Search This Blog

Latest News

European Union likely to ban Facial Recognition for 5 years

The EU (Europian Union) is considering restricting the use of facial recognition technology for a possible duration of 5 years, in public ...

All the recent news you need to know

Adult Webcam Models' Private and Sexual Data Compromised!


Undoubtedly, being an "Adult Webcam Model" means living a "revealing" life "out in the open". But to an extent where "Personal" and "Sexual" details are laid out on the table? Not what most would think.

PussyCash, an infamous “live webcam porn network” suffered a data breach and threw in the face of the internet all the tremendously “controversial” details of their adult webcam models’ lives.

Per sources, “PussyCash” hosts “affiliation programs” for numerous adult websites. Webmasters are paid for sending traffic to these sites via “banners”.

PussyCash owns and operates other similar websites via its parent organization “IML SLU” by the names of, “ImLive”, “Shemale”, “Forget Vanilla”, “Whiplr”, “Supermen”, “Phonemates”, “Fetish Galaxy”, “Sexier” and many more.

PussyCash, who really should’ve known better, had administered an “explicit webcam network” with over 870,000 files left unattended for ANYONE with an internet connection to access without the need for a PASSWORD.

The awfully gigantic plop of information about the adult webcam models that was leaked by PussyCash had in it the models’ full names, dates of birth, places of birth, addresses, nationalities, citizenship statuses, passport details, genders, photographs, signatures, parents’ full names, fingerprints, the entire credit card numbers their expiry dates, driving licenses, marriage certificates, birth certificates, body measurements, tattoo and piercing details and other such stuff.

But this was NOT ALL.

Other particularly uncanny and creepy details of the models’ personal and work lives got revealed, including, PHOTOGRAPHS, VIDEO CHATS and SCREENSHOTS of their work, apparently. And, their Sexual Fantasies, Favorite Sexual Positions, scans of their handwritten biographies, hobbies, favorite food, and the list goes on.

(Mortifying!)

This data leak has surely opened up new avenues for criminals by providing them fresh meat to ‘extort’, ‘stalk’, ‘blackmail’ and publicly humiliate these models in addition to the commonplace attempts at identity thefts and scams.

Once an adult webcam model, NOT ALWAYS an adult webcam model.
It is more than probable that out of the listed individuals some preferred to quit being “adult webcam models” and moved towards more conventional and professional jobs and careers. What would happen if their workplaces get privy to these exceedingly controversial details of their past lives?

Unfortunately, PussyCash isn’t the first one to err so. Loads and tons of websites leave their sensitive data out on the face of the internet for people to exploit.

Porn websites certainly can’t be condoned of lack of security just because, well, they are porn websites. Everyone on the web should equally worry about the privacy of their data, it doesn’t matter if the organization is professional or not.

52 Hackers get into the US Army system in the last 5 weeks


Last year, during October and November, 52 hackers were able to hack the US army. "It only strengthens our security systems as the hackers who hacked our systems did it on ethical principles, as the participants of second 'Hack the Army' event that is taking place since the year 2016," says the spokesperson of the US Department of Defense Defense Digital Service.



In today's world of cyber attacks and hacking, it is right to assume that inviting hackers to try and invade your system's security is not safe, not even for the US army. The hackers don't need a mere invite to hack into any organizations' cybersecurity. This statement raises a bit of doubt as lately, the US government warned users to update specific Virtual Private Network (VPN), or suffer from persistent cybersecurity attacks. Also, recently, the New York airport and New Orleans city suffered a cyberattack.

But still, there exists a plan in this obvious cyber insanity. 'Hack Army 2.0' was a mutual undertaking between the U.S. Army, a bug bounty program called 'HackerOne,' and the Defense Digital Service.

What is HackerOne?
In simple words, HackerOne is a platform where various exploits or vulnerabilities can be tested by hackers. This platform has allowed some of its best hackers to win millions of dollars. Surprisingly, one hacker was even able to hack the program itself. This reflects the caliber and potential of the hackers, who register in HackeOne.
Therefore, the whole reason for organizing 'Hack Army 2.0' is to find out any threats or vulnerabilities that might affect the security of the US army. This is crucial as it ensures the US army from other unethical hackers and national threats, for instance, Iran.

