Washington Post E-mail Breach Exposed
On the wake of an exposure of a massive breach taking a toll of around 1.27 Million usernames and email addresses, the Washing Post is adopting additional security measures, reports SearchSecurity.com on July 07, 2011.
The company affirmed the news of this breach while addressing messages posted on its website on July 07, 2011. The attack was operational in two separate incidents on June 27 and June 28, 2011. There is no news of compromise in password or other personal information.
According to the revelation, an unauthorized third party hacked the Company jobsite as news published in July 07, 2011. On identifying the vulnerability, immediate action was adopted by the Company along with the assurance of resolving the matter legally.
Security officers of the Company ascertain that the compromised e-mail addresses could be used by the hackers to initiate spam attacks or wage targeted campaigns against users.
Security experts are apprehensive about cyber criminals using stolen usernames and email addresses for devising phishing e-mails towards stealing further details. The e-mail breach of Washington Post seems to be similar to the enormous data breach in March 2011 at Irving, Texas-based Epsilon Data Management LLC, exposing millions of e-mail addresses. Epsilon clientele includes several reputed banks and retailers, including L.L. Bean, Walgreens, JPMorgan Chase, Best Buy, CitiGroup, and the Home Shopping Network.
According to Josh Shaul, Chief Technology Officer for Application Security, clientele of Washington Post, basically comprised of job seekers who are more vulnerable towards the attack as they must be frequently checking their e-mails.
This database exposure is a big setback for 1.27 Million people seeking jobs as their basic information are in stored with the database denoted Shaul, reports CRN on July 07, 2011. This is really a big deal as both experienced and non-experienced job aspirants are threatened.
Registered users on the Washington Post are advised to properly exercise their intelligence and prevent themselves from opening mails from suspicious potential employers.
» SPAMfighter News - 15-07-2011