LulzSec, the hacker network that gained notoriety over the last few weeks thanks to leaking large databases of user names and passwords from a wide variety of sites and service, now faces a leak of its own. The Guardian received and published logs from LulzSec’s own private chatroom today that give us a bit more…
The last few months saw the public rise of a new hacker group that works under the name Lulzsec. So far, they have hacked into networks from organizations that range from Sony BMG to Nintendo, Pron.com and PBS. In doing so, they have retrieved thousands of names, passwords and other personal data from unsuspecting users. While most of these organizations then go on and sell this information on the black market, Lulzsec regularly releases all of the data it collects online (they are, after all, just doing it for the ‘lulz’). Now, a new tools helps you to find out if any of your own personal data was made public in one of these leaks.
Have you this kind of comment lately: “Wow, Thats kinda crazy when you think about it dude” or “Wow, this really does make a lot of sense dude. Wow.” Usually it is followed by a link to a site like www.net-privacy.at.tc, www.anonymize.edu.tc or www.anon-tools.tk. You’re not alone. Virtually every high-profile site on the Internet that features comments is currently full of messages like these. Of course, comment spam is nothing new, but these guys are not only targeting high-profile sites – their comments actually make it onto these sites with alarming regularity and most are never removed by the site owners.
Most Android phones allow users to protect their phones from unauthorized access by drawing a pattern on their device’s touchscreens. According to a team of researchers from the University of Pennsylvania, however, these graphical passwords are actually extremely easy to crack, as “oily residues, or smudges, on the touch screen surface, are one side effect of touches from which frequently used patterns such as a graphical password might be inferred.”