%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240517063352+00'00') /ModDate (D:20240517063352+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 11 0 R 13 0 R 15 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4201 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 174.349 521.469 572.385 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 174.724 520.719 571.635 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(272 MILLION E-MAIL ADDRESSES HACKED)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(On Wednesday the Internet was abuzz with news of a Wisconsin security firm obtaining a database of 272 million e-mail )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(addresses, with their associated passwords, from a Russian fraudster.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(How did a cyber criminal get his hands on the e-mail addresses and passwords?)] TJ ET BT 61.016 513.066 Td /F3 9.0 Tf [(Easily, by using the same phishing tricks that we regularly )] TJ ET 0.373 0.169 0.255 rg BT 293.603 513.066 Td /F3 9.0 Tf [(warn you about )] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 293.603 511.915 m 357.638 511.915 l S 0.400 0.400 0.400 rg BT 357.638 513.066 Td /F3 9.0 Tf [(- using an e-mail, warning you about upgrades )] TJ ET BT 61.016 502.077 Td /F3 9.0 Tf [(to Outlook and that you must "CLICK" on the link to activate the upgrades or your account. Victims literally give their e-)] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(mail address and password to the fraudster.)] TJ ET BT 61.016 471.099 Td /F3 9.0 Tf [(Several of our colleagues were fooled by the mail and did actually go to the site and unwittingly gave their details to the )] TJ ET BT 61.016 460.110 Td /F3 9.0 Tf [(scammers. Luckily, we were able to help them quickly to undo the damage.)] TJ ET BT 61.016 440.121 Td /F3 9.0 Tf [(However, in retrospect, a deeper problem was picked up:)] TJ ET BT 61.016 420.132 Td /F3 9.0 Tf [(The stolen passwords and email addresses from the Russian database, which included Gmail, Yahoo and Russia’s )] TJ ET BT 61.016 409.143 Td /F3 9.0 Tf [(mail.ru accounts, were not hacked directly from GMail or Yahoo but they had been taken from various smaller, less secure )] TJ ET BT 61.016 398.154 Td /F3 9.0 Tf [(websites where people use their email addresses along with the SAME password to log in.)] TJ ET BT 61.016 378.165 Td /F3 9.0 Tf [(Those people who tend to use the same password for multiple sites as well as their email are at risk and should change )] TJ ET BT 61.016 367.176 Td /F3 9.0 Tf [(their email password and avoid using "one password for everything". It is like having a master key for every lock on your )] TJ ET BT 61.016 356.187 Td /F3 9.0 Tf [(house. If that key is stolen then burglars can get access to every locked door in your house using one key!)] TJ ET BT 61.016 336.198 Td /F3 9.0 Tf [(Secondly, if you suspect your e-mail password has been compromised and you change your password, it should always )] TJ ET BT 61.016 325.209 Td /F3 9.0 Tf [(be changed to something COMPLETELY different. In other words if your password is for instance "Christopher123", then )] TJ ET BT 61.016 314.220 Td /F3 9.0 Tf [(changing your password to "Christopher124" is not good enough that change is easily guessed.)] TJ ET BT 61.016 294.231 Td /F3 9.0 Tf [(If you have a Gmail or Yahoo account and are concerned that your e-mail address is possibly on the Russian database, )] TJ ET BT 61.016 283.242 Td /F3 9.0 Tf [(then you can go to the following links: \(they are safe as they do not ask for passwords\))] TJ ET 0.373 0.169 0.255 rg BT 61.016 263.253 Td /F3 9.0 Tf [(http://securityalert.knowem.com/)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 262.102 m 190.058 262.102 l S BT 61.016 252.264 Td /F3 9.0 Tf [(https://haveibeenpwned.com/)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 251.113 m 178.079 251.113 l S 0.400 0.400 0.400 rg BT 432.949 232.275 Td /F3 9.0 Tf [([ARTICLE BY DAVID WILES])] TJ ET BT 548.482 212.286 Td /F3 9.0 Tf [( )] TJ ET BT 61.016 192.297 Td /F3 9.0 Tf [(Posted in:E-mail | | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Annot /Subtype /Link /A 12 0 R /Border [0 0 0] /H /I /Rect [ 293.6027 512.2336 357.6377 521.3911 ] >> endobj 12 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/en/?s=phishing) >> endobj 13 0 obj << /Type /Annot /Subtype /Link /A 14 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 262.4206 190.0577 271.5781 ] >> endobj 14 0 obj << /Type /Action /S /URI /URI (http://securityalert.knowem.com/) >> endobj 15 0 obj << /Type /Annot /Subtype /Link /A 16 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 251.4316 178.0787 260.5891 ] >> endobj 16 0 obj << /Type /Action /S /URI /URI (https://haveibeenpwned.com/) >> endobj xref 0 17 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000294 00000 n 0000000323 00000 n 0000000458 00000 n 0000000554 00000 n 0000004807 00000 n 0000004919 00000 n 0000005026 00000 n 0000005142 00000 n 0000005270 00000 n 0000005362 00000 n 0000005489 00000 n 0000005573 00000 n 0000005700 00000 n trailer << /Size 17 /Root 1 0 R /Info 5 0 R >> startxref 5779 %%EOF 272 million e-mail addresses hacked « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

272 million e-mail addresses hacked

On Wednesday the Internet was abuzz with news of a Wisconsin security firm obtaining a database of 272 million e-mail addresses, with their associated passwords, from a Russian fraudster.

How did a cyber criminal get his hands on the e-mail addresses and passwords?

Easily, by using the same phishing tricks that we regularly warn you about – using an e-mail, warning you about upgrades to Outlook and that you must “CLICK” on the link to activate the upgrades or your account. Victims literally give their e-mail address and password to the fraudster.

Several of our colleagues were fooled by the mail and did actually go to the site and unwittingly gave their details to the scammers. Luckily, we were able to help them quickly to undo the damage.

However, in retrospect, a deeper problem was picked up:

The stolen passwords and email addresses from the Russian database, which included Gmail, Yahoo and Russia’s mail.ru accounts, were not hacked directly from GMail or Yahoo but they had been taken from various smaller, less secure websites where people use their email addresses along with the SAME password to log in.

Those people who tend to use the same password for multiple sites as well as their email are at risk and should change their email password and avoid using “one password for everything”. It is like having a master key for every lock on your house. If that key is stolen then burglars can get access to every locked door in your house using one key!

Secondly, if you suspect your e-mail password has been compromised and you change your password, it should always be changed to something COMPLETELY different. In other words if your password is for instance “Christopher123”, then changing your password to “Christopher124” is not good enough that change is easily guessed.

If you have a Gmail or Yahoo account and are concerned that your e-mail address is possibly on the Russian database, then you can go to the following links: (they are safe as they do not ask for passwords)

http://securityalert.knowem.com/
https://haveibeenpwned.com/

[ARTICLE BY DAVID WILES]

 

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.