Skip to content

Intellepedia

IP News Center

  • Home
  • Patents
  • Trademarks
  • Copyrights
  • Designs
  • Trade Secrets

Privacy: The LinkedIn Security Breach

Author: Intellepedia
May 30, 2016
Privacy / Data Protection

Summary

This post critically examines the LinkedIn security breach incidents of 2012 and 2016, focusing on the technical shortcomings in password protection and the company’s response strategies. It highlights how inadequate encryption practices, such as the lack of salting, contributed to the breach and left millions of user accounts vulnerable. Despite LinkedIn’s subsequent actions, including password resets and improved hashing, user accounts remain at risk due to persistent password reuse and insufficient user awareness. The analysis underscores the need for stronger security measures by service providers and proactive steps by users. The post concludes that a comprehensive overhaul of LinkedIn’s security approach is necessary to address ongoing threats.

LinkedIn, a business oriented social networking site which was founded in the year 2002, has recently found its way in the headlines for the latest data breach committed by hackers on May17, 2016. This wasn’t the first time it had faced such a breach. On 5th  June, 2012, a  group of hackers managed to get hack 6.5 million user accounts and by the morning of June 6, passwords of such accounts were available online in plain text.  This was followed by an apology by LinkedIn asking its users to immediately change their passwords. The company officials implemented a mandatory password reset for affected users. The internet security experts stated that the passwords were easy to unscramble because of LinkedIn’s failure to use a salt when hashing them, which is considered an insecure practice.

The breach which had affected around 6 Million users was just the tip of the ice berg. According to the latest news, the data that was hacked recently on May 17th, 2016, was advertised on a dark website named Real Deal by someone with the user name peace_of_mind. It offers the hacked data of 167 million accounts for five bitcoins, which at current exchange rates is worth about $2,200. After becoming aware of the data breach, LinkedIn sent out an email stating that they are taking immediate steps to invalidate the passwords of the affected accounts, and they will contact those members to reset their passwords. Further, LinkedIn invalidated the passwords at risk. They also suggested the users to visit their safety centre to ensure they have two-step verification authentication and to use strong passwords in order to keep their accounts as safe as possible. Surprisingly, LinkedIn’s response to the most recent breach is to repeat the same procedure which it had adopted in the original breach, by once again forcing a password reset for only a subset of its users.

This hacking has been attributed to the insufficient security measures which were undertaken by LinkedIn.  The leaked source reveals that most of the passwords which were hacked were extremely common passwords.  According to the leaked source around 2.2 million of the 117 Million passwords which were exposed were easily guessed passwords. The password selling site also claims that passwords were stored in SHA1 with no salting, and this is not what internet standards propose. However, LinkedIn claims that after the breach which took place in 2012, it has added salt to its password hashing function. The site further claims that only 117 million accounts have passwords , while it is suspected that the remaining users have registered using Facebook or similar social media portals. It is pertinent to note that if someone is a LinkedIn user and has not changed his LinkedIn password since 2012, then his password may not be protected with the added salting capabilities making it vulnerable to the attack.

Despite the steps which are being taken, the users of LinkedIn are still under a potential risk. Hackers are reportedly selling the trove of stolen emails and passwords, and even if they no longer work with LinkedIn, the credentials can potentially be used to unlock other popular sites and online services due to password reuse. The users need to be made aware regarding recurring instances of hacking of passwords. Sites like LinkedIn should pay more attention while giving a nod to stronger passwords and must stress on stronger encryption. Ensuring security on the internet demands attention from both the side of service providers and users. Even users should refrain from using the same password for multiple sites. They should also keep changing passwords at regular intervals to avoid unauthorised access to their passwords.  The numbers of passwords which have been leaked makes it apparent that the current security approach of LinkedIn needs a complete overhauling.

Authored by- Sudha Sameeskhya Mohanty

Sources 1, 2,3, 4

Related articles section RELATED POSTS

  • AI, Identity & Injunctions: The Vivek Anand Oberoi Personality Rights Case
  • Weekly Antitrust and Data Privacy Updates
  • Weekly Antitrust and Data Privacy Updates
  • Weekly Antitrust and Data Privacy Updates
  • Weekly Antitrust and Data Privacy Updates
  • Weekly Anti-trust and Privacy Updates

About the author: Intellepedia

Photo of Intellepedia
Written by

Intellepedia

View all 2625 posts →

Category

Privacy / Data Protection

Tags

cyber security, data breach, indian legal analysis, linkedin security, online privacy, password protection, user account safety

Post navigation

Previous Previous post: National IPR Policy – Design Related Objectives
Next Next post: Google’s use of Java APIs in Android – fair use?

