Jump to content


Popular Content

Showing content with the highest reputation since 01/17/2019 in all areas

  1. 3 points
    Russ and Sam, two friends, met in the park every day to feed the pigeons, watch the squirrels and discuss world problems. One day Russ didn't show up. Sam didn't think much about it and figured maybe he had a cold or something.. But after Russ hadn't shown up for a week or so, Sam really got worried. However, since the only time they ever got together was at the park, Sam didn't know where Russ lived, so he was unable to find out what had happened to him. A month had passed, and Sam figured he had seen the last of Russ, but one day, Sam approached the park and-- lo and behold!--there sat Russ! Sam was very excited and happy to see him and told him so. Then he said, 'For crying out loud Russ, what in the world happened to you?' Russ replied, 'I have been in jail.' 'Jail!' cried Sam. What in the world for?' 'Well,' Russ said, 'you know Sue, that cute little blonde waitress at the coffee shop where I sometimes go?' 'Yeah,' said Sam, 'I remember her. What about her? 'Well, one day she filed rape charges against me; and, at 89 years old, I was so proud that when I got into court, I pled 'guilty'. 'The damn judge gave me 30 days for perjury.'
  2. 2 points
    hahaha.. at 89 id done the same.. good one bmo..
  3. 2 points
    Massive breach leaks 773 million email addresses, 21 million passwords The best time to stop reusing old passwords was 10 years ago. The second best time is now. It emerged that more than a billion unique email address and password combinations had been posted to a hacking forum for anyone to see in a mega-breach dubbed Collection #1. The breach was revealed by security researcher Troy Hunt, who runs the service allowing users to see if they’ve been hacked called Have I been Pwned. He has now loaded the unique email addresses totalling 772,904,991 onto the site. The data includes more than a billion unique email and password combinations – which hackers can use over a range of sites to compromise your services. They will do so by utilizing so-called credential stuffing attacks, seeing bots automatically testing millions of email and password combinations on a whole range of website login pages. The data originally appeared briefly on cloud service MEGA and was later posted to a popular hacking forum. The Collection #1 folder is comprised of more than 12,000 files weighing in at 87 gigabytes. Most concerningly, the protective hashing of the stolen passwords had been cracked. This means they are easy to use because they are available in plain text rather than being cryptographically hashed as they often are when sites are breached. Should I be worried? In a word: Yes. It’s a massive concern, not least because scale of this breach is huge: Yahoo’s breaches saw 1 billion and 3 billion users affected but the stolen data hasn’t actually resurfaced yet. And unlike other huge hacks such as Yahoo and Equifax, this breach cannot be tied down to one site. Instead it appears to comprise multiple breaches across a number of services including 2,000 databases. Hunt says there are many legitimate breaches in the directory listing, but he cannot yet verify this further. “This number makes it the single largest breach ever to be loaded into HIBP,” he adds in a blog. What’s more, his own personal data is in there “and it's accurate”, he says. “Right email address and a password I used many years ago. Like many of you reading this, I've been in multiple data breaches before which have resulted in my email addresses and yes, my passwords, circulating in public.” Finding out if you’re affected If you are one of the 2.2 million people that already use the Have I Been Pwned site, you should have received a notification: Nearly half of the site's users – or 768,000 – are caught up in this breach. If you aren’t already a member, you need to visit Have I Been Pwned now. Once on the site, you simply need to type in your email address and search, then scroll down to the bottom of the page. The site will let you know if your email address is affected by this breach – and while you are there, you can see if your details were stolen in any others too. https://haveibeenpwned.com/ To find out if your password has been compromised, you separately need to check Pwned Passwords– a feature built into the site recently. This feature also helps you to use strong passwords: if yours is on there, it’s safe to assume others are using it and your accounts could be easily breached. https://haveibeenpwned.com/Passwords What if my details are there? Hunt says in his blog: “Whilst I can't tell you precisely what password was against your own record in the breach, I can tell you if any password you're interested in has appeared in previous breaches Pwned Passwords has indexed. If one of yours shows up there, you really want to stop using it on any service you care about.” If you have a bunch of passwords, checking all of them could be time-consuming. In this case, Hunt suggests 1Password's Watchtower feature which can take all your stored passwords and check them against Pwned Passwords in one go. https://1password.com/ Most importantly, if your password is on the list, do not ignore it as it can be used in credential stuffing attacks mentioned earlier. Hunt says: “People take lists like these that contain our email addresses and passwords then they attempt to see where else they work. The success of this approach is predicated on the fact that people reuse the same credentials on multiple services.” More generally, as the number of breaches and their sheer scale increases, it’s time to clean up your password practices. In addition to using two-factor authentication, passwords should be complex – such as a phrase from a favourite book or a line from a song. At the same time, security experts don’t rule out analogue books containing your password – as long as these are not stored on your device or with it. If you take these measures into account you should be able to avoid using the same password across multiple sites. Ideally, start using a password manager to ensure you can remember these. Have I Been Pwned https://haveibeenpwned.com/ Pwned Passwords https://haveibeenpwned.com/Passwords 1Password https://1password.com/
  4. 2 points
  5. 1 point
    Online Video Downloader https://www.tubeoffline.com/
  6. 1 point
    very good to hear u caught them and rectified it and nothing was stolen..
  7. 1 point
  8. 1 point
    Yea wait until I found out who pwned me, They think I'm at War with Uranus, Well I shove them up Uranus A$$
  9. 1 point
  10. 1 point
    Google dropping Android apps who have no business reading SMS, call logs As open as the Android platform may be, it is also criticized for being just as open to abuse. Google has been trying to plug up holes that it may have left open in the past, though sometimes it accidentally also shuts the door on well-meaning developers’ faces. One recent example of that is its new policy on SMS and Call Log permissions which almost spelled trouble for Tasker. While the popular automation framework managed to dodge that bullet, Google is now reminding other developers that the hammer will be falling soon. The history of Android app permissions is a messy one but hindsight is always 20/20. All Google can really do damage control and try to curtail the broader permissions it allowed apps to have before. Unfortunately, sometimes such changes are bound to break things and ruffle a few feathers. That happened last November when Google announced that apps that currently have permissions for SMS and Call Logs but are not actually SMS apps or phone apps would be banned from Google Play Store. The idea was that those apps wouldn’t have any business being able to read what should be private data. In fact, those permissions have indeed been misused and abused to violate user privacy. Unfortunately, that new policy also hit apps like Tasker that, while not necessarily SMS or phone apps, allow users to automate the sending of messages or making calls. Accessibility apps also fell afoul of the policy so Google has given them some reprieve by letting them apply for an exception subject to review. That period for applying exceptions is now over and offending apps will soon be removed from the Google Play Store. Google isn’t closing the door, however, and developers can either remove the unnecessary permissions from their apps or submit a permission declaration to be reviewed. Hopefully, this could lead to a significant reduction in wayward apps, at least until some new permission becomes the new security hole.
  11. 1 point
    I want to donate $15 using paypal
  12. 1 point
  13. 1 point
    Thank you very much for the great help I have received here. Life is not always kind. When you get older you figure that out. And not to be the first to throw stones until you have walked in that mans shoes. (or heels). Not to wear my heart on my sleeve. I have had cancer multiple times and in the last few years had two major heart surgeries. Not things you plan on or can even prepare for. Nor is it something I talk a lot about. Maybe its the time of year. The kindness of strangers has been a huge blessing for me and a bigger lesson. I do not believe that people know how good we have it. If you only focus on what you do not have that is all you have. Anyway, I just wanted to say thanks to CyberPhoenix for the hours of good reading and PC help they have given without a thought. Thank You CyberPhoenix Brian
  14. 1 point
    Looks like we need $25 to reach our goal? I would like to donate that amount! PM me the particulars. Thanks, BFlash
  15. 1 point
    Hi CyberGod - Nice community... Would a USA Amazon Gift Card be acceptable to you? Please let me know! Thanks. Earthnet
  16. 1 point
    15 dollars via paypal cheers jakjak
  17. 1 point
    heat4her > CyberGod Wish to donate $15.00 via PayPal My PayPal inet address is czyk_07@yahoo.com
  18. 1 point
    Mate wish to donate $25 Paypal richobob1@hotmail.com
  19. 0 points
    Very relevant. I've had two financial breaches this week. Quickly caught and reversed but could have been bad.
  20. 0 points
    Pretty cool, 10 year history of each time I got pwned Just happens I knew most of them and have recently been over My security....