Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'more '.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 22 results

  1. A free silent (hidden) native cryptocurrency miner capable of mining ETH, ETC, XMR, RTM and much more, with many features suited for mining silently. This miner can mine all the following algorithms and thus any cryptocurrency that uses one of them: List of algorithms Main Features Native C++ - Miner installer/injector and watchdog coded fully in C++ with no run requirements except a 64-bit OS Injection (Silent/Hidden) - Hide miner inside another process like explorer.exe, conhost.exe, svchost.exe and others Idle Mining - Can be configured to mine at different CPU and GPU usages or not at all while computer is or isn't in use Stealth - Pauses the miner and clears the GPU memory and RAM while any of the programs in the "Stealth Targets" option are open Watchdog - Monitors the miner file, miner processes and startup entry and restores the miner if anything is removed or killed Multiple Miners - Can create multiple miners to run at the same time, for example one XMR (CPU) miner and one ETH (GPU) miner CPU & GPU Mining - Can mine on Both CPU and GPU (Nvidia & AMD) Windows Defender Exclusions - Can add exclusions into Windows Defender after being started to avoid being detected Process Killer - Constantly checks for any programs in the "Kill Targets" list and kills them if found Remote Configuration - Can get the miner settings remotely from a specified URL every 100 minutes Web Panel Support - Has support for monitoring and configuring all the miners efficiently in a free self-hosted online web panel Rootkit - Has a built-in rootkit that can be enabled to fully hide the miner processes And many many more. SilentCryptoMiner v3.2.0 - 04/01/2023 Changed miner settings from being passed through the command line to instead be passed directly through the PEB Changed XMR miner to clear RAM during "Stealth" when possible Changed PEB calls to be more obfuscated due to new detections Changed miner to read the current executable path for installation directly from the PEB instead of a Windows API call Changed miner and watchdog to read the environmental variables directly by traversing the PEB Included rootkit directly inside the miner instead of using the rootkit installer to avoid the new AMSI detections and for more flexibility Changed rootkit to now run outside of the "Startup" installation flow to allow for it to run when "Startup" is disabled Moved "Install Rootkit" out from "Advanced Options" and renamed it to "Use Rootkit (Hide Miner)" since the rootkit should now be stable Updated compiler command options to reduce detections Added system call registry access functions to allow registry manipulation without using the Windows API or CMD Changed GPU checking to directly read the registry instead of using a WMI command with a file buffer Added signature cloning tab where you can clone the digital certificate of another program into the miner Moved administrator checks from powershell directly into the C++ code Added Task Scheduler "Startup" entry checking into the Watchdog Merged obfuscate.h library and obfuscatew.h library into a custom-made unified version called obfuscateu.h Added a custom-made SysWhispersU direct system call generator and removed the previous SysWhispers2 Modified SysWhispersU and obfuscateu.h to use different encryptions in order to avoid XOR detections Added simple obfuscation to well-known SysWhispers constants and offsets to avoid static detections Readded explorer.exe as injection option Made explorer.exe the default injection option again Updated uninstaller to instead find the watchdog and miner processes by enumerating system mutex handles to find the owner process Added "Disable Windows Update" rollback into the uninstaller to allow the uninstaller to fix Windows Update during uninstallation Updated checker to instead check if the mutex is active to ascertain whether the miner and watchdog is running or not Merged many C++ files together to be able to store them unzipped in the project in order to make all code changes directly visible in commits Optimized and shortened many functions such as the previously verbose process creation function Increased delete pending injection temporary file name length to further decrease collision chance Fixed possible parent spoofing failure if required buffer size changes between system calls Change installation to call reg.exe and schtasks.exe directly when possible instead of through cmd.exe Fixed "Startup" installation bug on some systems when "Entry Name" contained a space Fixed support for Unicode characters inside the "Assembly" settings Updated both miners Added Portuguese (Brazil) translation (MatheusOliveira-dev) [Hidden Content]
  2. Learn 10 Ways to Make MORE Money on YouTube! Would you like to make money on YouTube even while you are sleeping? The work that you do today can make you money for months and years to come! In this YouTube Audience Growth course, you'll learn at least 5 Ways to Make Money on YouTube. You'll learn how to attract 1,000,000's of Views and Grow Your YouTube Channel Into a MONEY-MAKING MACHINE I published some videos back in 2017 and they are still generating me money EVERY. SINGLE. DAY. Some of my videos have made me over $900 for just 3,000 views. And I started earning money with less than 100 subscribers. Meanwhile, I can't promise that you will achieve the same results that I got, I can show you what has worked for me and 1,000's of other YouTubers who are making money on this platform. - The beauty of making money on YouTube is that the work you do today will make you money for months, years and even for decades. Just 1 powerful tip that you learn from this course may be worth $1,000's over the long term. - But things weren't always so shiny... When I got started on YouTube for the first time, I struggled because I didn't know what works. I got some results but I wasn't satisfied. I still kept on doing it. Little by little I learned the skills and nowadays YouTube is allowing me to live the lifestyle of my dreams. I've traveled in over 40 different countries while my YouTube channel is making me money even when I sleep. Today you'll learn the best secrets on how I made it. And even most importantly you'll learn how YOU can make money using YouTube. It's Your Time! - Roope "Sharing the secrets for making money on YouTube" Kiuttu PS. YouTube is still MASSIVELY growing every single year. If you want to make money using YouTube, the time is NOW. [Hidden Content]
  3. A free silent (hidden) native cryptocurrency miner capable of mining ETH, ETC, XMR, RTM and much more, with many features suited for mining silently. This miner can mine all the following algorithms and thus any cryptocurrency that uses one of them: List of algorithms Main Features Native C++ - Miner installer/injector and watchdog now coded fully in C++ with no run requirements except a 64-bit OS Injection (Silent/Hidden) - Hide miner behind another process like conhost.exe, svchost.exe and others Idle Mining - Can be configured to mine at different CPU and GPU usages or not at all while computer is or isn't in use Stealth - Pauses the miner and clears the GPU memory while any of the programs in the "Stealth Targets" option are open Watchdog - Monitors the miner file and replaces the file if removed and starts it if the injected miner is closed down Multiple Miners - Can create multiple miners to run at the same time, for example one XMR (CPU) miner and one ETH (GPU) miner CPU & GPU Mining - Can mine on Both CPU and GPU (Nvidia & AMD) Windows Defender Exclusions - Can add exclusions into Windows Defender after being started to avoid being detected Process Killer - Constantly checks for any programs in the "Kill Targets" list and kills them if found Remote Configuration - Can get the miner settings remotely from a specified URL every 100 minutes Web Panel Support - Has support for monitoring and configuring all the miners efficiently in a free self-hosted online web panel SilentCryptoMiner v3.1.0 Latest Changed process creation from undocumented API calls to direct system calls Added process parent spoofing with token impersonation when creating processes Created custom process parameter creation to avoid API calls Added system call process enumeration for parent spoofing Updated SysWhispers2 with custom process creation definitions and more Modified SysWhispers2 assembler instructions to bypass new detection Changed all indirect API calls to direct system calls Changed compiler binaries to reduce some compiler caused detections Fixed known XMR "GPU Mining" compilation error with new compiler Fixed XMR GPU library location checking on some systems Changed GPU memory checking from CUDA API to NVML for much better accuracy Updated ethminer CUDA and OpenCL mining implementations Updated ethash, etchash and ubqhash algorithm implementation Added improved CUDA and OpenCL automatic restart on error or crash Improved GPU limit sleep time accuracy for powerful GPU cards Removed ETH from the preset list due to the ETH merge from PoW to PoS Added EthereumPoW (ETHW) fork of ETH to the preset list Rewrote website blocking to avoid using string to reduce dependencies Updated rootkit and fixed some rootkit bugs Fixed many miscellaneous bugs Updated xmrig [Hidden Content]
  4. 27 downloads

