Hackers Passwords Exposed

Hackers Passwords Exposed

Hackers Passwords ExposedIn a surprising turn of events, hackers are learning what it feels like to be the prey. A new search engine, Indexeus, offers an easy way to look up login credentials from over a hundred hacks, even the from the high-profile ones like Adobe and Yahoo. But, as with all “good” things, there is a catch: most of the indexed data is from hacked forums and websites that are popular to the underground hacker community. It’s an oxymoron, really, because Indexeus markets itself to the same people that it exposes.

Some may see Indexeus as a trap of sorts as the creators offer protection services. Simply “donate” $1 per record and all your sensitive information will be removed from the search engine. This type of “donation” is also known as “protection money.” Isn’t that the same as extortion? Perhaps, but the site does provide a disclaimer saying that its purpose is to create awareness and that they are not responsible for malicious use of their content or service.

The site’s founder, Jason Relinquo from Portugal, has apparently been compelled to change the policies, however, offering a free option to comply with the “Right to be Forgotten” ruling. But, isn’t the data being sold by Indexeus illegal in the first place?

I journeyed to the Indexeus via Google Chrome to do a little investigating of the “over 10 million, and constantly growing, entries at this very second” and found that access to any of the entries can be bought for 1 credit, worth $.50 each, with bitcoin.

Some things online are just plain fishy.

About the Author

Ginger Hill is Group Social Media Manager.


  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

  • Achieving Clear Communications

    Achieving Clear Communications

    Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more. Read Now

  • Taking Flight

    Taking Flight

    Airport security is a complex system that incorporates multiple technologies to ensure the safety and security of travelers, employees and the facility itself. Sound-based technologies are integral pieces of this system, providing means of communication, notification and monitoring. Read Now

Featured Cybersecurity

New Products

  • BIO-key MobileAuth

    BIO-key MobileAuth

    BIO-key International has introduced its new mobile app, BIO-key MobileAuth™ with PalmPositive™ the latest among over sixteen strong authentication factors available for BIO-key's PortalGuard® Identity-as-a-Service (IDaaS) platform. 3

  • LiftMaster Garage Door Opener

    LiftMaster Garage Door Opener

    LiftMaster Transforms the Garage Door Opener Into a Sleek Smart Home Device That Does More Than Open and Close the Garage Door 3

  • LenelS2 BlueDiamond™ mobile app

    enelS2 has introduced its Indoor Location subscription-based service for businesses and other organizations using LenelS2’s BlueDiamond™ mobile app version 2.1.8 for smartphones. 3