Black Hair Media Forum Homepage
BHM BHM BHM
Forum Home Forum Home > Lets Talk > Talk, Talk, and More Talk
  New Posts New Posts RSS Feed - So 4chan is releasing a bunch of private celeb pic
  FAQ FAQ  Forum Search   Register Register  Login Login
Angkor Cambodian Hair
 

So 4chan is releasing a bunch of private celeb pic

 
 Post Reply Post Reply Page  <1 5051525354 62>
It Always Begin With Beautiful Hair

Bootiful Cream



Author
 Rating: Topic Rating: 14 Votes, Average 3.00  Topic Search Topic Search  Topic Options Topic Options
rickysrose View Drop Down
Platinum Member
Platinum Member
Avatar

Joined: Jun 28 2006
Status: Offline
Points: 220885
Post Options Post Options   Thanks (0) Thanks(0)   Quote rickysrose Quote  Post ReplyReply Direct Link To This Post Posted: Sep 04 2014 at 1:44am
JL ... not sure how this will pan out for her, from what we've seen with kim k, it likely won't work against her like it would in the past

but in the words of naomi campbell, that is a disgrace
Back to Top
Sponsored Links


Back to Top
afrokock View Drop Down
Elite Member
Elite Member
Avatar

Joined: May 19 2008
Location: South London
Status: Online
Points: 990982
Post Options Post Options   Thanks (9) Thanks(9)   Quote afrokock Quote  Post ReplyReply Direct Link To This Post Posted: Sep 04 2014 at 2:30am
Back to Top
Alias_Avi View Drop Down
Elite Member
Elite Member
Avatar

Joined: Oct 10 2010
Status: Offline
Points: 277002
Post Options Post Options   Thanks (3) Thanks(3)   Quote Alias_Avi Quote  Post ReplyReply Direct Link To This Post Posted: Sep 04 2014 at 2:43am



Back to Top
alynxx View Drop Down
Platinum Member
Platinum Member
Avatar

Joined: May 19 2007
Location: London money
Status: Offline
Points: 28638
Post Options Post Options   Thanks (4) Thanks(4)   Quote alynxx Quote  Post ReplyReply Direct Link To This Post Posted: Sep 04 2014 at 3:34am
I think Jill looked good for her size tbh. They were not for public use so she should not be shamed.
Back to Top
bunzaveli View Drop Down
Elite Member
Elite Member
Avatar

Joined: Nov 10 2009
Status: Offline
Points: 213023
Post Options Post Options   Thanks (1) Thanks(1)   Quote bunzaveli Quote  Post ReplyReply Direct Link To This Post Posted: Sep 04 2014 at 7:00am
Originally posted by bunzaveli bunzaveli wrote:

Originally posted by NARSAddict NARSAddict wrote:

I am shocked that this thread is as long as it is.  Well kind of.  Anyways those women would be a-okay.  It seems like having a nude selfie is the thing to do.  At the same time I lack sympathy/empathy at those who have compromising pictures of themselves that they take willing or gave permission to take.  Did no one school them that whatever you upload onto the internet or cloud database, it is on there forever?  Honestly I would own up to it and mea culpa and all that.


i think you're really underestimating how easy it is to become a victim, today its them, tomorrow its you, unless you live completely off the grid and never use the internet. it goes beyond taking compromising pics. but eh



not that this has anything to do with narsadict,  i think we're in agreement, but moreso the people who say they dont take nudes and these celebs should have known better then to get caught out there. you're all next, btw these types of websites have been going on for years.


Originally posted by usatoday usatoday wrote:


How stolen credit cards are fenced on the Dark Web

Credit card data stolen from retailers such as Target, Sally Beauty Supply, P.F. Chang's, and now perhaps Home Depot, are flooding into underground hacker forums where customers' card numbers, names and addresses can be sold for as little as $1 each.

Tuesday, a large batch of credit and debit card information that appears to be from Home Depot went on sale on such an underground marketplace, known as a "carder forum." A Home Depot spokeswoman confirmed that the company had contacted its banks and law enforcement to look into "unusual activity" but did not confirm a breach.

Carder forums "are the Craig's List of the hacker underground," says Neal O'Farrell, an identity theft expert at Credit Sesame and founder of the non-profit Identity Theft Council, based in San Francisco.

"It's not just cards. It's phishing kits, malware, spammer lists," O'Farrell said. "It's a like a shopping mall for cybercrime."

O'Farrell opened an account on one carder forum, rescator.la, where he was able to peruse offers for millions of Target credit cards. The website, registered in Latvia, listed the card information along with ZIP codes and e-mail addresses — information that makes it easier for criminals to use the cards to purchase goods online or withdraw money from bank accounts.

The hacker asked for payment in Bitcoin, a difficult-to-trace digital currency.

Journalist Brian Krebs of KrebsonSecurity.com wrote that he found the newest batch of cards on that site.

When credit information stolen from Target appeared for sale in the forums, individual card numbers fetched up to $120 each, O'Farrell says. Within weeks, as banks started to cancel the cards, the prices dropped to $8 a card, he says. Seven months after Target learned of the breach, they are nearly worthless.

"The most important part of the price is the freshness, before the victim knows they've been breached and when no one is canceling," he says. "The guarantees on the cards dwindle the older they get."

To outrun law enforcement, the most sophisticated criminal hackers hide their "carder forums" on the "Dark Web," which uses The Onion Router, known as TOR, to conceal the location of the computer servers hosting the websites. TOR ensures secrecy by randomly routing computer messages through several places on the Internet, wrapped in encrypted code, so no single point can link the source to the destination, making the sites nearly impossible to trace.

FROM YOUR WALLET TO CYBERDEN

Criminals can break into companies' databases with malicious software purchased online from computer hackers, who mostly operate out of Eastern Europe and Russia, says Tom Kellermann, chief cybersecurity officer for Dallas-based Trend Micro. The software can infiltrate a database, spread its code like a virus, and remain undetected for months. When a customer swipes a credit or a debit card, the software captures the information, stores it, then sends it in bulk to the cybercriminals.

Once the information is collected, members of the cybergang test it and sort it into bundles that are priced, then sold in the underground sites, Kellermann says. Bundles range from 500 cards to 10,000 cards.

To ensure the cards work, the cyberthieves use an automated system to charge a small amount — around the price of a cup of coffee — to 10,000 cards at a time.

The tests determine the card's validity and credit limit. Cards with the highest credit limits, such as an American Express Platinum card, sell for the most money, Kellermann says. A card number with a low limit might sell for $1 or $2, while a high limit can sell for $15 or considerably more.

QUICK WINDOW OF VALUE

The recent series of data breaches have flooded the market with cards, which must be moved quickly before they lose their value, Kellermann says.

Some of the criminals who buy the cards use the data to shop online. Others create credit cards from blank plastic cards, known as "white classics" that can be purchased online and imprinted with the data. The buyers must move quickly, too, before consumers notice fraud charges and call their banks to cancel the cards.

Luis Gustavo Tavarez, 34, pleaded guilty last week in New York to a year-long, $600,000, multi-state shopping spree with stolen credit cards purchased from cybercriminals, court papers show.

In April 2013, Tavarez and his four accomplices purchased at least 200 stolen credit card numbers from a "carding" website, encoded the stolen account information onto counterfeit cards and purchased dozens of store gift cards and merchandise at stores in New York, New Jersey, Pennsylvania, Connecticut, Rhode Island and Massachusetts, federal prosecutors said.

Kellermann says the FBI is becoming more skilled at catching the cybercrooks, and companies are employing better software to catch the breaches. On average, a company detects a breach within five months of the infiltration, Kellermann says.

"That window is shrinking dramatically," he says. "So the criminals typically have one billing cycle to have a shopping spree."




Back to Top
PurplePhase View Drop Down
Platinum Member
Platinum Member
Avatar

Joined: Jun 08 2004
Status: Offline
Points: 194658
Post Options Post Options   Thanks (0) Thanks(0)   Quote PurplePhase Quote  Post ReplyReply Direct Link To This Post Posted: Sep 04 2014 at 8:07am
 
we've been hit a few times.
Back to Top
Diane (35) View Drop Down
Elite Member
Elite Member
Avatar

Joined: Sep 16 2006
Location: Jamrock
Status: Online
Points: 42567
Post Options Post Options   Thanks (0) Thanks(0)   Quote Diane (35) Quote  Post ReplyReply Direct Link To This Post Posted: Sep 04 2014 at 9:26am
Jill looks good to me, just as i imagined her boobs to look. yayay jill, she got a broaddddiee tooStern Smile def passes the phat 'nani test!

im vexed nobody PMd me them, i have a bredrin that im going to take some dollars from for these pics, and hes gonna burst into flames.LOLLOLLOL

PH how soon after the hit did you realise it? id ask how much but thats tooo nosey and impolite, so ill ask what was the strangest item bought? that is if you didnt catch them before anything was charged

i need to see the curling iron up the wazooo pics! how big a curling iron are we talking?Confused


Edited by Diane (35) - Sep 04 2014 at 9:30am
Back to Top
crzyabthair View Drop Down
Elite Member
Elite Member
Avatar

Joined: Oct 23 2007
Status: Offline
Points: 14699
Post Options Post Options   Thanks (1) Thanks(1)   Quote crzyabthair Quote  Post ReplyReply Direct Link To This Post Posted: Sep 04 2014 at 11:09am
Originally posted by afrokock afrokock wrote:




Back to Top
Wildfire View Drop Down
Elite Member
Elite Member
Avatar

Joined: May 27 2006
Location: Kingston, JA.
Status: Offline
Points: 90229
Post Options Post Options   Thanks (0) Thanks(0)   Quote Wildfire Quote  Post ReplyReply Direct Link To This Post Posted: Sep 04 2014 at 1:50pm
Originally posted by SoutherNtellect SoutherNtellect wrote:

just gonna leave this tweet here

"Pay attention to the difference between people's responses to Jill Scott and Jennifer Lawrence for the same violation."

a faceful of skeet (not that i have anything against it) and a boob selfie are the same?
and "violation"?
sit down.


Edited by Wildfire - Sep 04 2014 at 1:52pm
Back to Top
Gkisses View Drop Down
Elite Member
Elite Member
Avatar

Joined: Jul 12 2008
Location: CrackaIsland
Status: Offline
Points: 402657
Post Options Post Options   Thanks (3) Thanks(3)   Quote Gkisses Quote  Post ReplyReply Direct Link To This Post Posted: Sep 04 2014 at 1:57pm
Originally posted by Wildfire Wildfire wrote:

Originally posted by SoutherNtellect SoutherNtellect wrote:

just gonna leave this tweet here

<span ="apple-style-span"="" style="color: rgb41, 47, 51; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px; white-space: pre-wrap; ">"Pay attention to the difference between people's responses to <strong style="font-weight: bold; ">Jill Scott and Jennifer Lawrence for the same violation."</span>


a faceful of skeet and a boob selfie are the same?
and "violation"
sit down.


The violation is that they both had private pictures stolen. It wasnt in regards to the content of the photos.
In short jill wont/wouldn't be given the same sympathetic response.
Back to Top
Get Longer Healthier Faster Growing Hair
Get Healthier Stronger Longer Hair
Glam Twinz
Weave Connection
Little Black Scarf
Human Hair Wigs
Wefting Training
Brazilian Hair
Brazilian Hair
Wig and Hair Extension on Amazon
 Post Reply Post Reply Page  <1 5051525354 62>
  Share Topic   

Forum Jump Forum Permissions View Drop Down