Following hack, Evernote speeds move to two-factor authentication
The company is one of many trying to shore up its systems in the face of aggressive hackers
IDG News Service - Evernote is speeding up its plans to offer two-factor authentication to users following a recent data breach that exposed user names, email addresses and encrypted passwords.
The company, which makes note-taking software, disclosed on its blog on Saturday that an attacker accessed its internal network, which forced it to reset 50 million user passwords. Payment information was not accessed, Evernote said.
The company had planned to roll out two-factor authentication to users eventually but is now accelerating those plans, according to an Evernote spokeswoman.
Two-factor authentication usually requires a user to enter a time-sensitive code in addition to their user name and password. The code can be sent by SMS, or a standalone application such as Google Authenticator can generate a code.
Two-factor authentication poses a somewhat higher barrier for hackers, who not only need to capture a person's static login details but also the code.
It is not impossible to get the code, however, and several malicious software programs for mobile devices have been able to snatch it. If that interception is successful, the hacker can then quickly enter the details and log in to a person's account.
Other security features are also in the works. Evernote said it will offer "significant upgrades to the optional client-side encryption features later this year, including updated algorithms to take advantage of the additional flexibility allowed under changes to the US export control laws, as well as other user-selectable features."
Evernote is just one of many companies, including Apple, Facebook and Microsoft, that have disclosed hacking incidents in recent weeks,.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cybercrime and Hacking White Papers | Webcasts