{"id":4892,"date":"2012-06-07T17:59:25","date_gmt":"2012-06-07T17:59:25","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=4892"},"modified":"2012-12-12T13:55:39","modified_gmt":"2012-12-12T21:55:39","slug":"last-fm-password-hack","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/","title":{"rendered":"Last.fm Password Hack"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm.jpg\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-4893\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm-300x225.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm-100x75.jpg 100w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>In what is now being called by some the Week of Leaks, another victim has been identified. Yesterday <a href=\"https:\/\/www.intego.com\/mac-security-blog\/linkedin-security-woes\/\">it was LinkedIn<\/a>. Earlier this morning, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-latest-password-breach-eharmony\/\">it was eHarmony<\/a>. Now <a href=\"http:\/\/www.last.fm\/passwordsecurity\">Last.fm<\/a> is dealing with a password breach.<\/p>\n<p>This growing list of hacks brings up a number of questions that have no answer at this point: Who will be next in line? Has anyone identified the method these hackers are using to get into these sites? Do these sites have something in common that is facilitating these hacks? How long until this is fixed?<\/p>\n<p>Obviously it&#8217;s time to change your password for all of these sites and any other sites where you have used the same password. And be aware of phishing attempts, as they have already begun circulating for the LinkedIn breach. It&#8217;s only a matter of time till phishing attempts for eHarmony and Last.fm start going around.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In what is now being called by some the Week of Leaks, another victim has been identified. Yesterday it was LinkedIn. Earlier this morning, it was eHarmony. Now Last.fm is dealing with a password breach. <\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,5],"tags":[106,3154],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In what is now being called by some the Week of Leaks, another victim has been identified. Yesterday it was LinkedIn. Earlier this morning, it was eHarmony. Now Last.fm is dealing with a password breach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Last.fm Password Hack - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In what is now being called by some the Week of Leaks, another victim has been identified. Yesterday it was LinkedIn. Earlier this morning, it was eHarmony. Now Last.fm is dealing with a password breach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-07T17:59:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-12T21:55:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm-300x225.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm.jpg\",\"width\":\"400\",\"height\":\"300\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/\",\"name\":\"Last.fm Password Hack - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#primaryimage\"},\"datePublished\":\"2012-06-07T17:59:25+00:00\",\"dateModified\":\"2012-12-12T21:55:39+00:00\",\"description\":\"In what is now being called by some the Week of Leaks, another victim has been identified. Yesterday it was LinkedIn. Earlier this morning, it was eHarmony. Now Last.fm is dealing with a password breach.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Last.fm Password Hack\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Last.fm Password Hack\",\"datePublished\":\"2012-06-07T17:59:25+00:00\",\"dateModified\":\"2012-12-12T21:55:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#webpage\"},\"wordCount\":152,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm-300x225.jpg\",\"keywords\":[\"Privacy\",\"Security &amp; Privacy\"],\"articleSection\":[\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In what is now being called by some the Week of Leaks, another victim has been identified. Yesterday it was LinkedIn. Earlier this morning, it was eHarmony. Now Last.fm is dealing with a password breach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/","og_locale":"en_US","og_type":"article","og_title":"Last.fm Password Hack - The Mac Security Blog","og_description":"In what is now being called by some the Week of Leaks, another victim has been identified. Yesterday it was LinkedIn. Earlier this morning, it was eHarmony. Now Last.fm is dealing with a password breach.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-06-07T17:59:25+00:00","article_modified_time":"2012-12-12T21:55:39+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm-300x225.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm.jpg","width":"400","height":"300"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/","name":"Last.fm Password Hack - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#primaryimage"},"datePublished":"2012-06-07T17:59:25+00:00","dateModified":"2012-12-12T21:55:39+00:00","description":"In what is now being called by some the Week of Leaks, another victim has been identified. Yesterday it was LinkedIn. Earlier this morning, it was eHarmony. Now Last.fm is dealing with a password breach.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Last.fm Password Hack"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Last.fm Password Hack","datePublished":"2012-06-07T17:59:25+00:00","dateModified":"2012-12-12T21:55:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#webpage"},"wordCount":152,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/lastfm-300x225.jpg","keywords":["Privacy","Security &amp; Privacy"],"articleSection":["Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/last-fm-password-hack\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1gU","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4892"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=4892"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4892\/revisions"}],"predecessor-version":[{"id":4906,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4892\/revisions\/4906"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=4892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=4892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=4892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}