World Poker Tour Amateur Poker League
Cyber hacking has gone far beyond the infrequent incident that does not affect average computer users. Not that the players in the amateur league of the World Poker Tour live the cyber lifestyle of your typical personal computer user. But we all seem to be increasingly vulnerable to having our respective systems attacked in an increasing array of soft mediums.

One of the most suspect culprits in the cracking of these security loopholes is related to the involuntary installation of a seemingly endless array of bloatware that the major computer manufacturers have commoditized into a bundle of crapware that is pre – loaded on all new P.C.’s. Without a clean install of Windows, this software can leave security holes in your system as well as interfere with the performance of more legitimate utilities you may want to install on a system.

Recently, the World Poker Tour Amateur Poker League was invaded using an online moniker “smitt3nz”. This intrusion resulted in the leak of more than 175,000 website users’ email addresses. And the hacker gained access to their clear text passwords as well. This roster of online poker players includes some U.S. government workers.

The president of the World Poker Tour Amateur Poker League who is also it’s CEO, Kurt McPhail, joins other WPTAPL representatives in playing down the significance of the breach. The business hosts the site They do acknowledge that there has been an attack on their system. But McPhail expressed to SC magazine that the obtained data is “pretty much worthless”. He claims that of all the leaked accounts, only about 50,000 have actually been recenetly active on the system.

The representatives of the WPTAPL also contend that their users accounts can not be accessed. They are protected by the fact that users do not sign into the site with their email addresses. They have usernames that are the primary means to log on to the site. The hacker has apparently not leaked these names. And McPhail has emphasized the important point that financial data of users is not stored on the servers associated with the website.

Kurt McPhail also expressed that all of the affected users are being notified. He contends that the vulnerabilities that allowed this attack are being aggressively identified. The organization is actively revising the code that was exploited in this incident.

Generally one of the primary recommendations after such a breach would be to encourage all clients to reset their passwords. This is especially critical is they have been using the same one for many online accounts. The greatest potential risk in this incident is probably not as much from the initial attack on But the bigger problem could be that the hacker may have intercepted a password that the users use on many other online accounts with more valuable personal data.

Since some of the accounts belong to employees of government agencies such as the Centers for Disease Control and Prevention, the Department of Health and Human Services, US Courts, the US Federal Bureau of Prisons, the House of Representatives, the Department of Energy, and the Department of Labor, attention should be given to whether these passwords could be used to enter into their official government email accounts.

Have You Been Hacked?

*Cyber breach data provided by Have I Been Pwned

Enter your email or username to see if your information was compromised.

Have You Been Hacked?