DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Hacked security plugin firm stored customer passwords in plaintext. Seriously?

Posted on October 1, 2014 by Dissent

Graham Cluley writes:

 … from time to time, firms find themselves in the position of admitting that they have messed up massively with potentially disastrous consequences for their business and their innocent customers.

What makes it even worse, however, is when the company that has fallen woefully short really should have known better.

One such company which can offer no reasonable excuses is iThemes, the “one-stop shop for WordPress themes, plugins and training.”

Read more on State of Security.


Related:

  • HIPAA Compliance and Breach Communications: Helpful Tips for SMBs
  • Kept in the Dark -- Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
  • "I'm Not Pro-Russia and I'm Not a Terrorist!" —- InfraGard and Airbus Hacker “USDoD” Unveils His New Campaigns
  • NY Attorney General James Gets Dunkin’ to Fill Holes in Security, Reimburse Hacked Customers
  • School district hiding behind a criminal investigation - parent
Category: Business SectorCommentaries and AnalysesHack

Post navigation

← UK: Northmavine parents lodge SIC privacy complaint
Over 90 million hacker attacks registered in Russian Internet since 2010 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Russian Ransomware Administrator Pleads Guilty to Wire Fraud Conspiracy
  • LeakBase seized, arrests made as part of global action
  • Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
  • 1,700 Dutch police officers get reminder not to access files without legitimate purpose
  • Israeli spies ‘hacked every traffic camera in Tehran to plot killing of Iran’s Ayatollah Ali Khamenei’
  • Congress finds data brokers cost consumers tens of billions of dollars
  • Evoke Wellness at Hilliard updates its breach notification
  • Data from Insight Hospital and Medical Center Leaked on Dark Web
  • Wisconsin k-12 district hit by weeklong outage
  • Project Compass: first operational results against The Com network

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Allstate must face privacy lawsuit over cellphone tracking of drivers
  • Spain fines FC Barcelona €500,000 for failing biometric data protection assessment
  • Polish doctors jailed for denying woman abortion
  • France’s Highest Administrative Court Upholds CNIL’s Standard On Anonymization
  • Dutch police reminded not to snoop in files without legitimate purpose

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.