LinkedIn Says Its Members Are Not At Risk
LinkedIn provided an update on the security easure the company took after hackers exposed millions of its users' passwords, saying on Saturday it had finished disabling all affected accounts and did not believe other members were at risk.
The social network last week confirmed that 6.5 million LinkedIn hashed passwords were stolen and published on an unauthorized website. Since then, the company has been working with the FBI to pursue the hackers.
The company clarified that compromised passwords were not published with corresponding email logins. At the time they were initially published, the vast majority of those passwords remained hashed, i.e. encoded, however a subset of the passwords was decoded. LinkedIn claims that its members information has nor being published at any time in connection with the list of stolen passwords. The only information published was the passwords themselves.
Based on its investigation, all member passwords that the company believe to be at risk have been disabled and those members have been notified by the company, in order to change their passwords.
The company has hired outside forensics experts to assist as company engineers and the FBI seek to get to the bottom of the break-in.
The company clarified that compromised passwords were not published with corresponding email logins. At the time they were initially published, the vast majority of those passwords remained hashed, i.e. encoded, however a subset of the passwords was decoded. LinkedIn claims that its members information has nor being published at any time in connection with the list of stolen passwords. The only information published was the passwords themselves.
Based on its investigation, all member passwords that the company believe to be at risk have been disabled and those members have been notified by the company, in order to change their passwords.
The company has hired outside forensics experts to assist as company engineers and the FBI seek to get to the bottom of the break-in.