- Jan 8, 2011
- 22,361
More than 60,000 security professionals are thought to have obtained or applied for the EC-Council’s Certified Ethical Hacker certification, and could – if the hacker’s claims are true – have had their personal details exposed.
Quite how the hacker managed to deface the EC-Council website is currently unclear, although it is possible they achieved the attack by hijacking the site’s DNS entries to force them to point to a different server.
Certainly, whoever was behind the defacement appears to be blaming lax password security for the breach:
Quite how the hacker managed to deface the EC-Council website is currently unclear, although it is possible they achieved the attack by hijacking the site’s DNS entries to force them to point to a different server.
Certainly, whoever was behind the defacement appears to be blaming lax password security for the breach:
Defaced again? Yep, good job reusing your passwords morons jack67834#
owned by certified unethical software security professional
Obligatory link: http://attrition.org/errata/charlatan/ec-council/
-Eugene Belford
P.S It seems like lots of you are missing the point here, I’m sitting on thousands of passports belonging to LE (and .mil) officials
owned by certified unethical software security professional
Obligatory link: http://attrition.org/errata/charlatan/ec-council/
-Eugene Belford
P.S It seems like lots of you are missing the point here, I’m sitting on thousands of passports belonging to LE (and .mil) officials