Skip to content

Laurel Papworth Lecturer and workshops on AI: ChatGPT and MS Copilot

  • AI Courses
  • Keynote
  • About LaurelExpand
    • About Laurel Papworth
    • KEYNOTE on ChatGPT
    • Events/Conferences on AI
    • Articles on Metaverse
    • Clients
    • Contact
    • Testimonials 2005 – Today
  • Alchemy Podcast
  • LecturesExpand
    • Artificial Intelligence
  • Articles (All)
Laurel Papworth Lecturer and workshops on AI: ChatGPT and MS Copilot
Home / Second Life and security breach

Second Life and security breach

ByLaurel Papworth September 8, 2006

I’m guessing that when Second Life said they were activity encouraging user generated content and member software… Hello Second Lifers, As announced on our website at http://secondlife.com/corporate/bulletin.php and corporate blog at http://blog.secondlife.com/?tag=security, Second Life discovered an attack on our servers on September 6, 2006. The full security bulletin is reprinted below, followed by a FAQ…

I’m guessing that when Second Life said they were activity encouraging user generated content and member software…

Hello Second Lifers,

As announced on our website at http://secondlife.com/corporate/bulletin.php and corporate blog at http://blog.secondlife.com/?tag=security, Second Life discovered an attack on our servers on September 6, 2006. The full security bulletin is reprinted below, followed by a FAQ that includes important security advice for our community.

===================
SECURITY BULLETIN

*SAN FRANCISCO, CA. (September 8, 2006)* – Linden Lab reported today that it is notifying its community of a database breach, which potentially exposed customer data including the unencrypted names and addresses, and the encrypted passwords and encrypted payment information of all Second Life users. Unencrypted credit card information, which is stored on a separate database, was not compromised.

The breach was discovered on September 6, 2006 and promptly repaired. The company then launched a detailed investigation that revealed an intruder was able to access the Second Life databases utilizing a “Zero-Day Exploit” through third-party software utilized on Second Life servers. Due to the nature of the attack, the company cannot determine which individual data were exposed. The company’s technical investigation is ongoing.

… this wasn’t what they meant.

Technorati Tags Online Communities, Second Life, Zero Day Exploit, Linden Lab,

Post Tags: #blogs#Linden Lab#Online Communities#Online Communities#SAN FRANCISCO#user generated content

Post navigation

Previous Previous
Peter Brock and wikiNews?
NextContinue
Social Capital – value of your network
  • Terms and Conditions
  • Testimonials 2005 – 2021
  • Contact
  • Privacy Policy

© 2025 Laurel Papworth Lecturer and workshops on AI: ChatGPT and MS Copilot

pa@laurelpapworth.com
+61432684992
Mount Victoria, NSW 2786
Australia
Facebook Twitter Instagram YouTube Linkedin
  • AI Courses
  • Keynote
  • About Laurel
    • About Laurel Papworth
    • KEYNOTE on ChatGPT
    • Events/Conferences on AI
    • Articles on Metaverse
    • Clients
    • Contact
    • Testimonials 2005 – Today
  • Alchemy Podcast
  • Lectures
    • Artificial Intelligence
  • Articles (All)