A DOS, or disk operating system, is an operating system (OS) that runs from a disk drive. The term can […]
A DOS, or disk operating system, is an operating system (OS) that runs from a disk drive. The term can […]
Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological […]
Cryptology is the mathematics, such as number theory and the application of formulas and algorithms, that underpin cryptography and cryptanalysis. […]
Biometrics is the measurement and statistical analysis of people’s unique physical and behavioral characteristics. The technology is mainly used for […]
In December 2024, data alleged to have been taken from the Brazilian lead generation platform Speedio was posted for sale to a popular hacking forum. The data was allegedly obtained from an unsecured Elasticsearch instance and contained over 62M records of largely public business information including company names, phone numbers and physical addresses, along with 27M unique email addresses, predominantly from public services such as Gmail and Outlook. Speedio did not respond to multiple attempts to disclose the incident, and the origin of the data could not be independently verified. The data was provided to HIBP by a source who requested it be attributed to “ayame@xmpp.jp”.
A password is a string of characters used to verify the identity of a user during the authentication process. Passwords […]
In June 2021, the (now defunct) gaming website HeatGames suffered a data breach that was later redistributed as part of a larger corpus of data. The breach exposed almost 650k unique email addresses along with IP addresses, country and salted MD5 password hashes.
In January 2025, 435k email addresses were scraped from the “doxing” service Doxbin. Posts to the service are usually intended to disclose the personal information of non-consensually third parties. The data was provided to HIBP by a source who requested it be attributed to “oathnet.ru”.
Threat modeling is the systematic process of identifying threats to and vulnerabilities in software applications, and then defining countermeasures to […]
SSL (Secure Sockets Layer) is a networking protocol that secures connections between web clients and web servers over internal networks […]