Free smoking phone sex numbers no credit cards

Breach date: 4 October 2013 Date added to HIBP: 4 December 2013 Compromised accounts: 152,445,165 Compromised data: Email addresses, Password hints, Passwords, Usernames In May 2015, the adult hookup site Adult Friend Finder was hacked and nearly 4 million records dumped publicly.

The data dump included extremely sensitive personal information about individuals and their relationship statuses and sexual preferences combined with personally identifiable information.

Breach date: 27 June 2017 Date added to HIBP: 16 February 2018 Compromised accounts: 7,990,619 Compromised data: Email addresses, Passwords In November 2015, the gaming website dedicated to classic DOS games Abandonia suffered a data breach resulting in the exposure of 776k unique user records.

The data contained email and IP addresses, usernames and salted MD5 hashes of passwords.

Salted SHA-1 password hashes for users who sign up with either Google or Facebook authentication were also included.

The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies and contained almost 8 million unique email addresses.

The breach included names, email addresses and plain text passwords.

Breach date: 1 March 2015 Date added to HIBP: 26 October 2015 Compromised accounts: 14,936,670 Compromised data: Email addresses, IP addresses, Names, Passwords In approximately 2012, it's alleged that the Chinese email service known as 126 suffered a data breach that impacted 6.4 million subscribers.

Free smoking phone sex numbers no credit cards-62Free smoking phone sex numbers no credit cards-46Free smoking phone sex numbers no credit cards-86

The breach of the v Bulletin message board impacted over 17k individual users and exposed email addresses, usersnames and salted MD5 passwords.

Breach date: Date added to HIBP: 6 November 2014 Compromised accounts: 180,468 Compromised data: Email addresses, Genders, Geographic locations, IP addresses, Passwords, Usernames, Website activity, Years of birth In December 2017, the virtual keyboard application was found to have left a huge amount of data publicly facing in an unsecured Mongo DB instance.

Discovered by researchers at The Kromtech Security Center, the 577GB data set included extensive personal information including over 20 million unique email addresses, social media profiles and address book contacts.

Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as "unverified".

The data in the breach contains email addresses and plain text passwords.

The data contained over 4 million unique email addresses along with IP addresses, usernames and passwords stored as unsalted MD5 hashes.

You must have an account to comment. Please register or login here!