Security Researcher Made 10m Login Credentials PublicAdded: Thursday, February 26th, 2015
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
Security researcher Mark Burnett has published 10m passwords online alongside their associated usernames. However, his intentions are benign – the researcher has created his database in order to find a way to improve password security.
Burnett announced he wanted to provide a clean set of password research to share with the world, even despite fears that he could be arrested for releasing such data. As evidence, the researcher referred to the case of journalist Barrett Brown, who posted a link in a chat room to a “data dump” of personal data stolen from private intelligence firm Strat for a couple years ago.
The security researcher claimed that he published his own data set of log in credentials for the purpose of further research and making authentication more secure, rather than harming the user security. He explained that analysis of usernames with passwords is usually neglected but can provide more insight than studying passwords alone.
In the meantime, Burnett emphasized that he had removed the domain portion from email addresses. He also mixed data samples from multiple security breaches over the last decade and removed keywords that might give away the source of the credentials. Of course, credit card and financial account numbers were also removed from the database, along with any other data that might be linked to an individual.
Finally, the researcher pointed out that all the information was earlier available to anyone via search engines, which means that it was thus already available to cyber criminals. In addition,the breached companies had time to reset passwords and warn their employees if necessary.Mark Burnett also claims that the hacks today were not taking place because of the passwords released, but rather because the issue of password security being not studied enough.
Posted by: Date:
Thursday, February 26th, 2015
|Should have included the link so people can see if their was among the stolen ID's. There is also another one to check if the NSA illegally snooped you.|
|posted by (2015-02-27 01:24:52)|
|passwords are secure but all surf habits can be in storage for any who in copanies or government want you etc.. if they need it so passwords can't do more of participate or be inside for credit card trasactions holding any in your back of data.|
|when since backtrack 4 people have been able to get the logins and usernames of 1/2 a million users of facebook in half an hour it is of no surprise that anyone can get wholesale data involving logins for any service,almost from its inception there were cases of identity theft and naughtiness from one chap in Australia and so it is of no surprise that this and any other amounts of data can be collected from our usage of the internet and with the spooks now pulling our strings like Marionettes Globally through their international allies we are all logged,catalogued and if a square peg in a round hole examined under close scrutiny,having a secure login and password is pretty redundant when all our metadata is stolen and the NSA feels empowered to rape any servers they wish to outside of the good ole USA,so much for the abuse of the communications act for which some people are being given 6 year sentences as such practices are done with impunity by the powers that be everyday,if done by an individual its a crime ,if done by a country (even a foreign one) its acceptable.Ed Snowden has shown the world the error in believing its for our own good but still its being allowed and our own countries are betraying us all by their capitulation in the NSA and CIA`s global cyber strategy.|
|posted by (2015-02-27 07:14:31)|
|"the researcher pointed out that all the information was earlier available to anyone via search engines, which means that it was thus already available to cyber criminals" != "Security Researcher Made 10m Login Credentials Public"|
|"Security Researcher Made 10m Login Credentials Public",but if already available via search engine the data is already within the public domain hmm,unless of course it was not and the data was illicitly collected which would be the raison d`etre behind removing the domain from the email addresses.It would be quite a feat to get 10 million login credentials from a multitude of sources and very time consuming although with a fast PC and some open source software cataloguing the user database of Facebook or others and obtaining their logins then removing any associated domain name may be an easier task,the NSA has already quite easily raped the Google servers outside of the USA to circumvent their own legal restrictions and have accrued many more details than just site logins using Xkeyscore so the illusion of security is redundant as is any measure people may think gives them control or privacy regarding their data if setting a password use 16 or more characters with numbers,letters,high and low case,no real names and hope for the best even then encrypt everything,it won`t stop any that are determined forever but it will give them a run for their money unless you use windows then its open house to all. (:^D)||
Most Popular Stories