![]() “Definitely still change your password if you’re in any doubt whatsoever and make sure you enable Dropbox’s two-step verification while you’re there if it’s not on already.” “The bcrypt hashing algorithm protecting is very resilient to cracking and frankly, all but the worst possible password choices are going to remain secure even with the breach now out in the public,” said Hunt. Half the passwords were still encrypted with SHA1 at the time of the theft. ![]() At the time Dropbox practiced good user data security practice, encrypting the passwords and appears to have been in the process of upgrading the encryption from the SHA1 standard to a more secure standard called bcrypt. The company had around 100m customers at the time, meaning the data dump represents over two-thirds of its user accounts. ![]() Hunt said: “There is no doubt whatsoever that the data breach contains legitimate Dropbox passwords, you simply can’t fabricate this sort of thing.”ĭropbox sent out notifications last week to all users who had not changed their passwords since 2012. The independent security researcher and operator of the Have I been pwned? data leak database, Troy Hunt, verified the data discovering both his account details and that of his wife. ![]() ![]() The dump of passwords came to light when the database was picked up by security notification service Leakbase, which sent it to Motherboard. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |