DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

LinkedIn reportedly spent nearly $1 million already to fix security breach (updated)

Posted on August 2, 2012 by Dissent

Gene Ryan Briones reports:

Following the hapless security infraction that LinkedIn experienced two months ago, the company is now saying that it has spent a huge amount of money to fix the problem. Fresh from its earnings call today, LinkedIn CFO Steve Sordello said that the company has spent between $500,000 and $1 million on forensic work after 6.5 million LinkedIn hashed passwords were leaked and posted on a hacking site in Russia early in June.

Read more on Ubergizmo.

Okay, that’s for the forensics.

In a subsequent media report, the firm was quoted as saying it will likely invest $2-3 million in security upgrades by the end of 2012.


Related:

  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Canada says hacktivists breached water and energy facilities
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • How a hacking gang held Italy’s political elites to ransom
Category: Breach IncidentsBusiness SectorHack

Post navigation

← Boston Water and Sewer Commission warns of possible customer info leak
OR: Hacking cases down, still a threat: by the numbers →

1 thought on “LinkedIn reportedly spent nearly $1 million already to fix security breach (updated)”

  1. IA Eng says:
    August 6, 2012 at 6:36 am

    Thats FORENSIC work; probably costs associated with the findings in order to bring the criminals to justice. A Million Dollars is a spit in the bucket when it comes to a decent sized Datacenter. Its just another company driven by someone who doesn’t have a clue what security is until the hack pulls their pants around therr ankles.

    I deleted my account on the Linked In site a while ago. Linked in turned into a spam engine with everyone and their brother sending requests to join groups, mail about whats hot and not – in their mindset not mine, and general who gives a crap emails. Opting Out didnt work worth a damn either.

    I shake my head when companies say we threw a MILLION dollars at the problem. That don’t mean SQUAT unless you know what the technology will do – or will NOT do for you. The general public will OHHHH and AHHHHH about the cash spent on technology – and maybe a person or two to be used as sacrificial lambs should another breach occur.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.