![]() ![]() I am a member of the fish site (which I have seen elsewhere referred to as the “Sausage factory”) and find online dating in general a great way to meet new people. This entry was posted on Monday 31st of January 2011 10:12 AM Companies that fail to take even this basic security step and then look for places to point the finger when they get hacked show serious disregard for the security and privacy of their users. But on top of that, the company appears to store its customer and user passwords in plain text, which is a Security 101 no-no. POF claims to have closed the security hole and reset all user passwords. Part of the reason pof.com has a problem is because its database is insecure. Good thing he didn’t check the kinds of people I’m following on Twitter: He might have really had a heart attack! At one point in Frind’s post, he says he grew particularly alarmed when he saw that Russo and I were “friends” on Facebook. This morning, I awoke to find a rambling blog post that indirectly accuses me of participating in an extortion scam, before mildly backtracking from that claim. I began actually writing up a blog post about this hack yesterday. A woman named Kate answered when I called, but said she would relay my message.įor the past 10 days, Frind has promised a response, but otherwise dodged my emails. He gave me the phone number of Frind’s friend, Annie. When two days elapsed and I still hadn’t received a reply, I asked Russo if he had any other contact information for Frind or other pof.com administrators. That was enough for me to fire off an e-mail to pof.com Founder Markus Frind. I did so, and Russo proceeded to read me my registration information. He said the information was being circulated in the hacker community, and that he could prove the flaws existed if I simply created a free user account on the site. 19, I heard again from Russo, who told me he and some friends had found bugs in pof.com that let them view account and password information on any PlentyofFish user. In July 2010, Russo had alerted me to some security vulnerabilities he’d claimed to have found in the Web site of, which he said exposed password and other data on millions of TPB users. Usually, when the company in question replies by implicating you in an alleged extortion scheme, two things become clear:ġ) You’re probably not going to get any real answers to your direct questions about the incident, and Ģ) The company almost certainly did have a serious breach.Įarlier this month, I was contacted by an Argentinian hacker named Chris “Ch” Russo, who said he’d found flaws in pof.com. But for better or worse, I have notified dozens of companies about various breaches over the years, and I’ve learned to read between the lines in how victims respond. Learning that you’ve been hacked when a reporter calls is probably even less fun. In response, the company’s founder has implied that the editor of was involved in an elaborate extortion plot. Hackers have breached the database of online dating site, exposing the personal and password information on nearly 30 million users. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |