On Wed, Jun 6, 2012 at 1:23 PM, Kennedy, Jim
<[email protected]> wrote:
> Something to keep in mind here. Linkedin is still investigating. So that
> means they have not found the problem……so the exploit that was used to get
> the passwords before everyone changed them is still usable. Only now lots
> more people know about it.

  Depends on the exploit.  If the exploit was "disgruntled employee
took a backup tape with him when he quit", that might be harder to
repeat.  ;-)

  Another thing to consider: If someone can steal 6.5 million hashed
passwords, they may well have had enough access to do a lot of *other*
things, too.   Such as plant backdoors or timebombs in the system.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to