-Link-
Page 1 of 2
-
You know, it's very poor etiquette to not at least post a one sentence comment on threads you start.
If I simply wanted to read the articles and not discuss with others I would just go to joystiq exclusively. -
I don't get these groups. Just because you can do something doesn't mean you should... now I'm wondering if it is ok to even log into League of Legends today.
-
dolfan32323 likes this.
-
While having different passwords for all your important stuff is definitely very important, having a "strong" password is like pissing in the wind if you don't have security systems. Get them, now. Update them regularly and use them.
As an individual, you will be far to insignificant for a group like Lulzec or Anon. to go after, but make no mistake there are many many people who thrive on stealing personal and login information to various sites - games, banks, credit card #s, government sites, etc. -
These guys aren't overly sophisticated. They're brazen bullies who pick their targets well.
Interesting that this is happening right as school lets out.
Very curious to see how this ultimately plays out. If they keep going like this, they're going to be caught. -
LulzSec released 62,000 email addresses and passwords. Gizmodo has a search box so you can check if your email address is on the list.
-
-
What's really crappy about this is that they're putting all this in the hands of as many people as possible, encouraging people to do harm and helping them think outside the box.
-
These guys are actually doing something good. They're showing that major companies are not taking security seriously and putting your personal information at risk. The majority of these attacks are exploiting well known bugs in the servers where patches do exist. I am pissed that LulzSec is publishing the data publicly, but sometimes it's the only way to get these major companies to see that it's serious.
Now the DDoS attacks are not cool, but my guess is they are exploiting bugs with request overflows and DDoS attacks are needed for that.
These companies need to step up and spend the time/money to make sure their user's data remains secure. I've coded for a lot of different companies and you'd be shocked at how open their systems/data really are. -
A ChrisKo sighting, hellooooo. Have to imagine they'll hit WoW if they're just out for recognition and to piss people off, unless they're unable to or they're just big Blizzard fans.
-
-
-
http://lulzsecexposed.blogspot.com
They've been online two days and are exposing the members, even addresses in some older psots. Apparently forwarding the stuff to the FBI.
Frumundah Finnatic, Stitches and Desides like this. -
Have fun with the government now up your ***, no cure for that ailment.
I wonder if these guys are having as much fun as they did before. I love watching jackasses getting their due. Love it.Desides likes this. -
:lol: :lol: :lol: -
Somehow I imagine this will make its way to POFO. -
PeaTearGriffin likes this. -
-
-
-
-
EDIT: Also need to get to FF13 -
-
-
-
FF13 will take a while.
Mass Effect 2 might be worthwhile if you want to get a save game ready for ME3.PeaTearGriffin likes this. -
-
-
edit: Looks like my Media1.cab file is continually corrupt.
I may try downloading to a different computer, and then moving the install files to this one that I'm having trouble with. -
Apparently the operator of their IRC chat room has been arrested. 19-year old Brit Ryan Cleary.
http://www.pcmag.com/article2/0,2817,2387380,00.aspunluckyluciano likes this. -
-
-
-
-
-
-
The most likely COA is that the guy will be charged, not given a deal in exchange for testimony. What could he provide that can't be forensically discovered on his server? Very little to nothing.
Page 1 of 2