Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Instagram Data Leak
- This topic has 1 reply, 1 voice, and was last updated 1 year, 3 months ago by .
Instagram had a data breach which allowed hackers fairly easy access to instagram users’ full names, phone numbers and other private information on users. The white-hat hacker who used a brute force login attack to feed phone numbers into the login form. Instagram also flags valid accounts based on phone numbers and does not limit the amount of login attempts. When a valid phone number is entered into the login screen, the user’s full name would be displayed, thus giving the hacker access to the name and phone number of the user.
You must be logged in to reply to this topic.