Remove Definition Remove Examples Remove Mining Remove Presentation
article thumbnail

The Life Cycle of a Breached Database

Krebs on Security

There, denizens with computer rigs that are built primarily for mining virtual currencies can set to work using those systems to crack passwords. But a decent crypto-mining rig can quickly crack a majority of password hashes generated with MD5 (one of the weaker and more commonly-used password hashing algorithms).

Passwords 353
article thumbnail

Top 6 Rootkit Threats and How to Protect Yourself

eSecurity Planet

Recent innovations in the attack technology, like the “BlackLotus” UEFI rootkit , have ensured that rootkits are still a very present danger to modern networks and devices. Notable examples of kernel-mode rootkits include Knark, Zero Access, Adore, FudModule, Da IOS, and the deliciously-named Spicy Hot Pot. Check Out What is Malware?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Identity Thieves Bypassed Experian Security to View Credit Reports

Krebs on Security

Normally at this point, Experian’s website would present four or five multiple-guess questions, such as “Which of the following addresses have you lived at?” For example, there were four phone numbers on my Experian credit file: Only one of them was mine, and that one hasn’t been mine for ages.

Security 330
article thumbnail

How Spoutible’s Leaky API Spurted out a Deluge of Personal Data

Troy Hunt

" because I had no expectation at all of any of that data being publicly available (note: phone number is optional, I chose to add mine). For example, here's Rosetta and if we watch the request that's made in the dev tools. Not major issues in and of themselves, but they amplify the problems the exposed data presents.

article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

SHA-1 is Just Fine for k-Anonymity Let's begin with the actual problem SHA-1 presents. Every time this very blog loads Font Awesome from Cloudflare's CDN, for example, it's verified against the hash in the integrity attribute of the script tag (view source for yourself).

Passwords 123
article thumbnail

Is AIIM Membership Worth It? Pros and Cons

AIIM

As I noted in the previous post, I would definitely encourage you to consider whether your association offers these benefits. For example, here are just a few of my personal favorites: State of the Content Services Industry (research) and How to Be GDPR Compliant (member toolkit). I co-presented a session at AIIM 2003.

IT 110
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Another example also from Context Security was the vulnerability in CloudPets talking (and listening ) teddy bears that amounted to no auth on the Bluetooth allowing an attacker to take control of the toy. Are these examples actually risks in IoT? Or are they just the same old risks we've always had with data stored on the internet?

IoT 143