Security News

A former Uber security executive has been charged for his role in the cover-up of a massive 2016 data breach, in which attackers accessed the company's Amazon Web Services accounts and stole data associated with 57 million passengers and drivers. In October 2016, two hackers gained access to Uber data stored on Amazon Web Services accounts, using Uber software engineer credentials found on GitHub, and stole a database that contained personally identifiable information associated with 57 million Uber users and drivers.

The U.S. Department of Justice announced on Thursday that former Uber Chief Security Officer Joe Sullivan has been charged over his alleged role in the cover-up of the 2016 data breach that resulted in the information of millions of Uber drivers and users getting stolen by hackers. During his time at Uber - he served as the company's CSO between April 2015 and November 2017 - the ride-sharing giant's systems were breached and the attackers managed to steal information belonging to 57 million users and drivers.

The federal prosecutors in the United States have charged Uber's former chief security officer, Joe Sullivan, for covering up a massive data breach that the ride-hailing company suffered in 2016. The 2016 Uber's data breach exposed names, email addresses, phone numbers of 57 million Uber riders and drivers, and driver license numbers of around 600,000 drivers.

The South African arm of one of the world's largest credit check companies Experian yesterday announced a data breach incident that exposed personal information of millions of its customers. While Experian itself didn't mention the number of affect customers, in a report, the South African Banking Risk Information Centre-an anti-fraud and banking non-profit organization who worked with Experian to investigate the breach-disclosed that the attacker had reportedly stolen data of 24 million South Africans and 793,749 business entities.

The federal prosecutors in the United States have charged Uber's former chief security officer, Joe Sullivan, for covering up a massive data breach that the ride-hailing company suffered in 2016. The 2016 Uber's data breach exposed names, email addresses, phone numbers of 57 million Uber riders and drivers, and driver license numbers of around 600,000 drivers.

The South African arm of one of the world's largest credit check companies Experian yesterday announced a data breach incident that exposed personal information of millions of its customers. While Experian itself didn't mention the number of affect customers, in a report, the South African Banking Risk Information Centre-an anti-fraud and banking non-profit organization who worked with Experian to investigate the breach-disclosed that the attacker had reportedly stolen data of 24 million South Africans and 793,749 business entities.

Penetration testers were successful in breaching the network perimeter and accessing the local networks of 93% of companies, according to a recent report from the security information company Positive Technologies. The testing revealed some alarming vulnerabilities, including the fact that at 71% of companies, even an unskilled hacker was able to penetrate the internal network.

The breach compromised 28,000 records, exposing such data as names, phone numbers, physical addresses, and email addresses. On Aug. 6, security training firm SANS Institute discovered a data breach of approximately 28,000 records as the result of one successful phishing attack against a single employee.

Hackers have breached Michigan State University's online store, gaining access to customer credit card numbers and other personal information, the university said. The university is offering free credit monitoring to anyone affected by the breach.

The SANS Institute has disclosed a security incident which resulted in 28,000 records of personally identifiable information being forwarded to an unknown email address. During the audit, the company identified a forwarding rule on one email account, meant to forward emails to an unknown external address.