Flipboard Hack Exposed Usernames, Email Addresses and Hashed Passwords

Flipboard today emailed Flipboard users to let them know about a security breach that saw usernames, email addresses, and protected passwords accessed by hackers.

Between June 2, 2018 and April 22, 2019, there was "unauthorized access" to Flipboard databases that leaked account information. Flipboard says the hackers "potentially obtained copies" of some databases, and has not yet shared details on how many accounts were compromised.

flipboardsecuritybreach
Databases included Flipboard usernames, names, email addresses, and passwords, but the passwords were salted and hashed, which means they weren't stored in plaintext and would be difficult to crack.

Also included were digital tokens used to connect Flipboard to third party services like Twitter or Facebook, if users had indeed connected their Flipboard accounts to their social media networks.

Flipboard is resetting all user passwords and replacing or deleting all digital tokens. If you connected Flipboard to Facebook or Twitter, you will need to reconnect your accounts.

Flipboard says that to prevent something like this from happening again, it has implemented "enhanced security measures." Law enforcement officials have also been notified.

The company recommends that users who use the same username and password for Flipboard that they use for other accounts change their passwords for other services as a precautionary measure.

Popular Stories

Apple Logo Top Half

Early iOS 26 Software Leak Uncovers Dozens of Upcoming Apple Features

Monday December 15, 2025 3:05 pm PST by
Software from an iPhone prototype running an early build of iOS 26 leaked last week, giving us a glimpse at future Apple devices and iOS features. We recapped device codenames in our prior article, and now we have a list of some of the most notable feature flags that were found in the software code. In some cases, it's obvious what the feature flags are referring to, while some are more...
apple beta 26 lineup

Apple Leak Confirms Work on Foldable iPhone, AirTag 2, and Dozens More Devices

Monday December 15, 2025 2:05 pm PST by
Last week, details about unreleased Apple devices and future iOS features were shared by Macworld. This week, we learned where the information came from, plus we have more findings from the leak. As it turns out, an Apple prototype device running an early build of iOS 26 was sold, and the person who bought it shared the software. The OS has a version number of 23A5234w, and the first...
iOS 26

iOS 26.4 and iOS 27 Features Revealed in New Leak

Friday December 12, 2025 10:56 am PST by
Macworld's Filipe Espósito today revealed a handful of features that Apple is allegedly planning for iOS 26.4, iOS 27, and even iOS 28. The report said the features are referenced within the code for a leaked internal build of iOS 26 that is not meant to be seen by the public. However, it appears that Espósito and/or his sources managed to gain access to it, providing us with a sneak peek...
iOS 26

iOS 26.3 Beta 1 Features: What's New So Far

Monday December 15, 2025 4:23 pm PST by
Apple is testing iOS 26.3, the next version of iOS 26 that will launch around January. Since iOS 26.3's testing is happening over the holidays, it is a smaller update with fewer features than we've seen in prior betas. We've rounded up what's new so far, and we'll add to our list with subsequent betas if we come across any other features. Transfer to Android Apple is making it simpler...
Apple Foldable Thumb

Leak Reveals Foldable iPhone Details

Monday December 15, 2025 9:09 am PST by
The first foldable iPhone will feature a series of design and hardware firsts for Apple, according to details shared by the Weibo leaker known as Digital Chat Station. According to a new post, via machine translation, Apple is developing what the leaker describes as a "wide foldable" device, a term used to refer to a horizontally oriented, book-style foldable with a large internal display....
iPhone Top Left Hole Punch Face ID Feature Purple

iPhone 18 Pro Features Leaked in New Report, Including Under-Screen Face ID

Tuesday December 16, 2025 8:44 am PST by
Next year's iPhone 18 Pro and iPhone 18 Pro Max will be equipped with under-screen Face ID, and the front camera will be moved to the top-left corner of the screen, according to a new report from The Information's Wayne Ma and Qianer Liu. As a result of these changes, the report said the iPhone 18 Pro models will not have a pill-shaped Dynamic Island cutout at the top of the screen....
airpods max 2024 colors

AirPods Max 2 Likely to Offer These 10 New Features

Monday December 15, 2025 7:41 am PST by
Apple released the AirPods Max on December 15, 2020, meaning the over-ear headphones launched five years ago today. While the AirPods Max were updated with a USB-C port and new color options last year, followed by support for lossless audio and ultra-low latency audio this year, the headphones lack some of the features that have been introduced for newer generations of the regular AirPods and the ...
iMac Pro Mock Graphic Feature

Apple Developing iMac Pro With M5 Max Chip

Tuesday December 16, 2025 7:30 am PST by
Apple is developing a high-end iMac featuring the M5 Max chip, according to information from leaked internal software. The finding comes from leaked kernel debug kit files used by Apple engineers. These kernel debug kit files enumerate unreleased Apple hardware by internal identifiers, such as codenames and platform names, and they can also include separate references that map platform...

Top Rated Comments

nwcs Avatar
86 months ago
While not excusing a breach, the reality is that security is multilayered and simply very hard. It’s a lot like keeping squirrels from bird feeders. The people looking to breach spend all their time and resources to breach but the security people can only do so much.

Factor in third party libraries with their own vulnerabilities, software vulnerabilities, hardware vulnerabilities, and human weaknesses to phishing and the like and the job is even harder.

After having dealt with various security stuff over the years, working with third parties in software scanning, pen testers, etc. I’ve realized that the odds are stacked perpetually against any company. There are more hackers out there with agendas, resources, and cleverness than there are people available to defend against them in every corporation. It’s the blessing and curse of the internet all at once.
Score: 17 Votes (Like | Disagree)
I7guy Avatar
86 months ago
The bad news keeps coming from social media sites that do a poor job in protecting their networks.
Score: 14 Votes (Like | Disagree)
chelsel Avatar
86 months ago
Who are the CTOs and engineers of these companies that decide they want to write their own authentication systems!? Companies need to start getting class action lawsuits for privacy violations and sued into oblivion... then they will start taking security seriously.
Score: 12 Votes (Like | Disagree)
burgman Avatar
86 months ago
The bad news keeps coming from social media sites that do a poor job in protecting their networks.
I’ve never even heard of flipboard.. but then again I’ve never even had a FB account so that’s how little I give a flyin f about social media/
Thanks for the laugh, because it starts with an F it must be Facebook clone? Flipboard is a curated news app. :)
Score: 10 Votes (Like | Disagree)
dannyyankou Avatar
86 months ago
I appreciate their transparency. Certain other companies would try to cover it up.
Score: 4 Votes (Like | Disagree)
edgonzalez32 Avatar
86 months ago
While not excusing a breach, the reality is that security is multilayered and simply very hard. It’s a lot like keeping squirrels from bird feeders. The people looking to breach spend all their time and resources to breach but the security people can only do so much.

Factor in third party libraries with their own vulnerabilities, software vulnerabilities, hardware vulnerabilities, and human weaknesses to phishing and the like and the job is even harder.

After having dealt with various security stuff over the years, working with third parties in software scanning, pen testers, etc. I’ve realized that the odds are stacked perpetually against any company. There are more hackers out there with agendas, resources, and cleverness than there are people available to defend against them in every corporation. It’s the blessing and curse of the internet all at once.
Yea, like people are way too quick to just start ******** all over a company when a data breach happens. Its insanely complex.
Score: 4 Votes (Like | Disagree)