How to know whether your LinkedIn password is hacked

So here’s how to check if your LinkedIn password was among the hacked accounts that are already being used to generate phishing attacks. Go to LastPass.com/linkedin:

Enter your password, and the website will tell you whether or not your password is now out in the wild. The obvious question: is it safe to give LastPass your password?

Here’s what the company says about their tool:

"Only the hash of your password will be sent to LastPass.com’s servers, not your actual password. This hash will not be stored or logged at all. Please view source the page if you’re technically inclined."

One caveat: because the search will look through all the passwords in the file, if you have a very common word or password, it will come up as compromised. For example, here’s what LastPass shows when the all-too-common password “password” is entered:

This does not mean your account is compromised, necessarily. It does mean your password is too common and should be changed. Ultimately, of course, we should all be smarter about passwords and use a tool like LastPass or 1Password to make sure we have complex and unique passwords for every single service and site we use.

3 comments:

CYBERHACKPROS@GMAIL.COM is a professional hacker that specializes in exposing cheating spouse,and every other hacking related issues. he helps catch cheating spouse by hacking their communications like call, Facebook, text, emails, Skype and many more. i have used this service before and he did a very good job, he gave me every proof i needed to know that my fiancee was cheating. You can contact him on his email CYBERHACKPROS@GMAIL.COM to help you catch your cheating spouse, or for any other hacking related problems, he will definitely help you, he has helped a lot of people, contact him and figure out your relationship status. i wish you the best too call/text +1 512 605 1256

My husband was so smooth at hiding his infidelity so I had no proof for months, I was referred to some hacker and decided to give him a try.. the result was incredible because all my cheating husband's text messages, whatsapp, facebook and even phone conversations was wired directly to my cellphone. CYBERHACKPROS@GMAIL.COM helped me put a round-the-clock monitoring on him and I got concrete evidence and he showed me proof..if your spouse is an expert at hiding his cheating adventures contact him via email/phone CYBERHACKPROS@GMAIL.COM or +1 512 605 1256 Tell him i reffered you.He will help you INSTAGRAM:Cyberhackprofessionals


★ HACKING is a broad term Engagement.
It depends on what you want to hack. Mobile device,PC or Website, emails etc
I will brief you through the process of hacking and securing Website since most of the Hackers are after it. All the startup owners or aspirants should know.
In order to hack you need Information hell of alot.
Wanna hack website Or A Database ?

• You need to get it’s Ip addresses, Open Ports,file transfer medium (FTP or SSH),Email addresses,Detecting Insecure code(SQLi & SSH),System architecture ( 64 bit, 32 bit).

• Ok so why do we need these informations???

• Open Ports : If there is an open port that means website is ready to listen connection . Take example of FTP open ports. If it’s open then it can be bruteforced ).

• Tip: Use SSH instead of ftp, it’s secure and encrypted mean when you send files over SSH first thing it does is encrypts your files So even if hacker gain access to your files they will see encrypted files not plain texts.

• Emails? Email is needed for social engineering. With just a one click a backdoor will be installed in your system/browser. There is incredibly powerful software for exploiting that is BEEF pre-installed in kali All you need is to do is send hook.js file to your victim and trick him to click(Which is easy) and BAM start doing evil things.

• Tip : if you type whois http://yourdomain.com in Linux you will find details like Domain registrar email address,phone number his address etc . So when you register your domain and purchase hosting do buy icann protection with it, it does not cost that much. in this way you will be able to protect your info.

• Detecting SQLi vulnerability is easy just write single inverted comma after url php?id=1 Like php?id=1′ if it returns an error .Then It’s ready to be hacked.

• TIP Use PDO instead of Mysqli or Mysql. If you are not familiar with PDO(can also be used with MYSQLi) then make sure you use htmlspecialchars and htmlentities. Example: Lets say you are getting value from browser. Do below thing to make your code secure
if(isset($_POST[“Name”])
{
$name=htmlentities($_POST[“Name”]);
}

This is the least you can do to protect yourself from hackers agianst SQLi.

Sorry i cant go into details here.

Kindly Contact Us For More Details And For ALL Kinds Of Hacking services you desire via Compositehacks @ gmail . com

However Let Me Quickly Brief You About My Team:

• COMPOSITE HACKS is a Team Of Professional HACKERS , a product of the coming together of Legit Hackers from the Dark-Web (pentaguard, CyberBerkut, White Hack and Black Hat,) whose system is a very strong and decentralized command structure that operates on ideas and directives.

★ COMPOSITE HACKS offer BEST quality professional hacking services that can't be matched with other hacker for hire company. Our professional hackers have most advanced hacking technique to hack Facebook, Twitter, Instagram, Email accounts, SmartPhone, Website, Database and many more. Also you can request for customized hack. These days hiring a Legit hacker is difficult. You might get scammed for wrong hacking services or by fake hackers on the Internet. Don't get fooled by scammers that are advertising false professional hacking services.

★ Contact Us For Your Desired Hacking Services Via : compositehacks @ gmail . com

★We Treat Every Request With Utmost Confidentiality★

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More