Image for post
Image for post

Leakprobe has published the results from a medium-scale query for commonly used usernames — the list is included below. From this list, sample analyses were conducted on the coverage of the dataset that was collected. The coverage information as well as statistical facts are provided below. The dataset that was used as a model is attached as a .TXT file.

The statistical information provided by analysis of the dataset points to the general usage of the username “admin”, a prevalence for variations of the password “password” across the spread of data, and correlations between usernames and passwords, especially for the username “test”. …


The internet is a dangerous place. Although it takes place in a cyber-location and a virtual world, there are many dangerous crimes that can be committed including identity theft, fraud, larceny, burglary, and extortion. Some people think that antivirus and firewall software is the solution to these potential threats — the truth is these softwares are only the beginning of creating protection when using the Internet. There are more threats and more actions that can be taken to increase protection. In order to facicilate a secure environment and stop worrying about these kinds of threats happening, this is a compilation of the solutions that will secure your online identity forever. …


Image for post
Image for post

Many consumers who are victims of a data breach or whose information is resold over the black market wonder: “Is it illegal for my information to be shared over the Internet?” Undoubtedly, one should rely on lawyers for a definitive answer to this legal question; however, the answer is that (within the United States), there are no federal laws governing this field of data protection or privacy. Many states have passed legislation governing data privacy — modeled after the General Data Protection Regulation of the European Union, these laws offer much more protection than the non-existent federal laws on the matter. Recently, Alabama became the last U.S. state to pass some form of data protection legislature. …


Image for post
Image for post

Lindsay Lohan
fallen_angel86@hotmail.com

Lindsay Dee Lohan (born July 2, 1986) is an American actress, businesswoman, fashion designer and singer. Born and raised in New York, Lohan was signed to Ford Models as a child. Having appeared as a regular on Another World at age 10, her breakthrough came in Disney Pictures’ The Parent Trap (1998). The film’s success led to appearances in a string of their televised films and the theatrical Freaky Friday(2003).

Image for post
Image for post

Zooey Deschanel
quirkygal101@hotmail.com

Zooey Claire Deschanel (/’zo?i ?de???’n?l/; born January 17, 1980) is an American actress, model and singer-songwriter. She made her film debut in Mumford (1999) and next obtained a supporting role in Cameron Crowe’s film Almost Famous (2000). Deschanel is known for her deadpan comedy roles in films such as The Good Girl (2002), The New Guy (2002), Elf (2003), The Hitchhiker’s Guide to the Galaxy(2005), Failure to Launch (2006), Yes Man (2008), and 500 Days of Summer (2009). She has ventured into more dramatic territory with Manic (2001), All the Real Girls (2003), Winter Passing (2005), and Bridge to Terabithia (2007). …


The President’s credentials that have been used on common websites have been exposed, but what link does this mean for future info leaks?

Image for post
Image for post

Donald Trump has made news for the infamousness that he rarely has ever touched a computer, despite being a long time supporter of Twitter, which is likely used and managed on his cell phone. The fact remains that Donald Trump has never provided the public with a personal email address, the closest being trump@trumporg.com, and other emailable contact methods being to use White House correspondence, which is available on the White House website and other government websites. An article was even released, jokingly, that the only time that Donald Trump ever touched a computer was when he knocked a monitor over. Whether or not this is true remains to be known; in this day and age, much is dependent on computer use and even though Mr. Trump is reaching old age and may not have the inclination (or the proposed ability) to get usage out of computers, he may fall into the same trap everyone else does. …


Everyone has heard of information leaks from big corporations in the media in recent years. When Facebook’s user data was hacked and leaked, the company lost big in the stock market, it’s shares taking a marginal drop following social trends to leave Facebook. Having a secure password for your information is sensitive material, and basic knowledge about this should be known by all Internet users. We must adapt to the time, and stay on top of password security lest our information be lost to poor decision-making, and leaked onto the Internet for the general public to devour. In these spirits, we present to you three steps to increasing your password security by 100%. These procedures will maximize the chances that your information is not hacked via authentication, and if it is that there is added security for those trying to gain access via authentication. Some of them one may find relatively simple. Every Internet user is urged to engage in safe practices to keep their information secure — we can’t trust the big companies holding the data to keep it [the information] secure. Novices and experts alike can benefit from these practices. …


Everyone has heard of information leaks from big corporations in the media in recent years. When Facebook’s user data was hacked and leaked, the company lost big in the stock market, it’s shares taking a marginal drop following social trends to leave Facebook. Having a secure password for your information is sensitive material, and basic knowledge about this should be known by all Internet users. We must adapt to the time, and stay on top of password security lest our information be lost to poor decision-making, and leaked onto the Internet for the general public to devour. In these spirits, we present to you three steps to increasing your password security by 100%. These procedures will maximize the chances that your information is not hacked via authentication, and if it is that there is added security for those trying to gain access via authentication. Some of them one may find relatively simple. Every Internet user is urged to engage in safe practices to keep their information secure — we can’t trust the big companies holding the data to keep it [the information] secure. Novices and experts alike can benefit from these practices. …


Image for post
Image for post

There’s an quote from a famous ex-hacker that goes “Even if a computer is unplugged and at the bottom of the ocean, it is not 100% safe.” Consumers of all kinds don’t always think about the security of their personal information on the Internet, but the threat is realer than previously known. With password security websites that publish user accounts’ statuses and leaked information from previously private databases on the rise, literal billions of people around the world are affected; according to a popular leaked passwords database website (2018), the available records are just over 1 billion accounts and available in plain-text viewing. That’s 13% of the world population. A majority of the user accounts belong to American citizens — well over 500 million are linked to United States records. That’s 156% of the U.S. population that is affected by password security. …


Leakprobe and HaveIBeenPwned are the two leading providers of leaked passwords information, both allowing searches of their databases. After a search, users can find out whether or not their account information has been leaked onto the Internet and whether it is accessible by the general public. These services assist users in securing their information and preventing data integrity loss by keeping it updated against the current volume of leaked information. However, after a review of these two services, it has been found that both have pros and cons that make Leakprobe and HaveIBeenPwned a better service for users. …

Davy Jones

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store