An anonymous reader writes from a report via Softpedia: A listing was published today on TheRealDeal Dark Web marketplace claiming to be offering data on over 200 million Yahoo users, sold by the same hacker that was behind the LinkedIn, Tumblr, MySpace, and VK data dumps. In statements to Softpedia, Yahoo said it was investigating the breach, but based on the seller’s reputation, it is very likely the data is authentic. The data is up for sale for 3 Bitcoin (approximately ~$1, 800), and based on the sample the hacker provided, the data dump includes details such as usernames, MD5-hashed passwords, and dates of birth for all users. For some records, there is also a backup email address, country of origin, and ZIP code for U.S. users. The hacker, called Peace, has also told Softpedia that he previously made $50, 000 from the LinkedIn breach alone, and over $65, 000 in total from all breaches. Read more of this story at Slashdot.
See the original article here:
Hacker Selling Data For 200 Million Yahoo Users On The Dark Web
An anonymous reader writes from The Register: Vine, the six-second-video-loop app acquired by Twitter in 2012, had its source code made publicly available by a bounty-hunter for everyone to see. The Register reports: “According to this post by @avicoder (Vjex at GitHub), Vine’s source code was for a while available on what was supposed to be a private Docker registry. While docker.vineapp.com, hosted at Amazon, wasn’t meant to be available, @avicoder found he was able to download images with a simple pull request. After that it’s all too easy: the docker pull https://docker.vineapp.com:443/library/vinewww request loaded the code, and he could then open the Docker image and run it. ‘I was able to see the entire source code of Vine, its API keys and third party keys and secrets. Even running the image without any parameter, [it] was letting me host a replica of Vine locally.’ The code included ‘API keys, third party keys and secrets, ‘ he writes. Twitter’s bounty program paid out — $10, 080 — and the problem was fixed in March (within five minutes of him demonstrating the issue).” Read more of this story at Slashdot.
An anonymous reader writes: Github’s transparency report for 2015 shows that the site received many DMCA notices that removed more than 8, 200 projects. “In 2015, we received significantly more takedown notices, and took down significantly more content, than we did in 2014, ” Github reports. For comparison, the company received only 258 DMCA notices in 2014, 17 of which responded with a counter-notice or retraction. In 2015, they received 505 takedown notices, 62 of which were the subject of counters or withdrawals. TorrentFreak reports: “Copyright holders are not limited to reporting one URL or location per DMCA notice. In fact, each notice filed can target tens, hundreds, or even thousands of allegedly infringing locations.” September was a particularly active month as it took down nearly 5, 834 projects. “Usually, the DMCA reports we receive are from people or organizations reporting a single potentially infringing repository. However, every now and then we receive a single notice asking us to take down many repositories, ” Github explains. They are called ‘Mass Removals’ when more than 100 repositories are asked to be removed. “In all, fewer than twenty individual notice senders requested removal of over 90% of the content GitHub took down in 2015.” Read more of this story at Slashdot.