• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Oh my god someone hacked Ashley Madison...

Page 9 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.
When he said address I assumed e-mail, and those are easy to find.

I didn't realize you wanted ADDRESS... Derp. I haven't seen one but I'm sure it's available.
 
https://haveibeenpwned.com/

So talking about E-mail address I found a sight from Troy Hunt, a Microsoft Most Valuable Professional awardee for Developer Security, blogger at troyhunt.com, international speaker on web security and the author of many top-rating security courses for web developers on Pluralsight that will not only search AM but a lot of hacked sights. You can see what has been hack on this site and search your E-mail.

Edit:
http://www.troyhunt.com/2015/07/heres-how-im-going-to-handle-ashley.html
It looks like you will have to use the notify me to find out. Troy did not want to make to easy for anyone to find out.
 
Last edited:
https://haveibeenpwned.com/

So talking about E-mail address I found a sight from Troy Hunt, a Microsoft Most Valuable Professional awardee for Developer Security, blogger at troyhunt.com, international speaker on web security and the author of many top-rating security courses for web developers on Pluralsight that will not only search AM but a lot of hacked sights. You can see what has been hack on this site and search your E-mail.

In in there... freaking Adobe LOL.
 
http://arstechnica.com/security/201...hley-madison-passwords-could-take-a-lifetime/

Found this really interesting. While password hashes were part of the leak since they were both salted and encrypted with bcrypt the possibility of actually cracking them to find the real password is extremely low and takes an extreme amount of time even with powerful and specialized equipment. Due to AM employing these methods one of the specialists attempting to reveal the true passwords was limited to 156 guesses per second instead of the 7m-11m that would be possible with more common, weaker methods of hashing such as MD5 or SHA1. Kind of a tertiary concern given the nature of this breach (where it's more about simple membership than anything else) but I thought it interesting how effective the hashing could be at protecting the passwords even when exposed and freely attacked.
Hey, at least they were doing that much.
 
Back
Top