In the olden times of video game history, consoles didn't have built in storage. Some games had to be beaten in one sitting or not at all. A primitive method of saving one's progress was for games to offer passwords to players. Some game passwords just brought the player back to a point in the game's time line, but the Mega Man games were more complicated. There wasn't one set order of levels, so passwords had to mark which levels were or were not beaten. Now, almost 25 years later, someone has cracked the code used to generate Mega Man 2 passwords. My five-year-old self just got very excited.
Yesterday, the popular cloud storage service Dropbox accidentially disabled password protection for all accounts, leaving user's files open to the public and modifiable for about 4 hours. Dropbox serves around 25 million users and while all their accounts were accessible, Dropbox asserts that only less than 1% of accounts were active during that period, which is not necessarily indicative of foul play. They are still investigating whether any of those cases might have been unauthorized access.
The error was caused when Dropbox changed some code at 1:54 PST and was discovered four hours later. Upon discovery, all active sessions were killed and users who were active during the password-free period were notified and advised to check their use history. But that's where the buck seems to have stopped. As of now, Dropbox has yet to make a public statement on the matter. Neither their twitter nor their homepage makes any reference to the breach, which has some users a little upset.