A leak of LinkedIn’s user data concerned has the service and its thousands of users. The problem would have occurred in 2012 and affected 167 million accounts. The LinkedIn admitted that its servers were hacked in 2012, which would have resulted in the leak of passwords. At the time, the accounts involved, about 6.5 million, went through a password reset. As a precaution, the company advised that other users do the same.

This week, LinkedIn found that the old problem was not over. In Deepweb a member started selling access data package of 117 million LinkedIn accounts were obtained from information leakage in 2012. The price for all this: 5 bitcoins (US $ 2.2000). However, the number of accounts that may have been violated is even greater. According to LeakedSource, a site that says help users find out if your private information is available on the Internet, said to have access to data 167 370 910 accounts. The LinkedIn says that his service was not invaded, therefore, the information should be the same problem that occurred in 2012. According to one of those responsible for LeakedSource, it is very likely that the data were under the control of a small Russian group. To avoid fanfare at the time, which would cause many users changed their passwords, the information was stored until then. The passwords were encrypted, but without the application of “salt” (salt), key derivation technique that helps protect the combination of some attacks. Because of all this, from Wednesday (18), the LinkedIn is sending emails to their users requesting to modify their passwords. The service is also invalidating all passwords created by 2012. The same applies to the accounts which have not been updated since that year.

He was born in California, US. He graduated from California University with a degree in Computer Sciences, and now works for Reuters and running this Weekly Newspaper. Alongside his day jobs in Reuters, McDonald is also broadcasting a Weekly Gazette.