Feeds

Stripper name game exposes sensitive privates on Tumblr

Bragging about Smartie Longbone is no laughing matter

Beginner's guide to SSL certificates

An online game that invites surfers to disclose potentially sensitive information has returned in a slightly different guise, two years after its first appearance.

A viral game that surfaced on Twitter back in May 2009 encouraged users of the service to come up with their "porn star name" – which was made up of the name of their first pet and the name of the street they lived in as a kid.

A marginally altered form of the same ruse surfaced on micro-blogging site Tumblr this week, encouraging trendy netizens to disclose the name of their "first pet" and street where they live on, this time to find out their supposed "stripper name".

There's no evidence to say that either application is malign but taking part just for a quick giggle is still a bad idea. That's because, as Chris Boyd of GFI Software points out, handing over information of this nature is a bad idea because it's often used to reset the passwords of webmail accounts and other similar services.

"Stop and think how many services still ask for your pet name and street name on things such as password reset questions," Boyd writes. "Then pause to consider an email address you use may be public-facing, and have just such a question bolted onto it."

"You may want to keep your clothes on and stick to the day job at that point," he adds. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.