Update: Hackers claim to break into Palin's Yahoo Mail account
It's 'incredibly dangerous' to use a private account, says security expert
A group of hackers that hit the Church of Scientology's site earlier this year have apparently cracked the Yahoo Mail account belonging to Gov. Sarah Palin, the Republican nominee for vice president, according to documents and screenshots posted on the Web.
A security expert called the practice of using private e-mail accounts "incredibly dangerous" for public officials such as Palin.
The group, which calls itself "Anonymous," announced that it had gained access to Palin's Yahoo account in a message last night to, a site that regularly posts confidential documents. Among the files that WikiLeaks had posted for download were five screenshots from email@example.com, an address book and two digital photos of Palin's family.
One of the account's screenshots shows a short exchange in July between Palin and Lt. Gov. Sean Parnell, who is running against Democrat Ethan Berkowitz for Alaska's lone congressional seat. In her reply, Palin called Anchorage-based conservative radio host Dan Fagan "inconsistent and purposefully misleading" in his comments about Parnell.
Another screenshot displays the text of a message to Palin from Amy McCorkell, whom Palin appointed to the Governor's Advisory Board on Alcoholism and Drug Abuse in October 2007. According to a press release issued by Palin's office at the time, McCorkell was previously a private legal investigator, an office worker and a fitness instructor and, like Palin, lives in Wasilla, Alaska.
In the message dated Sunday, McCorkell said: "I am reading the paper and have thoughts and prayers going your way ... don't let the negative press wear you down! Pray for me as well. I need strength to 1. keep employment, 2. not have to choose. Lately I just pray may God's will be done."
The day before, The New York Times had published a story critical of Palin's hiring practices as governor. The story did not mention McCorkell but said that Palin had appointed at least five former high school classmates to state positions since she took office.
Palin has come under criticism for using private e-mail accounts to conduct state business, with some alleging that she and others in her administration have used them to skirt message-retention and public records laws. The Bush administration has been accused of doing the same thing.
"Using private accounts for government or business use is incredibly dangerous," said Adam O'Donnell, director of emerging technologies at message security vendor Cloudmark Inc. "There's a reason why you have an official account. It's so that you can apply proper security management to the account."
Palin e-mail hack
- Report: Tenn. legislator confirms son is at center of Palin hack chatter
- Web proxy firm working with FBI to trace Palin e-mail hacker
- IT Blogwatch: Sarah Palin e-mail hacker drops anchor, arrr!
- Security researchers ponder possible Palin hacks
- Update: Hackers claim to break into Palin's Yahoo Mail account
- Sharon Machlis: Yahoo users: Like Sarah Palin, you may be vulnerable to an e-mail hack
- Douglas Schweitzer: How safe is your e-mail correspondence?
- Global News Update: Thursday, September 18, 2008
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Firewall Buyers Guide Operate as the core of your network security infrastructure
- Getting Started With a Zero Trust Approach to Network Security The Traditional Approach to Network Security is Failing. View Now>>
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts