Tech News

It’s not just Facebook: Now it was LinkedIn’s turn and in a big way

Pinterest LinkedIn Tumblr

Just yesterday we were talking about the data exposed by Facebook users and how you could see if your data was exposed on the internet, as it seems that it has become fashionable and today another bomb appears.

In a forum dedicated to hackers, data from more than 500 million LinkedIn users was put up for sale, with the seller offering a sample of 2 million users to prove that the data is reliable, for two dollars paid through Bitcoin, being which have already been confirmed by a website specializing in these types of situations.

According to the CyberNews, the sample has already been proven to belong to the social network turned to the business market, and, fortunately, the data disclosed does not contain bank data or more confidential data. According to the website, the data revealed are as follows:

  • LinkedIn IDs
  • Full names
  • Emails
  • Phone numbers
  • Gender
  • Links to LinkedIn profile
  • Links to other dosical network profiles
  • Professional or similar titles

Its not just Facebook Now it was LinkedIns turn and

Although the data released may be considered not very sensitive, it should be remembered that most users use passwords related to their personal data, which will facilitate those who want this data to try to enter more important accounts.

But was it a LinkedIn security breach?

The CyberNews website initially indicated that this data could be an aggregate of previous attacks, and that is exactly what LinkedIn itself has already officially confirmed through communication.

LinkedIn, which is owned by Microsoft, says that after investigating this information, no security breach was found by LinkedIn, which ends up confirming what the specialized website itself said.

The concern in this case turns out to be the greatest facility for hackers to send spam and steal passwords, card numbers and bank details.

Another concern is the possibility of a DDNS attack, which consists of programming a machine to perform up to millions of password attempts until it finds the combination that gives access to the victims’ account. It may seem like an ineffective method, but many users use their own name and date of birth to create their password.

Want to read GSMNigeria more news? See Related Posts below

Want to read GSMNigeria more news? See Related Posts below

Have an article/sponsored post to share? Whatsapp: +2348129656985.

Notify of
Inline Feedbacks
View all comments
Pin It