Car Hacking: More likely to be done by a mechanic than by a hacker
infosec

Car Hacking: More likely to be done by a mechanic than by a hacker

When we talk about car hacking, it comes to mind a hacker who gets remote access to the car system ...
Read More
infosec

Sri Lanka: Blocks access to social media

The government of Sri Lanka has temporarily blocked access to various social media services following deadly explosions that erupted ...
Read More
infosec tweaks

How to hack networks with Wi-Fi passwords

Probably you have a Wi-Fi network in your home or stay close to one (or more) that appears in ...
Read More
infosec tweaks

What is Social Engineering, what are its techniques and how to protect yourself?

Social Engineering is the term used for a wide range of malicious activities that are accomplished through human interactions. Uses the ...
Read More
infosec tweaks

Cryptocurrency: Ways to Enhance Your Privacy

Privacy and privacy on the internet are of great importance. It is not enough to take one or two measures to protect ...
Read More
Latest Posts

Mortal Online: Data breach exposes all accounts in the title

Information from Mortal Online accounts, an online MMORPG game, has leaked to the Internet after a violation on the game server.

Mortal Online

On June 17, an unauthorized user, accessed the server maintained data with the game databases, and copied all the data. The affected bills are about 570.000.

The developers of Mortal Online have announced the violation when they realized it, 4 days later, and followed an investigation that led to data confirming the violation. To inform users, developers have advised that they do not keep copies of sensitive information such as debit card digits.

Although leaked card data, the database contained usernames and passwords from over half a million accounts that were stored in MD5 hashes.

MD5 is a type of encryption used primarily to control the integrity of data after a transfer (e.g., after downloading from a site). They are prone to bruteforce attacks, and their decryption can be done in seconds. 2012 was considered unsafe by its founder, when it was revealed how easily it was decoded.

The database, from the time it was stolen, is available for sale at various points online, and there are already reports that it is used for credential stuffing. This means that the combination of each username and password is tested on different platforms and services, which shows how important it is not to use the same password everywhere.

Plus, base data has been added to have been pwned, so users can see if their accounts have been broken.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *