{"id":26614,"date":"2014-05-27T08:14:16","date_gmt":"2014-05-27T15:14:16","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=26614"},"modified":"2017-01-06T15:49:17","modified_gmt":"2017-01-06T23:49:17","slug":"month-in-review-part-1-database-breaches-compromised-passwords","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/","title":{"rendered":"Month in Review, Part 1: Database Breaches, Compromised Passwords"},"content":{"rendered":"<p>When it comes to computer security news, the past month or so has been pretty jam-packed. Following are some particularly interesting or noteworthy security news stories you might have missed.<\/p>\n<p><strong>Apple Developer and Employee Contact Info Leaked<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-26656\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/leaky-apple-logo-126x1501.png\" alt=\"\" width=\"126\" height=\"150\" \/>First let&#8217;s talk about the Apple developer site breach. Apple briefly took its developer site offline at the end of April. <a title=\"Apple patches another major security hole in its website that allowed access to all developer personal information\" href=\"http:\/\/9to5mac.com\/2014\/04\/28\/apple-patches-another-major-security-hole-in-its-website-that-allowed-access-to-all-developer-personal-information\/\" target=\"_blank\">9to5Mac reported<\/a> that this wasn&#8217;t merely due to routine maintenance; Apple was also fixing a vulnerability that allowed for attackers to gain access to all contact information for everyone with a developer account (including free accounts) and every Apple retail and corporate employee.<\/p>\n<p>This means that anyone could potentially have gotten the personal contact information for high-profile Apple executives such as CEO Tim Cook, or (as pointed out by Ken Ray on his Mac OS Ken podcast) noteworthy developers like Dong Ngyuen, the creator of Flappy Bird, who famously pulled his app from the iOS App Store after it became famous.<\/p>\n<p>A developer named Jesse J\u00e4rvi discovered the vulnerability and reported it privately to Apple. According to J\u00e4rvi, Apple&#8217;s security team didn&#8217;t seem to take the threat seriously, so he brought it to the attention of 9to5Mac (along with evidence: the personal contact information of several 9to5Mac staff members).<\/p>\n<p>Apple did not issue a statement about the breach, and it is not known whether anyone else may have gained unauthorized access to the personal information in the developer and employee database prior to J\u00e4rvi&#8217;s discovery.<\/p>\n<p><strong>AOL User Database Breach Confirmed &#8211; Password Change Needed<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-26677\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/AOL_logo.png\" alt=\"\" width=\"239\" height=\"178\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/AOL_logo.png 239w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/AOL_logo-150x111.png 150w\" sizes=\"(max-width: 239px) 100vw, 239px\" \/>Around this time last month, many users of AOL&#8217;s e-mail service found that their accounts <a title=\"Has your AOL account been spewing out diet spam? You\u2019re not alone\u2026\" href=\"http:\/\/grahamcluley.com\/2014\/04\/aol-account-diet-spam\/\" target=\"_blank\">seemed to be sending spam<\/a> to people in their contacts list. So many people were affected that the hashtag #AOLHacked began trending on Twitter. AOL initially claimed in a <a title=\"AOL Mail takes action against email spoofing\" href=\"http:\/\/blog.aol.com\/2014\/04\/22\/aol-mail-takes-action-against-email-spoofing\/\" target=\"_blank\">blog post<\/a> that the problem was simply a matter of spammers spoofing e-mail headers to make it appear that spam was coming from @aol.com e-mail addresses. This response was met with some resistance because it didn&#8217;t seem to make sense that spoofing alone could account for spam being sent to a user&#8217;s own private list of contacts.<\/p>\n<p>AOL reiterated its spoofing claim in an e-mail that was gradualy sent to AOL Mail users throughout late April and early May, stating, &#8220;These emails do not originate from the AOL Mail system,&#8221; and the company was &#8220;working with other email providers like Gmail, Yahoo! Mail and Outlook\u00b7com to stamp out spoofing across the industry.&#8221;<\/p>\n<p>The e-mail was several paragraphs long, so many users probably stopped reading at that point (if they even got that far in the first place) and might have missed the really important revelation that followed:<\/p>\n<blockquote><p>&#8220;\u2026we have determined that there was unauthorized access to AOL users&#8217; email addresses, postal addresses, contact information (as stored in the AOL Mail &#8216;Address Book&#8217;), encrypted account passwords, and encrypted answers to security questions that we ask when a user resets his or her password.&#8221;<\/p><\/blockquote>\n<p>Yikes, that&#8217;s not good. (And let&#8217;s hope they really meant &#8220;<a title=\"Password encryption, hashing and salting explained with the help of a shoe [VIDEO]\" href=\"http:\/\/grahamcluley.com\/2014\/05\/password-encryption-hashing-shoe-video\/\" target=\"_blank\">properly hashed and salted<\/a>&#8221; instead of just &#8220;encrypted.&#8221;)<\/p>\n<p>On the bright side\u2014possibly\u2014AOL also stated, &#8220;There is no indication that this incident resulted in disclosure of users&#8217; financial information, including debit and credit cards, which is also fully encrypted.&#8221;<\/p>\n<p>Of course, that <em>could<\/em> be interpreted to mean that <em>encrypted<\/em> credit and debit card information may also have been stolen. After all, payment card information would normally be associated with customers&#8217; postal addresses, which AOL admits were leaked.<\/p>\n<p>If nothing else, be sure to change your password on any AOL accounts you still have, and let other AOL users know that they need to log in and change their passwords.<\/p>\n<p><strong>Bitly Account Credentials Compromised &#8211; Password Change Needed<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-26683\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/bitly-logo-300x160.png\" alt=\"\" width=\"300\" height=\"160\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/bitly-logo-300x160.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/bitly-logo-150x80.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/bitly-logo.png 494w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Popular URL shortening service Bitly (bit.ly) recently disclosed, &#8220;We have reason to believe that Bitly account credentials have been compromised; specifically, users&#8217; email addresses, encrypted passwords, API keys and OAuth tokens.&#8221;<\/p>\n<p>(Hmm, there&#8217;s that ambiguous phrase &#8220;encrypted passwords&#8221; again. Sigh.)<\/p>\n<p>Although Bitly is unaware of accounts having been used without permission, the company is urging users to change their passwords and follow additional security steps outlined at <a title=\"Urgent Security Update Regarding Your Bitly Account\" href=\"https:\/\/bit.ly\/SecurityDetails\" target=\"_blank\">bit.ly\/SecurityDetails<\/a>.