On Wed, Jun 6, 2012 at 1:23 PM, Kennedy, Jim <[email protected]> wrote: > Something to keep in mind here. Linkedin is still investigating. So that > means they have not found the problem……so the exploit that was used to get > the passwords before everyone changed them is still usable. Only now lots > more people know about it.
Depends on the exploit. If the exploit was "disgruntled employee took a backup tape with him when he quit", that might be harder to repeat. ;-) Another thing to consider: If someone can steal 6.5 million hashed passwords, they may well have had enough access to do a lot of *other* things, too. Such as plant backdoors or timebombs in the system. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