    MEGA .NZ LEAK DATABASE COMBOS DUMPS MORE Link: Download Free for users PRIV8
    From $110 PRIV8
  5. View File [7.42 GB] Leaked Database & Combos & Dorks & More (2022) MEGA .NZ LEAK DATABASE COMBOS DUMPS MORE Submitter dEEpEst Submitted 16/10/22 Category Files Password ********  
  6. Description This entry-level Microsoft Do More with Windows 10 course prepares learners to effectively navigate some of Windows 10’s most useful applications and features. Windows 10 is so standard, it might as well be the world’s operating system of record. From giant multinationals, down to the smallest mom and pops, as of September 2019, more than half of all PCs are using Windows 10. After completing this Microsoft training, you’ll know how to navigate, manage, and optimize Windows 10’s features and applications. This Microsoft training can help onboard new technical and non-technical professionals, curated into individual or team training plans, or as a Microsoft reference resource for anyone who manages Microsoft operating system training. Do more with Windows 10: What You Need to Know This Do more with Windows 10 training covers Windows 10 topics including: Shortcuts to speed up working with Windows 10 features Essential use of built-in Windows 10 applications Windows 10 Touch capabilities Organising with Windows OneNote Creating 2D & 3D projects with Paint 3D Who Should Take Do more with Windows 10 Training? This Do More with Windows 10 training is considered end-user Microsoft training and is designed for technical and non-technical professionals. This Windows 10 skills course is valuable for those who are new to using Microsoft operating systems and experienced technical and non-technical professionals looking to validate their Microsoft skills. New or aspiring technical and non-technical professionals. Whether you work in an IT-related field or not, understanding how to do more with Windows 10 is a great way to start your career off on the right foot. Windows 10 is where you’ll do most of your work. If you’re a technician, you’ll be optimizing it. If you’re not, you’ll depend on it every day. Experienced technical and non-technical professionals. If you’ve already been working in your career field for several years, there’s no better time to get familiar with Windows 10. Because you’ve already figured many tricks and shortcuts out on your own, you’ll fly with in-depth training. [Hidden Content]
  7. Features - Add any SMTP - Mass mailer, send multiple emails per second - Add Single/List - Remove Single/List - Validate Email List - Ensure Emails Are Legit - Plain text/HTML - Add any attachment [hide][Hidden Content]] * Detected because its Obfuscated / itsMe
  8. After being in development for a very long time and after having been remade multiple times, this unified miner of my ETH and XMR miners is finally ready for release. This miner can mine all the following algorithms and thus any cryptocurrency that uses one of them: List of algorithms Main Features Native & .NET - Miner installer/injector and watchdog coded in C#, Shellcode loader/injector coded in C, miner requires .NET Framework 4.5 Shellcode - All .NET C# parts are converted into Shellcode and injected using a native C loader, can be disabled Injection (Silent/Hidden) - Hide miner behind another process like explorer.exe, conhost.exe, svchost.exe and others Idle Mining - Can be configured to mine at different CPU and GPU usages or not at all while computer is or isn't in use Stealth - Pauses the miner and clears the GPU memory while any of the programs in the "Stealth Targets" option are open Watchdog - Monitors the miner file and replaces the file if removed and starts it if the injected miner is closed down Multiple Miners - Can create multiple miners to run at the same time, for example one XMR (CPU) miner and one ETH (GPU) miner CPU & GPU Mining - Can mine on Both CPU and GPU (Nvidia & AMD) Bypass Windows Defender - Can add exclusions into Windows Defender to avoid being detected Process Killer - Constantly checks for any programs in the "Kill Targets" list and kills them if found Remote Configuration - Can get the miner settings remotely from a specified URL every 100 minutes Web Panel Support - Has support for monitoring and configuring all the miners efficiently in an online web panel Changelog v2.0.1 (09/11/2021) Removed Hide File option due to it restricting the file from being written to, thus enabling it to cause unwanted behaviour and bugs Fixed possible bug where the random encryption keys could be generated with illegal characters Fixed builder bug where it didn't clear the miner set for the Watchdog between builds Fixed Monero icon [Hidden Content]
  9. Please Don't Use for illegal Activity Added New Tools Root Android {Supersu} Not Support All OS Version Jump To Adb Toolkit Shell ScreenShot Copy All Camera Photo Copy All WhatsApp Folder Copy All Data Storage Manual Copy {Costum} Backup Data Restore Data Permissons Reset Reboot Remove Lockscreen {Root} Jump To Metasploit Install Application Create Payload Backdoor {Msfvenom} Singed Run Metasploit Inject Payload In Original Application Phone Info Control Android {Scrcpy} Brute Pin 4 Digit Brute Pin 6 Digit Brute LockScreen Using Wordlist Bypass LockScreen {Antiguard} Not Support All OS Version Reset Data Cilocks_V2.1 Added new feature IP Logger GetCam Rat IOS {Metasploit} [hide][Hidden Content]]
  10. Photoshop. 90 plugins for Photoshop 5500 unique add-ons 39 Photoshop Actions 2345 unique layer styles 643 Photoshop Brushes 1558 Photoshop Swatches 298 Photoshop Overlays [Hidden Content]
  11. Hello Everyone! If you are planning to start a YouTube Channel, then this video is a must. No matter you want to create a Youtube channel and make money or are doing it for passion – this course will guide you and give you step-by-step instructions to get started right from the beginning. The course is divided into several parts: In the beginning, we will set up the YouTube channel, which includes all the steps from scratch. Inclusive is also the required sizes for Banners, logos, Youtube art, thumbnails, and more. we will walk through it together and talk about various YouTube backends. In the second part, we will gain some ideas about Keywords and keyphrases. This should give you directions on how you can plan the titles and descriptions for your video. It will lay the first foundation for you to grow in the future. Then we will get in the backend of the channel – Hey Lets Learn Something and talk about how we started in the beginning. Despite the Channel is not at the top or whatsoever, you will get insights to learn more about the YouTube Channel that has been monetized. And lastly, we’ll have some questions and answers which you may have in regards to starting a YouTube Channel. All in all, this course should give you a complete idea of how to get started; in the end, it’s all about patience and experience, where you will be to formulate your own ideas. [Hidden Content] [hide][Hidden Content]]
  12. 5,500 UNIQUE PHOTOSHOP ADDONS - BRUSHES, ACTIONS, STYLES & MORE 90 plugins for Photoshop; 5500 unique add-ons; 39 Photoshop Actions; 2345 unique layer styles; 643 Photoshop Brushes; 1558 Photoshop Swatches; 298 Photoshop Overlays [Hidden Content]
  13. Two 0-days discovered in Tor, and more are expected. Dr. Neal Krawetz is a security researcher who, in recent years, has repeatedly reported security breaches to the Tor Project, but, in his opinion, he believes that the security of his networks, tools and users is not taken. seriously enough. For this reason, Dr. Neal Krawetz published last week and today on his blog, technical details about two 0-day vulnerabilities that affect the Tor network and the Tor browser. The researcher has also promised to reveal at least three more 0-days of Tor, including one that can reveal the real-world IP address of Tor servers. Tor's first 0-day. In a blog post dated July 23, [Hidden Content] the researcher describes how companies and Internet service providers could block users from connecting to the Tor network by scanning network connections for "a distinctive packet signing» that is unique to Tor traffic. This bug could be used as a way to block Tor connections from starting and ban Tor entirely. The second 0-day of Tor. Today, in a new blog post, [Hidden Content] he reveals a second flaw that, like the first one, allows network operators to detect Tor traffic. However, while the first day zero could be used to detect direct connections to the Tor network (to the Tor guard nodes), the second day can be used to detect indirect connections. These are connections that users make to Tor bridges, a special type of entry point on the Tor network that can be used when businesses and ISPs block direct access to the Tor network. Tor bridges act as proxy points and transmit user connections to the Tor network itself. Because they are sensitive Tor servers, the list of Tor bridges is constantly updated to make it difficult for ISPs to block it. But Dr. Krawetz says that connections to Tor bridges can be easily detected, too, using a similar technique of tracking specific TCP packets. “Between my previous blog post and this one, you now have everything you need to enforce the policy [of blocking Tor on a network] with a real-time stateful packet inspection system. You can prevent all your users from connecting to the Tor network, whether they connect directly or use a bridge. " DR. KRAWETZ.
