screenshots on Twitter of the purported stolen data . Austal says the material is neither sensitive nor classified and that it has taken steps to secure its data systems. `` The data breachAttack.Databreachhas had no impact on Austal 's ongoing operations , '' the company says . Austal 's business in the United States is unaffected by this issue , as the computer systems are not linked . A spokesman for Austal contacted on Friday says he could n't offer further information on the incident . The breachAttack.DatabreachexposedAttack.Databreachship design drawings that are distributed to customers , fabrication subcontractors and suppliers , Austal says . It also exposedAttack.Databreach`` some staff email addresses and mobile phone numbers . '' Those individuals have been informed as well as a `` small number '' of other stakeholders directly impacted by the breach , the company reports . Austal has contacted the Australian Cyber Security Center and the Australian Federal Police . The Office of the Australian Information Commissioner , which enforces the country 's data protection regulations `` will be involved as required , '' Austal says . Companies are increasingly being subjected to ransomsAttack.Ransomby hackers after their networks have been breachedAttack.Databreach. RansomsAttack.Ransomput companies in tough positions : risk public exposure of potentially embarrassing data , or risk paying a ransomAttack.Ransomand still face a chance the data could be released anyway . Security experts and law enforcement generally advise against paying ransomsAttack.Ransom, even after incidents of file-encrypting malware . But some companies have viewed the situation as either a cost of doing business or a shorter route to recovery . Late last month in the U.S , the city of West Haven , Connecticut , paidAttack.Ransom$ 2,000 to unlock 23 servers that had been infected with ransomware ( see : Connecticut City Pays RansomAttack.RansomAfter Crypto-Locking Attack ) . The city 's attorney , Lee Tiernan , was quoted by the Associated Press as saying `` research showed it was the best course of action . '' If the city did n't have a backup file , it may have had little choice .
DocuSign , with over 100 million users , is one of the world ’ s largest providers of electronic signature technology and digital transaction management . Recently , DocuSign acknowledged that they have been the victim of a malware phishing attackAttack.Phishing. The data breachAttack.Databreachhappened at one DocuSign computer system location and has since been contained . While short-lived , the malware was able to obtainAttack.Databreachmany customer and user emails from the DocuSign database . Fortunately , the breachAttack.Databreachwas limited to email addresses ; no documents or further customer information was accessedAttack.Databreachin the attackAttack.Databreach. The attackers have begun sending outAttack.Phishingmalicious emails with the company ’ s branding to DocuSign customers and users . In an alert on the DocuSign website , the company shared that it is tracking these emails which carry a downloadable Microsoft Word document harboring malware to attack the user ’ s system . The email subject line has been known to read : “ Completed : docusign.com – Wire Transfer Instructions for recipient-name Document Ready for Signature. ” How to protect yourself If you are not expecting an email via DocuSign , do not click on the link . If you are expecting a document , but are unsure of the source , you can access your document directly by visiting docusign.com . Every legitimate DocuSign email has a code which the user can enter on the website to access their document . DocuSign has asked that people forward suspicious emails to spam @ docusign.com then delete the email from their inboxes . It is important to remember that DocuSign will never request a customer or user to open a PDF , Microsoft Office document or ZIP file in an email .
Allrecipes , the self-described `` food-focused social network '' , has sent an email out to some of its users warning that their email addresses and passwords may have been interceptedAttack.Databreachby an unknown third-party . In the email , the site warns that users who registered an allrecipes.com account or logged on as a registered member of the site prior to June 2013 ( yes , that 's almost four years ago ) , may have had their email address and password stolenAttack.Databreach. Part of the email reads as follows : We recently determined that the email address and password typed into allrecipes.com by members when they created or logged into their accounts prior to June 2013 may have been interceptedAttack.Databreachby an unauthorized third party . Based on information available to us , we can not determine with certainty who did this or how this occurred . Our best analysis is that email addresses and allrecipes.com passwords were interceptedAttack.Databreachduring account registration or login by our members . To its credit , the site has advised affected users to change their Allrecipes password , and ensure that they are not using the same password anywhere else on the net : Out of an abundance of caution , we recommend that all members who registered or logged into allrecipes.com prior to June 2013 promptly change their password . We are taking other steps as well and will continue to work diligently to deter unauthorized activity . You should promptly change your password on allrecipes.com and on any other sites for which you use the same username and password . From what I have seen , Allrecipes has only mentioned the breach when asked direct questions about it via Twitter . How hard would it have been to post a link to an advisory on the front page of its website , and tweet out a link to it ? . Clearly plenty of questions remain about how this security breach might have happened , and Allrecipes ' response to it . But at the very least I would have been pleased to see them be more transparent with their users . The data breachAttack.Databreachhas , understandably , left an unpleasant taste in the mouths of affected users - some of whom turned to Twitter to express themselves . That Twitter user is correct . It 's not just a problem that their password has been exposedAttack.Databreach. Passwords , after all , can be changed fairly easily and if you 're only using it one place than the risks are , at least , reduced . Most users , however , only have one email address and are n't keen to change them that often . A hacker who has stolenAttack.Databreachyour email address and password may not only attempt to use those credentials to unlock other online accounts you own , but might also monetise their theft by launching spam or phishing attacks against your inbox .