sophos, told us that overall, Evernote did a great job in its security precautions and in dealing with the breach.

"First, they did salt and hash the passwords, making them much more difficult to crack," she said. "They were very transparent in releasing information -- they owned up to the breach quickly, and even though the passwords were secure, Evernote did a forced reset of all user passwords, again salting and hashing."

Jones said the company was also quick to point out that no payment details were lost and that hackers were unable to access users' notes. She said Evernote showed what a reasonable response to a security breach should look like.

Room for Improvement

That said, there is room for improvement, Jones said. Evernote could have done better when it sent out its security advisory e-mail.

Evernote explicitly said in the e-mail, "Never click on 'reset password' links in e-mails -- instead go directly to the service," but then had a clickable link to the reset-password page.

"It would have been more advisable to either link to the main page of the site, or even better, no hyperlink at all," Jones said. "It also might have lent a bit more credibility to not have the e-mails passing through a third-party server.

"While it's a legitimate e-mail communications server, it still came off as rather odd, given the messaging in the e-mail itself was about security breaches where they are trying to make the point of 'Never click on reset password links'," Jones said. "As we've pointed out before, this shows where security needs to be at the forefront when trusting your personal data to the cloud."
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Cloud Computing
1.   Oracle Updates Database, Linux Products
2.   Cloud Wars: AWS vs. Microsoft, IBM
3.   Yammer Moved to Office 365
4.   IBM, California Partner in the Cloud
5.   Dropbox for Business Boosts Security


advertisement
Amazon Intros Zocalo Storage Service
Online storage and sharing for business.
Average Rating:
Avaya Pressing Hard on Cloud-Based UC
Provides easier, faster provisioning.
Average Rating:
Cisco Woos More Devs with DevNet
To create new network-aware apps.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tor Internet Privacy Service Warns Users It Was Breached
You may never have heard of the Tor Project, but the Internet privacy service is making headlines. Tor’s devs say users might be victims of an attack launched against the project earlier this year.
 
Canadian Government Charges China With Cyberattack
The government of Canada is not happy with China. Canadian officials have accused "a highly sophisticated Chinese state-sponsored actor" of launching a cyberattack on its National Research Council.
 
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 

Enterprise Hardware Spotlight
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Dell, BlackBerry Not Sweating Apple-IBM Alliance
IBM's recent move to partner with Apple to sell iPhones and iPads loaded with corporate applications has excited investors in both companies, but two rivals say they are unperturbed for now.
 
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 

Mobile Technology Spotlight
Virgin Mobile Offers Custom Smartphone Plans
As the wireless carrier wars continue heating up, Virgin Mobile just threw the customization coal onto the fire. The firm has debuted a no-annual-contract plan with rates based on individual use.
 
Collaboration Provider Asana Revamps Mobile App
Asana, a collaboration software provider started by a Facebook founder, is now out with a rebuilt native iOS mobile app. It replaces one that even the company admits was not up to par.
 
Facebook: You Will Use Messenger, and You Will Like It
Starting this week, Facebook users with Android and iOS phones will be forced to use the separate Messenger app to send Facebook messages. Pending messages will still be visible in the main app.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.