Possible hack: Dell resets customer passwords

Currently Dell has reset all customer passwords for his site dell.com. The reason is a suspected security incident (hack) in the company.


Advertising


The information is contained in a press release dated November 28, 2018, in which Dell announces the following: Die Information findet sich in einer Pressemitteilung vom 28. November 2018, in der Dell folgendes mitteilt:

Dell is announcing that on November 9, 2018, it detected and disrupted unauthorized activity on its network attempting to extract Dell.com customer information, which was limited to names, email addresses and hashed passwords. Though it is possible some of this information was removed from Dell’s network, our investigations found no conclusive evidence that any was extracted.

Additionally, Dell cybersecurity measures are in place to limit the impact of any potential exposure. These include the hashing of our customers’ passwords and a mandatory Dell.com password reset. Credit card and other sensitive customer information was not targeted. The incident did not impact any Dell products or services.

Upon detection of the attempted extraction, Dell immediately implemented countermeasures and initiated an investigation. Dell also retained a digital forensics firm to conduct an independent investigation and has engaged law enforcement.

In this age of highly sophisticated information security threats, Dell is committed to doing all it can to protect customers’ information. This includes encouraging customers to change passwords for other accounts if they use the same password for their Dell.com account. Dell will continue to invest in its information technology networks and security to detect and prevent the risk of unauthorized activity.

Dell.com customers can find more information on a dedicated web page Dell established at www.dell.com/customerupdate. (via)


Advertising


This entry was posted in Security and tagged , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *