Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Build Apps 5x Faster
For Half the Cost
Enterprise Cloud Computing

On Force.com
Network Security
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
Adobe Resets Passwords after Massive Data Breach
Adobe Resets Passwords after Massive Data Breach

By Jennifer LeClaire
October 4, 2013 10:21AM

    Bookmark and Share
The massive breach into Adobe's networks may have been the work of the same attackers who compromised LexisNexis and other organizations, using the same techniques. Security professionals around the world should be on high alert for an increase in Acrobat-related attacks as hackers analyze the code for possible zero-day exploits.
 



Adobe has confirmed a massive hack that led to the theft of the private information of 2.9 million customers. The hacked data includes consumer names, encrypted credit or debit card numbers, expiration dates, and other information relating to customer orders.

"At this time, we do not believe the attackers removed decrypted credit or debit card numbers from our systems," Brad Arkin, Chief Security Officer at Adobe, wrote in a blog post. "We deeply regret that this incident occurred. We're working diligently internally, as well as with external partners and law enforcement, to address the incident."

As a precaution, Adobe said it is resetting relevant customer passwords to help prevent unauthorized access to Adobe ID accounts. The company is also in the process of notifying customers whose credit or debit card information may have been compromised. Adobe contacted the banks that process customer payments for the software firm and has also alerted federal law enforcement agencies. What now?

A Chilling Reminder

We caught up with Chris Petersen, CTO and co-founder of security information and event management firm LogRhythm, to get his take on the high-profile hack. He told us when it comes to the source code breach, the first risk Adobe is concerned with is that malicious code was inserted into product source code and then distributed to customers in a compiled form. The second risk is that its source code is out in the open and vulnerable to would-be attackers.

"Having access to product source code can allow attackers to identify software vulnerabilities that have been undiscovered to date. Both risks could result in a treasure trove of zero-day exploits against Adobe software," Petersen said.

"If indeed the source code stolen pertains to ColdFusion and Acrobat, this could leave thousands of web servers open to at-will compromise and make it easier to compromise end-user systems," he said. "This breach is a chilling reminder that all software companies should be on guard, as they too could be a stepping stone to other targets."

The Biggest Story

Aaron Titus, Chief Privacy Officer at Identity Finder, a security and privacy software firm, told us the biggest story is that 3 million credit card numbers were hacked from Adobe.

"While this is a serious breach by any measure, to Adobe's credit the numbers seem to have been encrypted. The underreported, but far more worrying story is that hackers apparently have obtained 40 GB of Adobe source code, which may include Adobe's most popular products, Adobe Acrobat and ColdFusion," he said. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:

Joey D:

Posted: 2013-10-07 @ 9:09am PT
Rewind 2 years ago, Adobe & McAfee announced a DLP data protection solution.

Adobe should have read:

http://www.gtbtechnologies.com/en/company/about/insider-threat-protection



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Network Security
1.   Juniper DDoS for High-IQ Networks
2.   Big DDoS Attacks Hit Record in 2014
3.   U.N.: Nations Hide Digital Snooping
4.   Can Google Stop Zero Day Flaws?
5.   Google Hacker Team to Hunt Bugs


advertisement
Android SMS Worm on the Loose
Malware lets bad actors cash in.
Average Rating:
Big DDoS Attacks Hit Record in 2014
Attackers often use NTP reflection.
Average Rating:
Can Google Stop Zero Day Flaws?
Security top priority for search giant.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Juniper DDoS Solution Aims at High-IQ Networks
In the face of more complex attacks, Juniper Networks is boosting its DDoS Secure solution to help companies mitigate the threats with more effective security intelligence throughout the network fabric.
 
Large-Volume DDoS Attacks Hit Record in 2014
The number of distributed denial-of-service (DDoS) attacks set a record in the first half of 2014, according to a report by Arbor Networks. The number of attacks over 20 GB/sec doubled.
 
U.N.: Nations Hide Rise in Private Digital Snooping
Governments on every continent are hiding an increasing reliance on private companies to snoop on citizens' digital lives, the U.N. human rights office says, with grave concerns about privacy.
 

Enterprise Hardware Spotlight
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 
Another Day, Another Internet of Things Consortium Is Born
In the emerging Internet of Things, zillions of devices will be talking to each other. Samsung, Intel and Dell just formed a consortium to ensure each thing can understand what others are saying.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.