Gadget Gestures

Lets Gesture about Gadgets

Saturday, March 6, 2021
Log in
  • News
  • Tablets
  • SmartPhones
  • Laptops
  • Cameras
  • Games
  • Apps/Softwares
  • iPad/iPhone
  • Latest News
    • Lenovo A10000, A30000 and A60000
    • TV Has Never Been this Smart – the New Motto of Samsung Smart TVs
    • Nokia Lumia 1020 on Sale at AT&T
    • How Can a Sniffer Help in Detecting Lost or Stolen Mobile Phones?
    • Amazon expected to launch FireTube TV box before Christmas
    • Nokia Lumia 521 Release Date,Features, Specs, Price- Will be Available through T- Mobile
    • New Mercedes-Maybach S600, Priced At 200,000 dollars
    • Intel unveils Jarvis, Edison and dual-OS processors
    • Blackberry Z10 Problems of over heating, Rebooting: Even New BB 10 OS is not Helping
    • Samsung Galaxy Note 2 Vs Samsung Galaxy Note 3 – Compare Possible Price, Design, Display, Features
    • Evernote Integration of New Google Drive Button
    • White Nexus 4 Release Date Subdue Possibilities of Verizon Nexus 4 LTE

$25K from Pornhub to Hackers

May 11, 2016 By Nicholas Anderton Leave a Comment

"$25K from Pornhub to Hackers"

Pornhub to Hackers: Who’s in for $25K?

From Pornhub to hackers: “Who’s in for $25K?”

Tuesday, the popular pornography site Pornhub disclosed a hackers bounty program for site bug hacker hunting. Many jokes come to our mind, but the $25K figure is a money cold bucket of reality.

The site, owned by MindGeek, a Canadian private company, will pay ethical hackers dubbed white hat hackers to find vulnerabilities in their site and report the cracks to the administrators.

This program is being run on HackerOne, a start-up company capitalizing on bug bounty. The company began with Facebook and is now operating similar bug-finding programs for General Motors, Twitter, Dropbox, Yahoo, Uber and, you’ll never guess who else – yes, the United States Department of Defense.

Other security problem detection programs like HackerOne are gaining momentum because they can offer outside help for the internal teams working with code.

Synack and Bugcrowd are two of the companies running this type of programs. They work for sharks like Adobe, Snapchat or Square. Heavyweight tech companies like Microsoft and Google have also turned to bounty programs, but they have used their internal platforms for it.

Following the example of the “major tech players”, Corey Price, the vice president of Pornhub stated that they too want to tap into the existing hacking talent as a measure of precaution. This program would mean an addition to their development and security teams.

The bounty rewards range from $5 to $25.000. To receive the prize, hackers must report and detail the vulnerability with screenshots and code. This reporting should be, of course, disclosed only to the Pornhub admins.

More rules say hackers will not interrupt the porn service of the adult entertainment website, will not use automated tools, and the bug should be reported 24 hours after its discovery.

It would take the security team up to a month to reply and depending on the complexity of the bug, up to three months to fix it.

With 60 million – wait for it – daily visitors, Pornhub is the second most popular pornographic site in the world. Yes, almost 1% of the world is accessing this porn site alone, daily. No wonder they’re taking all the available help there is.

They’ve also been the target of someone’s malware before. An advertising malicious scheme attacked the site in November 2015. They recovered and learned from the mistake.

Now, who’s first to crack, not the porn site, but a joke on this $25K from Pornhub to hackers news?

Image source: Wikimedia 

Filed Under: News Tagged With: $25K bounty hacker reward, $25K from Pornhub to Hackers, HackerOne, Hackers, hacking, MindGeek, pornhub reward, security breach, website security breach, website vulnerability, white hat hacking

Backoff Malware Used in Credit Card Breach Spreading Rapidly

October 24, 2014 By Lori David Leave a Comment

alert-beware-pos-malware-backoff-showcase_image-3-a-7276 (1)

The network security company Damballa has just released information claiming that the number of North American computes infected with the “Backoff” malware involved in the massive retail data breach has been rising sharply.

Between August and September, the internet security company noted an increase of 57 percent in Backoff infected devices. This malware software scrapes the computer’s RAM for any leftover credit card data whenever a payment card had been swiped, Brian Foster, Damballa CTO said.

This data stems, Damballa says, from ISP and enterprise customers which have used the traffic analysis products provided by the internet security company to detect any malicious activity. The company also has access to around 55 percent of the internet traffic throughout North America, DNS requests included. Forster noted, however, that for privacy reasons, the IP addresses of most of these computers are unknown to the company.

“We actually attribute the behaviors we see-as well as the domain names and IP addresses that malware is looking up- to threat actors and threat groups” Foster said.

