The word pwned comes from the hacker jargon 'pwn', meaning to compromise or control, specifically another computer ,server .PC, web site, gateway device, or application. It is synonymous with one of the definitions of hacking or cracking.
The past tense and past participle of 'pwn' is often spelled as 'pwned'. Hence the name PwnedList, meaning compromised list, or in our case a list of compromised accounts.
PwnedList is a tool that allows an average person to check if their online accounts have been compromised. The site started out as small research project with a rather simple premise. To discover how many compromised accounts can be harvested programatically in just a couple of hours. It collects data in such a short amount of time. Visit the official website of PwnedList.
They have two principal sources of data. One is the manual collection of data from account dumps made by various hacker groups. Every week they spend a fair amount of time researching possible new security breaches and trying to collect any resulting data dumps. The other source is their automated harvesting system that is able to spider certain places on the internet, identify potential account dumps and import them into their database, all without human intervention.
PwnedList was started as a project by security researchers who wanted address the current state of web security and raise public awareness of data breaches that have become a daily occurrence. The purpose of this project is hopefully to raise security awareness, encourage users to be more proactive about handling their personal security in cyberspace and at the same time help people monitor their accounts for potential compromises.
The past tense and past participle of 'pwn' is often spelled as 'pwned'. Hence the name PwnedList, meaning compromised list, or in our case a list of compromised accounts.
PwnedList is a tool that allows an average person to check if their online accounts have been compromised. The site started out as small research project with a rather simple premise. To discover how many compromised accounts can be harvested programatically in just a couple of hours. It collects data in such a short amount of time. Visit the official website of PwnedList.
They have two principal sources of data. One is the manual collection of data from account dumps made by various hacker groups. Every week they spend a fair amount of time researching possible new security breaches and trying to collect any resulting data dumps. The other source is their automated harvesting system that is able to spider certain places on the internet, identify potential account dumps and import them into their database, all without human intervention.
PwnedList was started as a project by security researchers who wanted address the current state of web security and raise public awareness of data breaches that have become a daily occurrence. The purpose of this project is hopefully to raise security awareness, encourage users to be more proactive about handling their personal security in cyberspace and at the same time help people monitor their accounts for potential compromises.
No comments:
Post a Comment