Categories

IP News

Trending Posts

  • AI Inventorship and the DABUS Refusal in India: Patent Opponent’s Submissions in the Patent Office Order
  • Delhi HC Orders Xiaomi to Pay ₹272 Crore in Standard Essential Patent (SEP) Dispute
  • Senior Trademark Associate Opening for Professionals with 5+ Years of Trademark Experience
  • No Reasons, No Refusal - and No Absolute Bar Anymore: Bombay HC on Atomic Energy & Nuclear Patent Rejections
  • Patent Rights Protected Despite NBA Approval Delay: Fresh Examination Directed
  • Delhi High Court Revisits the Scope of Section 3(d) in Agrochemical Patents
  • 10 Day IP Practice Courses to Build Practice Ready Professionals for an AI Enabled Practice
  • Senior Trademark Associate Opening for Professionals with 5+ Years of Trademark Experience
  • Design Is Not a Shield: Delhi High Court on Patent Infringement in the Packaging Industry
  • Why Owning a Logo Doesn't Mean Owning Its Letters - the A TO Z' Trademark Dispute

Featured Posts

  • AI and the Future of In-House IP Counsel Jobs in India: Which Roles Will Survive?
  • Delhi HC Orders Xiaomi to Pay ₹272 Crore in Standard Essential Patent (SEP) Dispute
  • Copyright Enforcement, Quick Court Orders, and the Rise of Intimidatory Tactics
  • Design Is Not a Shield: Delhi High Court on Patent Infringement in the Packaging Industry
  • Patent Attorneys: From Strategic Professionals to Ordinary Vendors? The Changing Soul of India’s Patent Ecosystem
  • Breaking Beams, Breaking Records: Delhi High Court Awards ₹152 Crore in Antenna Patent Infringement Suit Against Rosenberger
  • Artificial Intelligence in IP Practice: Managing Psychological Trauma, Stress, and Anxiety in a Changing Landscape
  • Wanted Dead or Alive: Delhi High Court Holds Patent Revocation Survives Expiry and Section 107 Defence
  • Safeguarding Digital Identity in the age of Deepfakes: An analytical study of AI regulation in India with special reference to Personality Rights jurisprudence
  • Gen AI, Copyrights, and Hybrid Licensing in India Why the Assumptions May Not Sustain the Model

Random Posts

  • AI and the Future of In-House IP Counsel Jobs in India: Which Roles Will Survive?
  • Too good to be true: the ALPS Rosemary Water Trademark Infringement case
  • Delhi High Court Revisits the Scope of Section 3(d) in Agrochemical Patents
  • Trade Dress Passing Off: Delhi HC Restrains GAINDA from Copying HARPIC, COLIN & LIZOL Get-Up
  • Two Piscos, One Bar: Delhi High Court Division Bench Confirms Dual GI Identity for Peru and Chile
  • Ideas Fly, Adoption Walks: Why New Technology Still Takes Its Own Sweet Time
  • You Can’t Park Patent Rights in the E-Ricksha Registration Lane
  • Trademark: ‘One For All’, Distinct For One? Delhi High Court Says Yes
  • Intellepedia's Top Trademark Articles of 2025: A Year in Review
  • Amendment of claims at Appellate Stage under section 59 of the Patents Act

Convert Documents to Accessible Formats

https://www.robobraille.org/

Visit BananaIP Counsels Website

https://www.bananaip.com

Disclaimer

Intellepedia is an independent knowledge sharing initiative of BananaIP. All content on this website is intended solely for general information and educational purposes and does not constitute legal advice or create an attorney client or advocate client relationship. This website and its content do not amount to advertisement, solicitation or inducement of any kind for legal or professional services. All opinions expressed by individual authors are their own and do not reflect the views or positions of BananaIP or any organisation or firm with which they may be affiliated.

We welcome your questions, suggestions and corrections. If you are interested in contributing as an author, please write to us. Intellectual property experts and professionals from all related fields are welcome to participate.

Contribute to Intellepedia

contact@intellepedia.org

Archives

  • Home
  • Patents
  • Trademarks
  • Copyrights
  • Designs
  • Trade Secrets

© 2026 Intellepedia. All Rights Reserved.

Terms of Use | Privacy Policy | Accessibility Statement