Feeds

Bitly shortens life of users' passwords after credential compromise

OAuth tentacles mean it's time to change ANOTHER password

Top 5 reasons to deploy VMware with Tegile

URL-shortening and online marketing outfit Bit.ly has warned its systems have been accessed by parties unknown and suggested users change their passwords.

In an advisory visible here, the service says "We have reason to believe that Bitly account credentials have been compromised" but that "We have no indication at this time that any accounts have been accessed without permission." The company also swears it has "... already taken proactive measures to secure all paths that led to the compromise and ensure the security of all account credentials going forward."

Don't get too comfortable, though. Bit.ly encourages users to employ OAuth to link their accounts with Facebook and Twitter. The outfit has severed those links to stop account hijacking.

Long story short? It's time to change passwords and even if you can't recall signing up for Bit.ly it may be worth checking to see if you ever linked your social media accounts to the service. OAuth makes it stupidly easy to make such links, and also stupidly easy to forget you ever did so ... until p0wnage like this prods your memory. ®

Intelligent flash storage arrays

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.