hacking   66154

« earlier    

Have I Been Pwned: Check if your email has been compromised in a data breach
Have I Been Pwned allows you to search across multiple data breaches to see if your email address has been compromised.
security  privacy  hacking 
2 days ago by mdorn
Cohen Hired IT Firm to Rig Early CNBC, Drudge Polls to Favor Trump - WSJ
In early 2015, a man who runs a small technology company showed up at Trump Tower to collect $50,000 for having helped Michael Cohen, then Donald Trump’s personal lawyer, try to rig online polls in his boss’s favor before the presidential campaign.

In his Trump Organization office, Mr. Cohen surprised the man, John Gauger, by giving him a blue Walmart bag containing between $12,000 and $13,000 in cash and, randomly, a boxing glove that Mr. Cohen said had been worn by a Brazilian mixed-martial arts fighter, Mr. Gauger said.

Mr. Cohen disputed that he handed over a bag of cash. “All monies paid to Mr. Gauger were by check,” he said, offering no further comment on his ties to the consultant.

Mr. Gauger owns RedFinch Solutions LLC and is chief information officer at Liberty University in Virginia, where Jerry Falwell Jr., an evangelical leader and fervent Trump supporter, is president.
Press_Column  USA  politics  hacking  culture_of_online_life 
2 days ago by seatrout
An astonishing 773 million records exposed in monster breach • Wired
Brian Barrett:
<p>The data set was <a href="https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/">first reported by security researcher Troy Hunt</a>, who maintains Have I Been Pwned, a way to search whether your own email or password has been compromised by a breach at any point. (Trick question: It has.) The so-called Collection #1 is the largest breach in Hunt's menagerie, and it’s not particularly close.

If anything, the above numbers belie the real volume of the breach, as they reflect Hunt’s effort to clean up the data set to account for duplicates and to strip out unusable bits. In raw form, it comprises 2.7 billion rows of email addresses and passwords, including over a billion unique combinations of email addresses and passwords.

The trove appeared briefly on MEGA, the cloud service, and persisted on what Hunt refers to as “a popular hacking forum.” It sat in a folder called Collection #1, which contained over 12,000 files that weigh in at over 87 gigabytes. While it’s difficult to confirm exactly where all that info came from, it appears to be something of a breach of breaches; that is to say, it claims to aggregate over 2,000 leaked databases that contain passwords whose protective hashing has been cracked.

“It just looks like a completely random collection of sites purely to maximize the number of credentials available to hackers,” Hunt tells WIRED. “There’s no obvious patterns, just maximum exposure.”</p>

It's worth using Hunt's Pwned Passwords service to check whether your own email/other account has been hacked. (In passing: Android users who don't use two-factor authentication must have more to lose from being hacked, because their Gmail sign-in also lets someone set up a new device with their credentials).

Personally, my email password isn't in there. Nor are other family members'. How about you?
hacking  email 
3 days ago by charlesarthur

« earlier    

related tags

1990s  3rd  affaits  all  amazon  android  application  archive  armory  arstechnica  art  article  asia  assembly  audio  bestpractices  bio  bitcoin  block  blockchain  blocklist  blog  blueteam  book  breach  breadboard  breaking  brutforce  bugbounty  bypass  can-bus  capture  cards  cars  cats  ccc  chad  chaoscomputingclub  china  chromecast  cli  code  computing  conference  control  cpu  crime  criticalkits  crowdstrike  cryptocurrency  ctf  culture_of_online_life  cyber-spectrum  cyber-warfare  cyber  cybercrime  cybersecurity  daily  data-mining  data  database  databreach  ddod  ddos  decompiler  defcon  defender  defense  detection  development  devices  disinformation  dns  dol  door  dork  dragon  drop  dystopia  echelon  editors  elections  electronics  elisp  emacs  email  embedded  emulation  engineering  ep2019  escape  espionage  essen  ethereum  ev  event  experiment  exploit  flag  flexible  fp  fractal  fraud  from-inoreader  fun  games  gaming  ghdb  gibbons'  google  gradius  graphics  hack  hacker  hackers  hackster  hardware  hid  history  hotels  howto  influencers  informationsecurity  infosec  infrastructure  injection  instagram  insurance  interface  interior  internet  iot  jeep  journalism  kali  kb  kernel  keyboard  kits  language  lazarus  leak  legal  lego  lib  lin  linux  lisp  list  loader  mac-internals  mac  maersk  malware  memory  metagame  microcode  model3  mondelez  money  mouse  mt  multiuse  mysql  news  nibble  northkorea  notpetya  novel  ohforfuckssake  oneplus  opensource  osint  osx  oxygenos  paganini  papers  password  passwords  path  payments  pentest  pentesting  people  perf  performance  philippines  pierluigi  politics  presentations  press_column  privacy  productivity  programming  progress  pwn  pwned  python  raspberry-pi  raspberrypi  recon  redteam  reference  renault  report  resource  resources  retro  reverse-engineering  reverse  rickroll  ring  rootkit  rpi  ruby  russia  sandbox  scandal  scooters  scp  search  sec  secrey  security  shell  slate  spectre  speedrun  spies  spy  spying  sql  ssh  surveillance  syscall  system  technology  template  tesla  the  theregister  things  tips  tool  tools  totwitter  type:article  type:tool  ui  ukraine  unicode  university  unix  upnp  us  usa  usb  ux  video  vpn  vulnerability  wallet  web  weird  wifi  windows  wired  wireless  writing  wtf  xss  zoe  zurich   

Copy this bookmark:



description:


tags: