Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
LinkedIn has implemented salting capabilities to protect user passwords following news last week that scores of user passwords had been stolen.
While it had "been working around the clock" to add the cryptograhic security measure to new passwords, those which were swiped and later published online were not salted.
Its investigation found that the stolen passwords were not published with corresponding email logins; those members it believed to be at risk had their passwords disabled and were sent an email by its customer service team.
“At this time, there have been no reports of compromised LinkedIn accounts as a result of this password theft. We are continuing to work with law enforcement as they investigate this crime. The health of our network, as measured by member growth and engagement, remains as strong as it was prior to the incident.”
Following the incident, it said that the technology team at LinkedIn has completed a long-planned transition from a password database system that hashed passwords, to a system that both hashes and salts the passwords to provide an extra layer of protection.
“We are profoundly sorry for this incident. Member security is vitally important to us, and transparency is a priority as well. We will provide further updates as warranted by any new developments.”
About four per cent of the emails received by LinkedIn users, or 250,000, were tagged as junk by recipients according to security firm Cloudmark.
Its spam-filtering system found that a specific signature was assigned to the LinkedIn message, which allowed researchers to estimate how many were marked as spam, leading to users not knowing that they had a compromised password.
"LinkedIn tends to send out a lot of messages that people don't want to read. LinkedIn should be more careful about the general emails that they send to people so users pay attention when the company has something to say,” said Cloudmark researcher Andrew Conway.
This article originally appeared at scmagazineuk.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.