Password Security and Hash Slippage
- Last.fm - presumably up to 17 million lost hashes - Algorithm used: MD5 - Hashes were Not salted
- eHarmony - 1.5 million hashes - MD5 - No salted - All upper-case-passwords
- LinkedIn - 6.5 million hashes - SHA1 - Not salted
I just wonder how the hackers got access to the hashes in the first place...I could not find any information on that, yet. Maybe another juicy story...
 http://blog.last.fm/2012/06/08/an-update-on-lastfm-password-security  http://www.jasypt.org/  http://www.springsource.org/spring-security
(Note: Opinions expressed in this article and its replies are the opinions of their respective authors and not those of DZone, Inc.)