<\/p>\n<p><strong>eBay User Database Compromised &#8211; Password Change Needed<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-26695\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/eBay-logo-225x86.png\" alt=\"\" width=\"225\" height=\"86\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/eBay-logo-225x86.png 225w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/eBay-logo-225x86-150x57.png 150w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/>As if all those major site breaches weren&#8217;t enough, last week eBay also came forward and <a title=\"EBAY INC. TO ASK EBAY USERS TO CHANGE PASSWORDS\" href=\"https:\/\/blog.ebay.com\/ebay-inc-ask-ebay-users-change-passwords\/\" target=\"_blank\">announced<\/a> that a &#8220;cyberattack&#8221; in late February or early March, about three months ago, &#8220;compromised a database containing encrypted passwords[<strong>*<\/strong>] and other non-financial data,&#8221; which included names, e-mail addresses, physical addresses, phone numbers, and dates of birth.<\/p>\n<p>With a reported 145 million records, obtaining that database sounds like a dream come true for identity thieves and other fraudsters.<\/p>\n<p>(<strong>*<\/strong>And seriously, &#8220;encrypted passwords&#8221; again??)<\/p>\n<p>There&#8217;s not much anyone can do about the leakage of all their private contact information and date of birth, but eBay users are being encouraged to log in and change their account passwords.<\/p>\n<div>\n<hr>\n<div>\n<p>Stay tuned for <a title=\"Month in Review, Part 2: Vulnerabilities and Patches\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/\" target=\"_blank\"><strong>Month in Review, Part 2: Vulnerabilities and Patches<\/strong><\/a>.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to computer security news, the past month or so has been pretty jam-packed. Following are some particularly interesting or noteworthy security news stories you might have missed. Apple Developer and Employee Contact Info Leaked First let&#8217;s talk about the Apple developer site breach. Apple briefly took its developer site offline at the [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":26893,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,5],"tags":[1105,3151,1102,1099,353,96],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"When it comes to computer security news, the past month or so has been pretty jam-packed. Following are some particularly interesting or noteworthy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Month in Review, Part 1: Database Breaches, Compromised Passwords - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"When it comes to computer security news, the past month or so has been pretty jam-packed. Following are some particularly interesting or noteworthy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-27T15:14:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:49:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/database-breaches-compromised-passwords.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/database-breaches-compromised-passwords.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/database-breaches-compromised-passwords.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/\",\"name\":\"Month in Review, Part 1: Database Breaches, Compromised Passwords - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#primaryimage\"},\"datePublished\":\"2014-05-27T15:14:16+00:00\",\"dateModified\":\"2017-01-06T23:49:17+00:00\",\"description\":\"When it comes to computer security news, the past month or so has been pretty jam-packed. Following are some particularly interesting or noteworthy\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Month in Review, Part 1: Database Breaches, Compromised Passwords\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Month in Review, Part 1: Database Breaches, Compromised Passwords\",\"datePublished\":\"2014-05-27T15:14:16+00:00\",\"dateModified\":\"2017-01-06T23:49:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#webpage\"},\"wordCount\":832,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/database-breaches-compromised-passwords.jpg\",\"keywords\":[\"AOL\",\"Apple\",\"Bitly\",\"eBay\",\"Password Security\",\"Passwords\"],\"articleSection\":[\"Apple\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"When it comes to computer security news, the past month or so has been pretty jam-packed. Following are some particularly interesting or noteworthy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/","og_locale":"en_US","og_type":"article","og_title":"Month in Review, Part 1: Database Breaches, Compromised Passwords - The Mac Security Blog","og_description":"When it comes to computer security news, the past month or so has been pretty jam-packed. Following are some particularly interesting or noteworthy","og_url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2014-05-27T15:14:16+00:00","article_modified_time":"2017-01-06T23:49:17+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/database-breaches-compromised-passwords.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/database-breaches-compromised-passwords.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/database-breaches-compromised-passwords.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/","name":"Month in Review, Part 1: Database Breaches, Compromised Passwords - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#primaryimage"},"datePublished":"2014-05-27T15:14:16+00:00","dateModified":"2017-01-06T23:49:17+00:00","description":"When it comes to computer security news, the past month or so has been pretty jam-packed. Following are some particularly interesting or noteworthy","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Month in Review, Part 1: Database Breaches, Compromised Passwords"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Month in Review, Part 1: Database Breaches, Compromised Passwords","datePublished":"2014-05-27T15:14:16+00:00","dateModified":"2017-01-06T23:49:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#webpage"},"wordCount":832,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/database-breaches-compromised-passwords.jpg","keywords":["AOL","Apple","Bitly","eBay","Password Security","Passwords"],"articleSection":["Apple","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/database-breaches-compromised-passwords.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-6Vg","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26614"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=26614"}],"version-history":[{"count":35,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26614\/revisions"}],"predecessor-version":[{"id":61012,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26614\/revisions\/61012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/26893"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=26614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=26614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=26614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}