Damballa uses a Hadoop cluster at its headquarters in Atlanta to analyze the DNS requests in question. It then classifies these requests as either good or potentially malicious, depending on the servers being contacted.

“We track a set of domain characteristics and domain names that are related to Backoff, and its looking at the volume of those lookups that shows us the increase.:

Foster added.

Backoff has already caused several retail industries to struggle to contain attacks that have targetted payment card data. Big-name companies such as Home Depot, Target or Dairy Queen have all been Backoff victims. Moreover, the Department of Homeland Security issued a warning in August, saying that as many as 1000 enterprise and small-business networks could already be infected with the malware but not be aware of it.

Damballa has added visibility into the networks of those companies using its services and as such, it enables the security company to warn those possibly infected. For ISP’s using their services, Damballa can issue alerts so that the ISP can announce its customers that they have been infected.

Foster explained that ISP’s have already begun alerting their customers because of a desire to avoid government regulation. Moreover, they want to make sure that their networks perform perfectly, since they offer high-bandwidth entertainment services, Foster said.

“They see security as an enabler for a lot of their other business practices.”

added Foster.

Filed Under: News Tagged With: antimalware, backoff, backoff breach, backoff malware, backoff malware attack, credit card, credit card breach, cyber attack, malware, retail breach, security breach

As a participant in the Amazon Services LLC Associates Program, this site may earn from qualifying purchases. We may also earn commissions on purchases from other retail websites.

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 5 other subscribers

Recent Articles

GitHub stickers displaying a cat-octopus with a human face

Microsoft Acquires GitHub for $7.5 Billion’s Worth of Shares

June 5, 2018 By Mary Duncan Leave a Comment

Teenage girl browsing her smartphone while sitting at the table

Facebook Is No Longer the Top Social Media Platform Among Teenagers

June 4, 2018 By Lori David Leave a Comment

Fake news headline on a laptop screen

Facebook Is Taking Its Fight Against Misinformation to a Whole New Level

May 25, 2018 By Brandi McCants Leave a Comment

Unsolved Rubik cube on a black background

An Australian Professional Speedcuber Broke His Own Record at Solving a Rubik Cube

May 6, 2018 By Lori David Leave a Comment

Cambridge Analytica logo on a computer screen

Soon After the Facebook Scandal, Cambridge Analytica Is Going Bankrupt

May 3, 2018 By David Crozier Leave a Comment

Windows restore disk placed in a paper envelope for CDs

Renowned E-Waste Recycler Goes to Jail for Distributing Free Windows Restore Disks

April 25, 2018 By Micheal Baptiste Leave a Comment

nasa globe and emblem outside a building

NASA Announces its Investments in Future Tech Concepts Such as Biobots and Shapeshifters

April 3, 2018 By Brandi McCants Leave a Comment

YouTube app opened in browser with the logo on top of it

YouTube Increases the Number of Ads to Trick Users into Subscribing to Its Paid Streaming Platform

March 22, 2018 By Mary Duncan Leave a Comment

Facebook dislike button

Facebook Stock Falling for Second Straight Day amid Data Scandal

March 21, 2018 By Paul Leave a Comment

Permanently Delete Facebook

WhatsApp Founder to Facebook Users: ‘Delete Facebook’

March 21, 2018 By Paul Leave a Comment

Uber driverless car

Uber Driverless Car Kills Woman in Arizona

March 20, 2018 By Paul Leave a Comment

Windows 10 Update reaches 35%

Microsoft: Windows 10 Updates To Take No Longer than 30 Min

March 20, 2018 By David Crozier Leave a Comment

The Apple Watch

Apple Watch User Awakened by 3 Cops In His Bedroom after Accidental Call

March 19, 2018 By David Crozier Leave a Comment

Pokemon Go Character

Pokemon Go Player Attacks Other Player IRL for Losing Gym

March 19, 2018 By David Crozier Leave a Comment

Pages

  • About Us
  • Contact Us
  • Privacy Policy GDPR
  • Team

Recent Posts

  • Samsung Tablet 10.1 Review: Perfect for Your Entertainment Needs October 29, 2020
  • Take Better Pictures Today With These 9 Helpful IPhone Camera Settings November 4, 2019
  • The 6 Best Gaming Desks to Give You a Great View October 31, 2019
  • How Much RAM Do I Need for Gaming? Here’s the Sweet Spot for Optimal Performance October 21, 2019
  • Lenovo Ideapad Yoga 11s Review: A Teaser October 16, 2019
  • Basic Computer Skills – 6 Tips You Need to Know! September 30, 2019
  • Why is my Laptop Fan so Loud? Six Possible Reasons for the Noisy Nuisance September 9, 2019

Copyright © 2021 GadgetGestures.com

About · Privacy Policy · Terms of Use · Contact

This website uses cookies to ensure you get the best experience on our website. Learn more.