article thumbnail

Google Glitch Left Passwords Unprotected for 14 Years

Adam Levin

Google announced a glitch that stored unencrypted passwords belonging to several business customers, a situation that had been exploitable since 2005. Google has begun contacting system administrators whose organizations would have been affected by the glitch to encourage them to change their passwords.

Passwords 247
article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

That same IP was used to register the nickname “ Deem3n®, ” a prolific poster on Antichat between 2005 and 2009 who served as a moderator on the forum. md , and that they were a systems administrator for sscompany[.]net. That same Google Analytics code is also now present on the homepages of wiremo[.]co

Malware 197
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Longtime network and system administrator Jack Daniel is a technology community activist, mentor, and storyteller. Green’s contributions to applied cryptography are profound, and his other research includes securing storage and payment systems. Denial-of-Suez attack. Jack Daniel | @jack_daniel. Katie Moussouris | @k8em0.

article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

Quick history lesson It all began in 2004, with Whoppix , a security operating system based on Knoppix. This lead into WHAX in 2005, which used Slax. Merging into BackTrack At the same time, there was a similar project happening over at remote-exploit, Auditor Security Collection (based on Knoppix), which first started in 2005.

InfoSec 52