Hacking is a business of hackers, and they from time-to-time update their skills to beat tight cyber security measures! Hacking member accounts, especially over the websites, forums and many other social media is an increasing activity. A number of compromise reports by the very well respected 'Have I Been Pwned' (Check here if you have been pwned or not) site and Vigilante - a civilian or organization acting in a law enforcement capacity without legal authority, show thousands of breaches, that include stolen email addresses, passwords, IP addresses and more other information.
The most famous cyber attack was in May 2016 (here is another news), where 164 million LinkedIn email addresses and passwords were exposed according to reports on Have I Been Pwned.
"Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data." See more: Have I Been Pwned.
Go here for detailed background on pwned credentials, password reuse, credential stuffing and another billion records in Have I Been Pwned.
How to reduce the risk of being hacked/pwned(owned)?
You can use "pass" - the standard unix password manager:
"Password management should be simple and follow Unix philosophy. With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities." Read more: https://www.passwordstore.org/
Other alternatives to safeguard yourself from hackers/crackers is to use Two-Factor Authentication or Google 2-Step Verification if you are a Google account user.
-
- Active Topics
-
-
- by Eli 1 hour ago Russia Invades Ukraine View the latest post Replies 651 Views 219374
- by Eli 7 hours ago Programmatically Manipulate Files: Renaming, Reading, Writing, Deleting, and Moving Files Between Folders View the latest post Replies 7 Views 1833
- by Eli 15 hours ago Re: What is in Your Mind? View the latest post Replies 690 Views 283469
- by Eli 5 days ago Iran Launches Retaliatory Attack Against Israel, and Israel Retaliates by Attacking Iranian Isfahan Millitary Base View the latest post Replies 28 Views 1405
- by Eli 1 week ago All in One: YouTube, TED, X, Facebook and Instagram Reels, Videos, Images and Text Posts View the latest post Replies 319 Views 18390
- by Eli 1 week ago Python Packages for Scientific Computing View the latest post Replies 8 Views 11211
- by Eli 1 week ago Dunia Yetu: Building Tanzania's Digital Future Together View the latest post Replies 5 Views 1968
- by Eli 2 weeks ago Collection of Greatest Christian Hymns of all Times View the latest post Replies 33 Views 52733
- by Eli 2 weeks ago What is Retrieval-Augmented Generation (RAG)? View the latest post Replies 2 Views 685
- by Eli 3 weeks ago Chat With ChatGPT - An Interactive Conversational AI View the latest post Replies 22 Views 33447
-
Your Email address and Password have probably been stolen/pwned!
-
- Information
-
Who is online
Users browsing this forum: No registered users and 0 guests