Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

<b><i>Online Extra:</b></i> Twitch Alerts Users of Potential Data Breach

By Chris DiMarco
March 30, 2015

Retail giants, banks and insurance firms may be the companies most likely to make headlines following a cyberbreach, but that doesn't mean that smaller organizations and services are without risk, nor does it mean that the data these businesses collect are any less sensitive when compromised.

Twitch Interactive Inc., which offers a popular video game and event-streaming platform, advised users on March 23 to change their login credentials. The news came following unauthorized access to account information earlier this month with the company alerting users via email and a'blog post.

In both announcements Twitch said, 'For your protection, we have expired passwords and stream keys and have disconnected accounts from Twitter and YouTube. As a result, you will be prompted to create a new password the next time you attempt to log into your Twitch account.'

The company said that a malicious script may have potentially accessed the profiles of its users on March 3. Hackers may have gained access to email addresses, the last IP address users used, as well as names and contact information.

Twitch offers popular streamers the means to monetize televised gaming and event exploits through advertising, and the information stolen could potentially be used to access money from users. However, the company did not comment on that possibility in the release.

Twitch, which was acquired by Amazon.com Inc. for $1.1 billion in the summer of 2014, is one of the most heavily trafficked services on the Internet today. According to'Quancast Corp., a company specializing in digital audience measurement, Twitch captured an incredible 30 million users over the last month, and has exceeded 45 million users monthly.

This event is a reminder that hackers are indiscriminate of industry or user demographics in a breach, and with a huge portion of traffic in the 18-to-30-year-old user bracket accessing gaming sites and services, the space will be one to watch for'cyberevents.

All information is valuable in the digital age, and as a result, all organizations must be'increasingly responsive'in addressing vulnerabilities and remaining transparent with users.


Chris DiMarco writes for'Law Technology News,'an ALM sibling of'e-Commerce Law & Strategy.

Retail giants, banks and insurance firms may be the companies most likely to make headlines following a cyberbreach, but that doesn't mean that smaller organizations and services are without risk, nor does it mean that the data these businesses collect are any less sensitive when compromised.

Twitch Interactive Inc., which offers a popular video game and event-streaming platform, advised users on March 23 to change their login credentials. The news came following unauthorized access to account information earlier this month with the company alerting users via email and a'blog post.

In both announcements Twitch said, 'For your protection, we have expired passwords and stream keys and have disconnected accounts from Twitter and YouTube. As a result, you will be prompted to create a new password the next time you attempt to log into your Twitch account.'

The company said that a malicious script may have potentially accessed the profiles of its users on March 3. Hackers may have gained access to email addresses, the last IP address users used, as well as names and contact information.

Twitch offers popular streamers the means to monetize televised gaming and event exploits through advertising, and the information stolen could potentially be used to access money from users. However, the company did not comment on that possibility in the release.

Twitch, which was acquired by Amazon.com Inc. for $1.1 billion in the summer of 2014, is one of the most heavily trafficked services on the Internet today. According to'Quancast Corp., a company specializing in digital audience measurement, Twitch captured an incredible 30 million users over the last month, and has exceeded 45 million users monthly.

This event is a reminder that hackers are indiscriminate of industry or user demographics in a breach, and with a huge portion of traffic in the 18-to-30-year-old user bracket accessing gaming sites and services, the space will be one to watch for'cyberevents.

All information is valuable in the digital age, and as a result, all organizations must be'increasingly responsive'in addressing vulnerabilities and remaining transparent with users.


Chris DiMarco writes for'Law Technology News,'an ALM sibling of'e-Commerce Law & Strategy.

Read These Next
Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate Purchasers Image

In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.

Fresh Filings Image

Notable recent court filings in entertainment law.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.