Another unnecessary pain in the ass.
Just an FYI...the PW reset interface (gui) is flakey here on HCS.Click on "User CP" top center of the page
Under "Settings & Options" Click "Edit Email & Password"
Enter Current Password
Enter New Password
Confirm New Password
Click "Save Changes"
I would sure love it if anyone could help me get logged with my previous username "X2freeride" I've tried following the process at the top of the forum to no avail. I setup my account with an old hotmail account and I no longer have access to that account so i cannot get logged in as X2freeride. I am also unable to use my gmail account because the form says its not recognized. Can any moderators or Administrators help me?
Just an FYI...the PW reset interface (gui) is flakey here on HCS.
I just went through the pw reset on another forum (Camaros.net) and the PW interface worked fine. Enter your old pw, enter your new pw and as you meet the PW requirements, the 'X' goes to a check mark. enter your new pw again in the confirm field, hit save and your good.
Here, the 'X's don't change, and the save button is not activated. What I had to do was enter everything, erase the new pw in the confirm field. This then changed the 'X's to check marks. enter my new pw again in the confirm field and hit the save button (which became active when I did the erase mentioned above)
Your results may vary.
Tuning a Tilliston carburetor is easier than the PW reset on this site.:thumbsup:
After trying to reset mine about 10 times I finally realized all I had to add was a symbol to my new PW to activate the reset button then it worked
I just want to post here to shed a little more light on the situation, at least as much as we can provide at the moment.
A 3rd party plugin that we and other networks use had it's developers' compromised. Their DB was breached and data was scraped. I can't ID the plugin as it's under legal investigation. However I can say that it had access to user data because it functions separately from the vb software. Many plugins do this, chats, news letters, mobile apps etc. This is not an active breach, however as a precaution we did initiate security updates including password changes and new pass requirements.
Their system was compromised and they grabbed user data for us and thousands of others.
We cleared our part of the breach and went this route to further security.
This is also in place as many members on the internet use the same or similar passwords across all things they use.
Hackers who have access to these accounts, may be able to access other platforms where the same email and/or passwords are used.
Other platforms have been compromised as well, including Twitter, Linkedin etc. We are just trying to get ahead of this, and nip it in the bud as soon as possible.
We cannot go into detail at the moment as it is being dealt with on a legal level.
Though this breech happened in Feb, we were not notified until very recently, and acted on it once were. We worked hard to find a solution for this mess, and implemented it as soon as we could. Though it may not be ideal in some eyes, it is the best we have access to ATM.
Once the storm settles we may look into other methods for our security, but right now we ask that you be patient with us.
As for us not responding to members, you have to understand our community support team watches over many sites. Luckily this week and last, we have had many members from other teams offer help. With that said all emails sent to our Contact Us email will be dealt with. Granted, it may take a little time for us to get to all of them, but please be patient with us as we are working really hard to catch up and help everyone.
If there are any other questions/concerns/feedback, please feel free to post them here.
Thank you for your patience and understanding,
Notice of Data Breach
You may have heard reports recently about a security issue involving VerticalScope. We would like to make sure you have the facts about what happened, what information was involved, and the steps we are taking to help protect you. VerticalScope owns and operates a number of community websites. You are receiving this email because you are a registered user of the following community website(s) involved in the data breach:
On June 13, 2016, we became aware that February 2016 data stolen from VerticalScope was being made available online.
What Information Was Involved?
Community member usernames, email addresses, hashed passwords, community userIDS, community website, and the IP address the username originally registered with.
What We Are Doing
We have invalidated passwords of all VerticalScope user accounts. We have posted a site security notification on each site updating users on the potential risk to certain accounts, the password reset and steps we are implementing to improve security. We have implemented stronger password rules (passwords now require a minimum of 10+ characters and a mixture of upper- and lower-case letters, numbers and symbols) along with automated account password expiries to encourage more frequent password changes. We will remind our users to use good password practices (not using the same password for multiple online accounts and using unique strong passwords). We are in the process of implementing additional safeguards to detect, alert and mitigate any future brute force attempts, and have notified our third party vendors that interact with our various forum API's of the February breach to allow their own security teams to investigate. We are continuing our investigation and will be collecting information to provide to the appropriate law enforcement authorities.
VerticalScope is taking steps to strengthen account security. We were already using encrypted passwords and salted hashes to store passwords, and our new password controls are intended to further strengthen user security. We are taking steps to investigate and test new encryption and security technologies to further protect our users.
What You Can Do
To keep your account as safe as possible, we recommend that you regularly change your VerticalScope community password, and that you use a unique password for each of your online accounts. Using the same password for multiple online accounts significantly increases your chances of being compromised. Even though the passwords stolen in February were hashed, we recommend that if you were using (or are currently using) your VerticalScope community password across multiple online accounts, that you change your password for such other online accounts. We encourage you to regularly review your accounts and report any suspicious or unrecognized activity immediately.
For More Information
If you have any questions, please feel free to contact our Community Management team by email at [email protected] or on the website that you frequent. A support thread has been created on each website, and our support teams are on there to help you through the process and answer any questions you may have. A Notice of Data Breach is also available on community websites involved in the data breach.
This email was sent by VerticalScope Inc., 111 Peter Street, Suite 700, Toronto, ON, M5V2H1. If you have any questions regarding the communications you receive from us, please contact us.