TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

UserVoice Security Incident

13 点作者 cskau大约 9 年前

3 条评论

parkersweb大约 9 年前
The phrasing of the email didn&#x27;t really help to clarify matters:<p>&gt; &quot;UserVoice has confirmed that about 0.001% of users&#x27; encrypted passwords were taken, and we are notifying those users directly. We are notifying you because you are listed as an administrator of your UserVoice account, and we want to inform you of steps we are taking to protect your and your team’s information.&quot;<p>Does that mean you&#x27;re notifying me that my details were taken, or that this is just a friendly &quot;hey, we got hacked&quot; message?
aussie123大约 9 年前
Yikes. Curious around details, how did they get access to backend systems?
tempestn大约 9 年前
From the email referenced in the report:<p>&gt; We learned that in some cases, the attacker was able to perform a series of steps that allowed them to gain access to customer names, usernames, and encrypted passwords. Despite the fact that the passwords were encrypted, it is very possible that an attacker can decrypt this information.<p>This is worrisome to say the least. I understand recommending people change passwords when the hashes are encrypted, even if the encryption was properly implemented. But if that was the case, there would still be no expectation that the passwords could be &quot;decrypted&quot;. Seems to suggest UserVoice is not handling password storage in a secure manner.