![]() ![]() ![]() ![]() But it gets worse: This data also contained the first names, birth dates, and genders for more than 6.3 million children linked to these VTech customers (their parents). He extracted files that held names, email addresses, passwords, and street addresses for almost 5 million people who bought VTech products. Its security was so bad that a “whitehat” hacker gained access to the company’s customer database on Nov. What could be a worse way to introduce children to the importance of web site security than to have their personal information leaked? That’s what happened with the app store for VTech, a maker of tech toys for children. Number of people affected: more than 11.2 million (total of 4,854,209 parents and 6,368,509 children) It was speculated that the hackers wanted the firm’s customer contact details in order to facilitate stock scams. Though email addresses, Social Security numbers, and other sensitive customer information were also vulnerable, it was believed none of these were taken, nor were client funds, their passwords, or Scottrade’s trading platforms ever compromised. This intrusion was brought to the attention of Scottrade by the FBI, and was believed to have occurred from late 2013 to early 2014, but the incident was not disclosed to the public until Oct. It was a bull market for hackers who accessed a list of client names and their street addresses from this online brokerage. (Also read, " LastPass drops the ball, but looks good doing it.") That’s what happened to LastPass, which announced on June 15 that it had detected an intrusion on their servers that compromised user emails, password reminders, and other important details - but which, fortunately, did not include their personal passwords to the LastPass service, or for web sites that LastPass users stored in their LastPass accounts. The bad thing is if someone gains access to your personal information for the password manager itself. The great thing about a good password manager is that it stores your log-in information for web sites at which you’re registered, and can then automatically enter your username and password whenever you visit one of these sites. Number of people affected: 4.4 million (low estimate total number of users of the Chrome and Firefox extensions) Gizmodo found a post on an online forum connected to someone who could be the culprit, who apparently tried to blackmail the company behind Adult FriendFinder for $100,000 over the release of this member information. He claimed he had deleted his account before the hack, which, if true, suggests the dating site didn’t remove customer information for closed accounts. Channel 4 News of the UK, which broke this news on May 21, tracked down a member of the site whose personal information was exposed. Personal details of the members of this dating site were leaked to a darknet forum: their ages, email addresses, IP addresses, usernames, ZIP codes, and even interest in seeking extramarital affairs, and sexual preference. The operator of the online security watch site Have I Been Pwned? found 2.3 million email addresses in this data dump - including his own. Information pertaining to both artists and their donors was revealed: email addresses, passwords, and private messages exchanged among users through the site. Adding insult to injury, this nearly 15GB of data included the source code for the Patreon site. This crowdfunding site, whose niche is enabling artists to raise money from the public to support their creative projects, got its user data dumped onto the Internet for all to see on Oct. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |