I’ve been performing some digging utilizing a ‘completely different’ angle to uncover some new concepts for some advertising campaigns.
Within the course of I discovered some safety websites the place they discuss on-line safety. One in every of these blogs shared a really fascinating principle on how Jeff Bezos dick picks acquired into the palms of the Nationwide Enquirer that attempted to make use of their bargaining chip to extort him for monetary achieve. Effectively, in case you didn’t hear the story – The Amazon Founder fought again by exposing his dick pics himself in a weblog submit he printed on Medium titled “No thanks, Mr. Pecker“; now the idiots at Nationwide Enquirer look actually dangerous. WHAT A GUY!
This fiasco did one factor; it uncovered how UNSAFE the web is and the weblog I discovered explains a principle that the hackers who stole the images may need very properly used to realize their palms on it.
What number of occasions did you employ the very same password on a number of web sites, boards, companies, instruments, and many others AND the identical electronic mail? Chances are high it’s fairly excessive proper?
Most individuals make this error, me included. And this was a giant ass awakening for me to desert that lazy apply.
Need to verify for those who’ve been compromised and the place/how/when? Try the positioning referred to as HAVE I BEEN PWNED
Jesus, my electronic mail was stolen on 10 separate information breaches and offered on the darkish internet! SCARY!
so did you verify for those who have been pWNED? What was the outcome? What number of websites have your information?
As you’ll be able to see, mine is fairly brutal. I’ve been utilizing a program referred to as LastPass for ever and generate a distinct password for each single web site I register on. After I began out 10 years in the past, this software wasn’t round – fortunately despite the fact that they stole my information, I’m okay as I often get prompted to vary passwords.
Anyway, again to the story. So the information safety man whose weblog I used to be studying mentioned that they in all probability didn’t hack Jeff himself, as a result of he’s tremendous rich and closely protected. What they did as an alternative was hack the accounts of his secret love affair. The hackers may have used a web site to seek out all/associated emails of this girl, after which search for within the stolen database archives her many emails and see if the passwords she used there would work on present companies (as many individuals use the identical password for his or her icloud, like they use for his or her favourite discussion board, and so forth).
Very fascinating to say the least; I’m tremendous glad I learn this text and now suggested my spouse and associates (you guys included) to deal with your self by being safety sensible.