It is being reported that the website MilitarySingles.com has been successfully hacked by a group who call themselves LulzSec Reborn. It is thought that information such as email addresses and passwords relating to a total of 170,000 accounts has been compromised. Despite such claims by security experts, the company that operates the dating website, ESingles, has refused to acknowledge that a security breach has occurred at this stage and that they are going to go through the necessary procedures to make sure that the databases are safe.
In a statement that was released by ESingles, they proclaimed “At this time there is no actual evidence that MilitarySingles.com was hacked and it is possible that the Tweet from Operation Digiturk is simply a false claim.” The company then stated that it will treat this claim as if it were real and precede with the required security steps in order to ensure the website and its database is secure.”
If the website MilitarySingles.com has been hacked, the main concern is the .mil addresses and passwords that haven been compromised. If a member has signed up to the website using their .mil email address and used the same password, this could lead to confidential military information being compromised which could have unprecedented results.
On the MilitarySingles website, there are no warning messages of a possible breach and no indication that data may have been compromised. On the homepage, a statement still remains about how seriously they have taken security measures, “”We are fanatical about your privacy and security. Our site is constantly monitored using state-of-the-art technology. We have spared no expense that your personal information is stored and encrypted securely, 24 hours a day, 365 days a year.”
Zach Lanier, a security researcher, advises that any members of the dating website change their passwords. He also added that everyone should ensure that they use complex passwords. Lanier went as far as stating that he doesn’t even know most of his passwords because he keeps them in a password vault.