  14. BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2428 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. BlackArch Linux is an open-source distribution of Linux derived from the lightweight and powerful Arch Linux operating system and designed from the ground up to be used by security professionals for penetration testing tasks. ChangeLog 2020.06.01: added more than 150 new tools disabled iptables/ip6tables service remove unneeded virtualbox services (drag’n’drop, vmsvga-x11) replace wicd with wifi-radar (gui) and wifi-menu (curses -> netctl) updated blackarch-installer to v1.1.45 included linux kernel 5.6.14 QA’ed and fixed a lot of packages (runtime exec, missing dependencies) updated all vim plugins and improved vim config options updated all blackarch tools and packages including config files updated all system packages updated all window manager menus (awesome, fluxbox, openbox) [HIDE][Hidden Content]]
  15. WhoUr information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner WhoUr is a simple tool in python for getting info of a website and scan sqli vul with google. this is fast but is not powerful, actually is under construction, but is usefully. This project has been update for use python3. Features: Whois DNS Lookup IP Reverse Lookup Admin Finder Dork Scanner SQLI vul scanner Dork scanner You can use you own dork(inurl:"index.php?id=") or a random dork from 'dics/dork.txt', you can save the found vulnerable sites in a text file. Change-Log 1.6 [17-01-2020] retake project, Update code for use python3, Fix some bug [HIDE][Hidden Content]]
  16. Beat the heart of the dark Internet: more than 2,000 computers intervene in a former NATO bunker The German police dismantled a large server center that facilitated clandestine operations from the small town of Traben-Trabach It was surely one of the key pieces of the Dark Network throughout the world. But it has been dismantled. The German Police has managed to intervene a large server center of the darknet, the hidden and criminal area of the Internet in which clandestine operations such as drug and weapons trafficking are carried out, and even the hiring of murderous hitmen. The operational center was hidden in a former Atlantic Alliance bunker abandoned at the end of the Cold War and located in the small palatine town of Traben-Trabach , in the west of the country. More than 650 police officers, including several units of special agents, participated in the raid carried out in several countries and locations simultaneously, during which seven arrests took place, according to the prosecutor in charge of the case, Jügen Brauer. It is the first time that a so-called Bulletproof Hoster is located in Germany, a large concentration of clandestine servers that offers criminal organizations the possibility of operating virtually with maximum security guarantees and beyond the reach of law enforcement. So far the researchers have intervened 200, but they estimate that the total hidden in the clandestine cyber bunker exceeds 2,000 servers. The amount of data they accumulate is "gigantic," said the president of the Criminal Investigation Office (LKA) of Rhineland-Palatinate, Johannes Kurz, who said the police operation had begun to be prepared last May. Although there are seven detainees, a total of thirteen suspects, twelve men and a woman between the ages of 20 and 59, accused of collaboration in hundreds of thousands of cases of drug trafficking and large-scale weapons, businesses with fake money, commerce with stolen data and dissemination of child pornography , among many other crimes, the Prosecutor's Office reported. They are also accused of the attack suffered in 2016 by 1.25 million customer routers from the German telephone company Telekom. Through the hidden servers in the cyber bunker operated the second largest illegal and criminal darknet market in the world, the so-called Wall Street Market, a platform that was also busted by German police last spring and its three operators arrested. More than 5,400 vendors offered 1.1 million customers through it weapons or drugs, criminal services, stolen data or harmful software, among many other "unsavable" products in legal markets. Payments were made through cryptocurrencies and the platform managers pocketed commissions between 2% and 6% of the product sold. The head of the cybercriminal group is the eldest of all the detainees, a Dutch citizen who had officially moved his residence to Singapore , but habitually inhabited the bunker and a house in the region. During the operation the agents executed 18 search warrants, also in neighboring countries such as Poland, Holland and Luxembourg. The volume of data on criminal and illegal operations accumulated by seized servers is so huge that it will take months and possibly years to analyze it. The president of the LKA stressed that the investigations on the case began in 2015 and that during these years they have worked closely with the police of the federated states of Hesse and Bavaria, but also the Netherlands. "We have needed a long breath," said Kurz, who was very satisfied with the success of the operation. "It is the first time in Germany that there is no action against the managers of clandestine stores or platforms, but against those who enable their crimes to be committed," explained Prosecutor Brauer. Through the servers they operated illegal platforms such as Cannabis Road, with 87 sellers of all kinds of narcotics, or other more sophisticated and specialized in synthetic drugs.
