Bidvert-advert

Stay Update - ICT Security

Enter your email address:

We hate spam as much as you do and we will never sell, barter, or rent your email address to any unauthorized third party.

Most Frequently Used Software


CURL / XPertMailer / AutoBlogger / (Parser - PHP Simple HTML DOM)



martedì 27 marzo 2012

Details of 170,000 military singles dumped online \'by LulzSec Reborn\'

A hacking group calling itself 'LulzSec Reborn' has posted 170,937 names, usernames, passwords and email addresses of an army dating site's members.

According to thehackernews.com, the credentials were posted as portion of 'Operation Digiturk'. A response from MilitarySingles.com said there has been "no actual evidence" it were hacked and suggested that the claims were false. The attackers responded by defacing the positioning and revealing that email addresses from the united states army, navy and Microsoft have been posted online.

Graham Cluley, senior technology consultant at Sophos, said: “Email addresses, usernames, real names and â€" often times â€" physical addresses belonging to romance-seeking members of the army were included within the haul of data posted on the web.

“If you recognize anyone who has ever used the army Singles website, it might be a good option to inform them to alter their password as a precaution and in order for they don't seem to be using an identical password anywhere else.”

A video appeared last week suggesting that LulzSec would return on April Fools' Day and that the new arrests had "merely disrupted the active faction".

“Of course, on the web, anyone can claim to be whatever they need and so it is not particularly surprising to look that it was a set calling itself LulzSec Reborn that posted a message on PasteBin announcing the hack of MilitarySingles.com,” Cluley said.



Nessun commento:

Posta un commento

Comments links could be nofollow free