
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Avoiding a High Profile Breach with Preventative IT","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"8vMBYn5Pje\"><a href=\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/\">Avoiding a High Profile Breach with Preventative IT<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/embed\/#?secret=8vMBYn5Pje\" width=\"600\" height=\"338\" title=\"&#8220;Avoiding a High Profile Breach with Preventative IT&#8221; &#8212; OTAVA\" data-secret=\"8vMBYn5Pje\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"The Adobe hack originally reported earlier this month turns out to have affected 38 million total users, including financial and personal account data. Adobe claims the 2.9 initially reported had their credit cardholder data compromised, while the additional millions had their encrypted passwords stolen. In addition, a letter to Adobe customers claims that hackers may have even used their systems to decrypt some of the passwords. While merely speculative during early investigations, it has been recently verified that the source code for Adobe ColdFusion, Acrobat, Reader, and Photoshop have been stolen and posted online. Photoshop\u2019s source code appeared to be unencrypted, according to TheVerge.com. As I\u2019d originally wrote about in Source Code, Encrypted Data Stolen as 2.9 Million Affected in Adobe Breach, compromised source code is serious business since a breach of an end user product allows hackers to write new malware and viruses for said product, and use them to access sensitive\/confidential corporate or personal data. JDSupra Law News has deemed 2013 as the \u201cYear of the Mega Breach Cybersecurity Awareness Month\u201d due to the sheer size and litany of big-name breaches in the past few months alone &#8211; they name the seven biggest breaches of the year to..."}