  17. You can download videos from these websites with one click. Automatic installation Detailed statistics in dashboardnNew design in frontend Improvement in the backend system code System for themes Automatic installation AJAX Based Demo: [Hidden Content] [HIDE][Hidden Content]]
  18. Pop! _OS, the recently released Linux distribution for the well-known Linux notebook maker System76, is based on the Ubuntu and GNOME desktop environments and aims to provide users with a personalized and fresh experience. Although based on the GNOME desktop environment, System76 customizes user interfaces, drivers, and more, with a modern, simple look and a better user experience. The creative and functional focus of Pop! _OS is aimed at professional users, making Linux desktops more productive and a great helper for engineers, developers, and computer scientists. The Pop!_OS developer recently released the Pop!_OS 19.04 ISO image. This version includes the following features: -The Slim Mode option maximizes your screen real estate by reducing the height of the header on application windows -Dark Mode gives your applications a relaxing ambience for nighttime viewing. Both Dark Mode and Slim Mode can be activated in the Appearance settings menu. -Refresh Install allows you to reinstall Pop!_OS without losing Users and any data in your Home directories. This feature is available from the recovery partition on new installations (not upgrades). For more information on how to do this, click here. -Pop!_OS has been updated to use version 5.0 of the Linux kernel -GNOME has been updated to version 3.32 -Packaging for both CUDA 10.1 and Tensorflow 1.13.1 toolkits -Gamehub and Lutris are now available through the Pop!_Shop -Popsicle, the installation media creator for Pop!_OS, has been improved to remove the possibility of UI freezes. -The NVIDIA driver has been updated from 410 to 418, which provides new hardware support, security and stability fixes, and improves GNOME Shell animations. More… [HIDE][Hidden Content]]
  19. With PlayTube users can view & Interact with lasted videos and like and comment and more, now using the application is easier, and more fun! PlayTube is easy, secured, and it will be regularly updated. Demo: [Hidden Content] [HIDE][Hidden Content]]
  20. How To Hack Instagram/ FB/ And Many More Sites With this Trick you can hack anyone Social Media account. You Just Need To Trick The Person To Login With The Link [Hidden Content]
  21. Facebook discovered it on Tuesday afternoon but did not inform its users until Friday night that the company had suffered the biggest hack in its history in which at least 50 million accounts have been compromised . Last Tuesday, the company informed the FBI and the Irish Data Protection Commission - in charge of ensuring the European regulation of data protection - of a breach in its security system whose origin and mobile were unknown to them . Facebook took two days, until Thursday night, to solve their security problem .However, the internal investigation is still open and the company does not know if "the accounts were misused", according to the CEO of the company, Mark Zuckerberg, in a message on his social network. Notification that users have received in their Facebook profile affected by the hack. "On Tuesday, I assumed that an attacker had exploited a technical vulnerability to steal access to more than 50 million accounts," he said. A fact that, after jumping to public opinion, Zuckerberg himself has described as " a very serious security issue " that "they are taking very seriously" in statements to the American media. According to the company, the hackers were taking advantage of the functionality of "see as" -that allows the owner of an account to know what his profile looks like in the eyes of a third person- to take over and take control of the accounts of third parties . In response to this attack, Facebook has chosen to reset the accounts of 90 million users around the world, who will have to re-enter their username and password to regain access to their account. In addition to the 50 million accounts that have been exposed by the security breach , the company has decided to reset by precaution the accounts of another 40 million users who would have accessed the "see as" function over the past year. A hack at the worst moment for Facebook This hack has come at the worst possible time for Facebook . After its last presentation of results in July, the company's shares plummeted 21% to stand at around $ 170. The stock market crash came precipitated by a growth of 1.44% during the last quarter, a figure well below those that had been harvested during the last years. In addition, Facebook faces a serious leak of users in the United States.According to the latest survey of the Pew Research Center, 25% of users would have already been removed from this social network . A percentage that, in the youngest age group, rises to 44%. What should I do to secure my passwords? The most important thing to avoid someone sneaking into your Facebook account is to have a very secure password. You should not include your name, predictable numbers - such as birth dates - or common words or words that can easily be associated with you. If you want to create a very secure password and always remember it, here is a small guide to do it so that nobody knows how your account is protected. In addition, Facebook offers the option to activate verification in two steps .This system of 'defense' extra that requires a code that is generated randomly and sent by message to a phone number, in addition to having to write our username and password . So, even if someone knows your Instagram credentials and tries to access from your mobile or computer, you can not enter your account unless you also have your phone and receive the SMS with the code . It is highly recommended to activate verification in two steps, both on Facebook and any other service that offers it, be it WhatsApp, Instagram, Gmail or others.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.