Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Last FM tells users to change passwords after suspected hack

Up to 2.5 million passwords at risk

Article comments

London radio station Last FM has asked its users to change their account passwords after becoming the latest high-profile firm to own up to the possibility of a security breach.

The company didn’t explain why it believed a breach to have occurred but the tone of apologetic urgency was unmistakable.

“We are currently investigating the leak of some Last.fm user passwords. This follows recent password leaks on other sites, as well as information posted online,” said a notice on Last FM’s site posted late on 7 June.

“We will never email you a direct link to update your settings or ask for your password,” continued the notice after asking users to change their password as soon as possible.

Security companies have reported that the number of Last FM passwords stolen could be as high as 2.5 million.

Perhaps there is strength in numbers as far as embarrassment goes, but the latest breach is starting to look like part of a pattern.

"Can it be coincidence? It seems unlikely to me. There's a mystery in the middle of the LinkedIn breach about how they got the data. You have to worry there's a common vulnerability,” resident Sophos security expert Graham Cluley told the BBC.

"The fact is, the only people who know are the hackers and maybe the companies concerned, but they may be struggling to work out what's happened.

Two other sites also appear to have suffered major password breaches in recent days, LinkedIn and dating site eHarmony – the second to hit the latter site in recent times. If a specific vulnerability connects these hacks to one another more breaches will probably follow in the coming days.

Gaining access to passwords does not immediately reveal them as long as they have been ‘hashed’ – encrypted – but even this technique might no longer be sufficient to deter determined attackers if ‘salting (the addition of random elements that makes hash comparison against a lookup table nearly impossible).

“The indiscriminate proliferation of data breaches across all industry sectors should serve as a clear warning that perimeter defences such as encryption and anti-virus software, are no longer enough to effectively protect IT infrastructures and personal information,” said Ross Brewer of LogRythm.



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *