Skip to Main Content

Nvidia Shuts Down Developer Zone After Hack

Nvidia today shut down its Developer Zone after a hack that might have gained access to password information.

July 13, 2012

When it rains, it pours. One day after a breach that unveiled the email , Nvidia today shut down its Developer Zone after a hack that might also have gained access to password information.

"Nvidia suspended operations today of the Nvidia Developer Zone (developer.nvidia.com)," the company said in a note on its website. "We did this in response to attacks on the site by unauthorized third parties who may have gained access to hashed passwords."

Nvidia said it is investigating and "working around the clock" to solve the problem. In the meantime, the company suggested that users who used their Developer Zone password on any other site should change it immediately.

The likely impact of the breach will be an increase in phishing attacks. As a result, if you receive any emails from Nvidia that ask for personal information, don't fall for it.

"Nvidia does not request sensitive information by email. Do not provide personal, financial or sensitive information (including new passwords) in response to any email purporting to be sent by an Nvidia employee or representative," the company said.

Updates about the breach will be posted on the Developer Zone landing page. In the meantime, some of the more popular pages are accessible from links on that page, including: Getting Started with Parallel Computing; CUDA Downloads; CUDA Toolkit; OpenACC; and CUDA Developer Resources.

The Yahoo and Nvidia breaches are just the latest in a string of password hacks. A led to about 420,000 passwords being accessed and posted to a security forum. That came several weeks after LinkedIn, Last.fm, and eHarmony all confirmed password breaches. Online dating site stolen; far fewer than networking site . Last.fm topped the bunch, with , according to the music site.

Last night, Phandroid revealed that its Android forums also suffered a breach.

For more, see . Also check out .