CIO Today

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
Daily Briefing for Technology's Top Decision-Makers
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
Friday, April 18th 
The future of tape is here.
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Enterprise Software
Enterprise Hardware
Big Data
Network Security
Cloud Computing
CRM Systems
Data Storage
Operating Systems
Communications
CIO Issues
Mobile Tech
Chips & Processors
World Wide Web
Business Briefing
After Hours
Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Cloud Computing

Evernote Limits Hack Damage with Good Security Practices

Evernote Limits Hack Damage with Good Security Practices
March 4, 2013 10:24AM

Bookmark and Share
Security researcher Beth Jones said Evernote did a great job in its security precautions and in dealing with the breach. "First, they did salt and hash the passwords, making them much more difficult to crack," she said. "They owned up to the breach quickly, and even though the passwords were secure, Evernote did a forced reset of all user passwords."

Neustar, Inc. (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz.

Evernote has been hacked, forcing the online note-taking software to reset passwords for its 50 million users, although any password data that was accessed was protected with encryption. What does this mean for enterprise IT security?

"In our security investigation, we have found no evidence that any of the content you store in Evernote was accessed, changed or lost," Evernote's Dave Engberg said in a blog post. "We also have no evidence that any payment information for Evernote Premium or Evernote Business customers was accessed."

Richard S. Westmoreland, a Level III security analyst and team lead at SilverSky, told us the breach was limited and Evernote should be given credit for its fast response and communication to its customers.

"Evernote customers do need to be warned that since their e-mail addresses were mined they should be on the lookout for phishing attempts," he said. "As always, never re-use the same password on multiple sites. But in case anybody has, be sure to change those passwords as well. A breach of an SaaS [software as a service] provider is not limited to that provider but serves as recon for the rest of the cloud.

Evernote Handled It Well

Beth Jones, a senior threat researcher at Sophos, told us that overall, Evernote did a great job in its security precautions and in dealing with the breach.

"First, they did salt and hash the passwords, making them much more difficult to crack," she said. "They were very transparent in releasing information -- they owned up to the breach quickly, and even though the passwords were secure, Evernote did a forced reset of all user passwords, again salting and hashing."

Jones said the company was also quick to point out that no payment details were lost and that hackers were unable to access users' notes. She said Evernote showed what a reasonable response to a security breach should look like.

Room for Improvement

That said, there is room for improvement, Jones said. Evernote could have done better when it sent out its security advisory e-mail.

Evernote explicitly said in the e-mail, "Never click on 'reset password' links in e-mails -- instead go directly to the service," but then had a clickable link to the reset-password page.

"It would have been more advisable to either link to the main page of the site, or even better, no hyperlink at all," Jones said. "It also might have lent a bit more credibility to not have the e-mails passing through a third-party server.

"While it's a legitimate e-mail communications server, it still came off as rather odd, given the messaging in the e-mail itself was about security breaches where they are trying to make the point of 'Never click on reset password links'," Jones said. "As we've pointed out before, this shows where security needs to be at the forefront when trusting your personal data to the cloud."

Tell Us What You Think
Comment:

Name:



 Cloud Computing
1. IBM Adds Disaster Recovery to SoftLayer
2. VMware Rolls Out DR-as-a-Service
3. Red Hat Unveils OpenShift Marketplace
4. Dropbox Rolls Out Business Service
5. AWS Launches Cost Explorer Utility




 Most Popular Articles
1. BlackBerry Drops T-Mobile After Nasty Spat
2. Cisco, IBM Launch Internet of Things Consortium
3. Salesforce CRM Gets Industry Specific for Internet of Customers
4. IBM Applies Big Data Analytics To Fight Against Fraud
5. Intel Bets on Cloudera for Big Data Analytics

Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Google Street View Unravels CAPTCHAs
  Yahoo COO Gets $58M Parting Gift
  Teen Arrested for Heartbleed Hack
  Android Gets Chrome Remote Desktop
  Malware Targets Facebook Users

 Technology Marketplace

Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
BMC's I.T. solutions unleash the power of your business
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise I.T.
BMC's I.T. solutions unleash the power of your business
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
Google's Street View Software Unravels CAPTCHAs
The latest software Google uses for its Street View cars to read street numbers in images for Google Maps works so well that it also solves CAPTCHAs, those puzzles designed to defeat bots.
 
Canadian Teen Arrested for Heartbleed Hack
One week after the OpenSSL Heartbleed vulnerability was unveiled, Canadian authorities have made the first arrest -- a London, Ontario teenager -- connected to exploiting the security hole.
 
IBM Offers Security, Disaster Recovery as SoftLayer Service
New disaster recovery and security services for SoftLayer clients are being added by IBM. Big Blue said the new capabilities will speed cloud adoption by alleviating concern over business continuity.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
Google Glass may find its first markets in verticals in which hands-free access to data is a boon. Medicine is among the most prominent of those, as seen in a number of Glass experiments under way.
 

Mobile Technology Spotlight
Google Releases Chrome Remote Desktop App for Android
You're out on a sales call, and use your Android mobile device to grab a file you have back at the office on your desktop. That's a bit easier now with Google's Chrome Remote Desktop app for Android.
 
Amazon 3D Smartphone Pics Leaked
E-commerce giant Amazon is reportedly set to launch a smartphone after years of development. Photos of the phone, which may feature a unique 3D interface, were leaked by tech pub BGR.
 
Zebra Tech Buys Motorola Enterprise for $3.45B
Weeks after Lenovo bought Motorola Mobility’s assets from Google for $2.91 billion, Zebra Technologies is throwing down $3.45 billion for Motorola’s Enterprise business in an all-cash deal.
 

Navigation
CIO Today
Home/Top News | Enterprise Software | Enterprise Hardware | Big Data | Network Security | Cloud Computing | CRM Systems
Data Storage | Operating Systems | Communications | CIO Issues | Mobile Tech | Chips & Processors | World Wide Web
Business Briefing | After Hours | Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 CIO Today. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.