Civil Rights
Block on Trump's Asylum Ban Upheld by Supreme Court
Cloud storage provider Dropbox has denied that it was hacked, following the posting of account information and passwords for hundreds of Dropbox accounts online earlier this week.
What was initially reported as a hack in which almost 7 million Dropbox accounts were compromised seems now to be limited to only a few hundred accounts. In a statement reported by ZDNet, Dropbox claims that the emails, addresses, and passwords associated with these accounts were stolen "from an unrelated service" and not from Dropbox itself.
Fortunately for Dropbox users, the data breach was less widespread than initially feared. Nevertheless, what do consumers need to be aware of when it comes to the security of their online accounts?
Although you may have selected only something you would know as the password to one or more of your online accounts, there's a good chance that if that password has been in use for more than a year or two it may no longer be safe, especially if that same password is in use across multiple online accounts.
The email addresses and passwords posted by hackers in the latest purported hack were most likely culled from previous data breaches involving other websites. For example, in 2013 researchers discovered a database of 2 million stolen login credentials associated with Facebook, Twitter, Google, LinkedIn and other web services. If your email address/password combination was compromised in that hack, or any other of the litany of hacks on major web services over the past several years, it may be used to access other services using that same combination.
When it comes to password security, following a few small steps can prevent hackers from gaining access to your online accounts:
Increasingly, web services such as Dropbox are also building in features that detect suspicious log-in attempts. In this case, Dropbox said it detected attempts to access accounts compromised by hackers and reset the passwords to the affected accounts.
Related Resources: