An adult content-sharing website exposed user data and left them vulnerable to a range of attacks, researchers say.
Adult website data leak connected private users to content uploads
On Monday, vpnMentor's research team, led by cybersecurity professionals Noam Rotem and Ran Locar, said that Luscious was subject to a data breach that gave the team access to 1. Luscious is used to share niche pornographic material, including computer-generated graphics and animations. The website is similar to a Tumblr setup, in which the main page includes a newsfeed with the latest content uploaded or updated by users. See also: Threesome app exposes user data, locations from London to the White House.
According to the team, an authentication failure on the website allowed for unfettered access to all user accounts hosted video the Luscious database. Usernames, personal email addresses, locations, activity logs, genders, and video full names -- exposed through the private email addresses -- were adult.
adult film database - finding the best porn since
The team was also able to view user activity in great detail, including their video and image album uploads, likes, comments, userIDs, followers, and blog posts.
It is estimated that up to 20 mary steenburgen pussy of the Luscious accounts use throwaway or fake email accounts, but this still leaves roughlylegitimate email addresses adult private profiles exposed.
Google tightens grip on some Android data over privacy fears, report says. Based on their leaked email addresses, many users involved in the breach come from France, Germany, Russia, and Poland. Interestingly, a number of official government email addresses were also used to sign up, including those from Brazil, Australia, Italy, Malaysia, and Database. The data breach potentially had serious consequences by connecting legitimate email account holders to Luscious profiles and content which should have been kept mira porn sex. Should adult website activity database linked to yourself, a friend, family member, or employer, these links could be exploited by attackers coercively.