146 bugs detected, the Army pays $275,000-
The results after this drill revealed that a total number of 60 open US army assets were under the potential threat of hacking. The US army rewarded the hackers a total amount of $274,000 for their efforts. "The assistance of hackers can be helpful for the Army to increase its defense systems exceeding fundamental agreement lists to attain maximum security," said the spokesperson Alex Romero.

Over 600 Million Users Download 25 'Fleeceware' Apps from the Play Store


Researchers at security firm Sophos has discovered a new set of Android apps present on the Google Play Store that contain fleeceware. Notably, these apps have been downloaded and installed by over 600 million unsuspecting Android users.

The term 'Fleeceware' was first coined in September 2019 by cybersecurity firm Sophos in aftermath of an investigation that led to a new kind of financial fraud on the authentic Google Play Store.

Fleeceware is a new addition to the cybersecurity ecosystem, referring to the exploitation of the trial period mechanism in Android apps which generally is provided before one is charged for the full version from his signed up account.

Normally, users who register for an Android app's trial period are required to cancel the same manually in order to avoid being charged. However, it's common among users to simply stop using the app by uninstalling it in case they don't like it. The action of uninstalling is read by the developers as trial period being canceled and hence it doesn't result in the due amount being charged from the user account.

The UK based, a cybersecurity company, Sophos told that it identified over two-dozen android apps containing fleeceware, these apps were charging somewhere around $100 and $240 per year for apps as basic and mainstream as barcode readers, calculators, and QR scanners.

Suspecting the unusually high number of downloads on these apps, analyst Jagadeesh Chandraiah says, it's likely that these apps have resorted to third-party pay-per-install services to raise up the download counts. He also suspects the five-star reviews being fake and bought in order to better the apps ranking on the Play store and hence lure a large number of users.

Warning the users in their report, Sophos told, "If you have an Android device and use the Google Play Store for apps, you should rigorously avoid installing these types of “free trial” apps that offer subscription-based charges after a short trial."

"If you do happen to have a free trial, make sure you understand that merely uninstalling the app does not cancel the trial period. Some publishers require you to send a specific email or follow other complicated instructions to end the free trial before you are charged, though you might just need to log into your Google Pay to cancel. Keep copies of all correspondence with the publisher, and be prepared to share that with Google if you end up disputing the charges." the report further read.

Russian banks to face risk due to a cancellation of support for Windows 7


Termination of technical support for Windows 7 and Windows Server 2008 operating systems (OS) can become a serious problem for Russian banks. According to the architect of the Microsoft technology center in Russia, Ivan Budylin, now, banks are required to quickly switch to Windows 10, since working without technical support is contrary to information security requirements. He added that the lack of updates can lead to significant risks of data loss.

At the same time, according to the survey, credit institutions are not yet ready to completely abandon the old OS.

Some banks reported that they had signed an agreement with Microsoft for paid additional support for Windows 7 (EAS). However, the expert noted that paid support is not an alternative to updating the operating system, but a temporary measure.

A similar situation was already with the Windows XP operating system, which was not supported in 2017 but continued to be used. During WannaCry ransomware virus epidemic, some XP users faced a situation where the malware appeared on the computer, was blocked and deleted by the antivirus.
However, then the virus repeatedly tried to get into the computer again and was blocked again. This caused a huge load on the network, processor, and disk. The devices started working so slowly that it was almost impossible to do anything on them.

Therefore, experts recommended updating Windows 7 as soon as possible, even though antiviruses can protect an already unsupported system.

Yuri Brisov, a member of the Commission on legal support of the digital economy, said that by denying the ability to regularly and timely update systems, banks put their customers at risk, which is unacceptable.

According to Boris Yedidin, a lawyer and co-founder of Moscow Digital School, for using outdated programs and operating systems, banks can bring to administrative responsibility under the article “Violation of information protection rules”.

Recall that Microsoft has refused to support the Windows 7 operating system since January 14. The computer will work with the old OS, but the company does not provide technical support for any software updates, as well as security updates and fixes.