Connect with us

Technology

The biggest IT security breaches of all time

While are there so many companies out there who have sophisticated security methods, it still leaves us concerned as to the security of our own data in the hands of these large companies.

Published

on

It seems that you don’t have to look very far these days to see the impact of security breaches on our lives. We all have anxieties about our information being stolen or passed on to other resources. But while are there so many companies out there who have sophisticated security methods, it still leaves us concerned as to the security of our own data in the hands of these large companies. And while it may be an oversight to think that it’s just smaller companies who have limited protection methods, just because their finances are limited. In fact, it’s the big companies that we’ve got to keep an eye on.

There have been so many security breaches in the last few years, and here are some of the biggest.

Yahoo!

This giant of a company announced in September 2016 that a couple of years prior that they were the victim of a data breach. This was the biggest in all of history. Over three billion accounts had been hacked, including the real names, dates of birth, as well as email addresses and telephone numbers of Yahoo! users. In fact, they were subject to breaches in 2013 as well as 2014, where 500 million users were compromised.

eBay

The king of online auction sites reported in May 2014 that 145 million users (all of them) had their names, addresses, and dates of birth, as well as encrypted passwords, hacked. As a result, eBay asked its customers to change their passwords, but luckily the financial details were stored separately and weren’t subject to the hack. The biggest retail business hack of all time did result in a decline in user activity. What can we learn from this? Well, if you are a retail business, having different details stored on different devices is a common sense approach to undertake. While a lot of us feel we are doing enough to protect our data, it clearly shows that sites like eBay aren’t immune to cyberterrorism. Make the most of your resources, and companies like ATB Technologies have a resource library that we can all make use of. The scariest aspect of this hack is that the perpetrators had inside access for 229 days! They did this by using the credentials of 3 employees. If this isn’t the lesson in changing your password regularly, then who knows what it is?

Heartland Payment Systems

In March 2008, 134 million credit cards details were exposed via SQL Injection. It wasn’t discovered until January 2009, when MasterCard and Visa notified the company of questionable transactions through accounts they had processed. The vulnerability many businesses faced with regards to SQL Injection was nothing new, and in fact, security analysts had been warning retailers for many years prior to the attack. SQL injection was the most commonplace form of attack of the time.

FriendFinder

Adult content and casual hookup websites are ground feed for hackers. And the FriendFinder network was subject to a hack in the middle of October 2016, where user details were being leaked out of cybercrime forums. It transpired that the password protection algorithm was a weak one, the SHA-1 hashing algorithm resulted in 99% of the hacked passwords. Overall, 412 million accounts were hacked.

MySpace

Confined to the past now, MySpace was the giant of social media over a decade ago. This hack was partly the result of users being able to find out that they could embed their own content on their page, and instead of fixing the problem, the administrators of MySpace allowed it to happen. Overall, 316 million accounts were compromised. Email addresses, as well as usernames and poor passwords, highlighted that the breach was typical of the mid-2000s, not least because of the references to Blink 182. Those were the days, eh?

Equifax

Consumer credit reporting agency Equifax reported in September 2017 that a security breach took place from May until July! In total, 145 million users were affected by the security breach. While it’s not the largest of data breaches, the sensitive nature of information, from birth dates, social security numbers, and even driver license numbers could have resulted in many perpetrators committing fraud by posing as those users to set up agreements like mortgages, loans, or credit cards.

Target Stores

American retail giant Target had 110 million records hacked. This occurred during the post Thanksgiving shopping surge. In 2013, hackers had infected the payment card readers, resulting in them escaping with 40 million credit and debit card numbers. In addition to this, contact information had been compromised, with over 70 million customers names, addresses and telephone numbers stolen.

National Archive And Records Administration

It’s important to remember that not all data breaches are the result of criminals. In 2008, a hard drive at the NARA, containing the private information of 76 million American military veterans, was sent off to repair after it stopped working. Rather than being destroyed on site, a government contractor sent this drive out to be scrapped. However, it transpired that it was unclear as to whether the drive was destroyed or not. After an investigation, the NARA changed its policies relating to the destruction of storage devices containing sensitive information. While it’s argued that a data breach did not occur, the fact that the company changed its policies speaks volumes.

Home Depot

The result of infection at the point of sale systems in this hardware supply store in April or May of 2014, this resulted in customer credit and debit cards being stolen. The malware in question pretended to be an antivirus package. This was the largest steal of payment cards resulting from a direct attack on a company. Although luckily, this didn’t deter customers.

Anthem

This healthcare company admitted that in February 2015, 80 million records were stolen by hackers. The attack was a result of phishing emails that was sent to five employees. As is the typical setup of phishing scams, these employees downloaded Trojan software, resulting in the attackers obtaining passwords. This company is a parent of healthcare providers like Blue Shield, and the theft of millions of medical records was thought to be worth 10 times the amount of the credit card information.

Uber

In October 2016, the details of 57 million drivers were hacked via Uber engineers’ credentials from a GitHub account. Uber didn’t reveal this information until November 2017. Instead, the company tried to keep it under wraps and paid the hackers $100,000 to stop them releasing the data. This doesn’t seem to have deterred the businesses dominance over the taxi market.

Sony Pictures

One of the more famous in recent years, the staff at Sony Pictures Entertainment had their computer screens hijacked by a grinning skull. This was the result of a group called Guardians of Peace, threatening to release company information if certain demands were not met. Unpublished scripts, internal passwords, as well as emails and passports belonging to actors and internal workers, showed up on file sharing sites. In addition to this, four unreleased Sony movies were released, including the Seth Rogen vehicle The Interview (51% on Rotten Tomatoes!). In total, over $100 million of monetary damages were estimated as a result of this hack.

Pizza Hut

It’s not always the most straightforward of businesses that get hacked. This pizza chain revealed that its website and app were hacked in October 2017, resulting in personal information being compromised. It’s unclear how many customers were affected, but roughly 60,000 US customers have been reported as having had their billing information, including email addresses and delivery addresses, stolen.

Bupa

This British health insurance provider suffered a data breach in July 2017, not as a direct result of an external cyber criminal, but an employee. This Bupa worker copied and removed sensitive information, but no medical information was released. Although, names, dates of birth, and some minimal contact information were removed. In total, 500,000 customers were affected.

Wonga

This payday loan company was affected by 245,000 customers having extremely sensitive information, including bank account numbers, stolen. The company has not divulged where this took place, but this was the result of the company not realizing that data could be accessed externally until April 2017.

Nationwide Building Society

It seems that not even your money is safe. An unencrypted laptop was stolen from a company employee in this UK building society, compromising the personal information of 11 million customers! The Financial Services Authority fined Nationwide Building Society £980,000, which was the record for data loss penalty at the time, but it’s nice to know that your money is being well looked after, isn’t it?

This is a concern for every person in the world, from business owners to customers. While there’s only so much we can do to take our law into our own hands, this reinforces the notion that we’ve got to be on top of our form data, from passwords and email addresses. It’s important to get clued up in what you can do to protect your data, but, unfortunately, we need to trust those that are handling sensitive data. Instead, it’s best to refuse as much personal information as you can when filling out forms online. These are the biggest breaches of all time, and it’s a sign of the modern world.

Technology

How tech is shaking up the retail investing scene

Investors can check the price of stocks whenever they like, read associated stories, access balance sheets, and generally have all of the tools at their disposal to work out whether a company is a good buy. It’s fair to say that tech is shaking up the retail investing scene in more ways than one.

Published

on

Retail investors used to have to make a stark choice. Either they bought and sold equities through a broker – somebody who would buy shares in companies on their behalf – or they’d pile all their capital into a mutual fund and wait. Without the internet, investors usually had to wait for their statements in the mail before they found out about the performance of their investments. It wasn’t always good news.

Image result for investing
IMAGE SOURCE: CafeCredit.com from Flickr

Technology has changed all that. Retail investors now have information that is nearly as good as top hedge funds. Investors can check the price of stocks whenever they like, read associated stories, access balance sheets, and generally have all of the tools at their disposal to work out whether a company is a good buy. It’s fair to say that tech is shaking up the retail investing scene in more ways than one.

Software Advisors

It was only a matter of time before somebody applied new artificial intelligence software to the retail investing scene. In the past, retail investors had to do their research if they wanted to understand how markets worked. Investing is a technical discipline, as well as an art, and an understanding of key terms is essential. But robo advisors take some of the edge off the otherwise steep learning curve. People new to finance can quickly get up to speed with all the relevant concepts and jargon. Robo advisors can give information about complicated investment plans, 401(k)s and many other things.

READ:  State of the Nation: The Plight of the Golden Gays

Retail investors can also put their faith in machines too if they see fit. The world’s first AI-powered investment ETF launched last year. The ETF is a collection of funds managed by a computer based on all available data. The software takes data from the market to predict which firms will perform best over a 12-month horizon. So far, the software hasn’t convincingly beaten the market, but it’s early days.

Trading Apps

In the past, if you wanted to buy shares in a company, you had to physically visit your broker, give the order, and then get them to buy the shares on the open market. Things have moved on a lot since then. Thanks to smartphones, the average investor can now just fire up an app on their phone, place an order, and take ownership of shares on the same day. Apps are usually linked to major trading houses, so be careful which you choose

High-Frequency Trading Products

Image result for trading
IMAGE SOURCE: PIX1861 from Pixabay

The market is continually looking for new ways to create profit opportunities. A controversial method of doing this is the so-called high-frequency trading where an automated trading system makes dozens of trades per second. High-frequency trading is shaking up the retail investment scene because it is changing the strategy that regular traders should use.

Retail investors can either invest in funds that take advantage of automated, rapid trading or they can adopt a value-investing approach, ignoring all the short term fluctuations in the market. The good news is that there are now products that cater to both. Some funds use high-frequency trading, while others attempt to follow companies with value potential.

READ:  Please Respect Our Rights

Continue Reading

Technology

The future of mobile phones – What comes next?

Mobile phones have evolved from bulky bricks capable only of calls to tiny pocket-sized computers capable of practically everything. It’s hard to imagine what could come next considering how advanced modern phones already are, but manufacturers and phone carriers are already busy planning new advancements.

Published

on

In the last three decades, mobile phones have evolved from bulky bricks capable only of calls to tiny pocket-sized computers capable of practically everything. It’s hard to imagine what could come next considering how advanced modern phones already are, but manufacturers and phone carriers are already busy planning new advancements.

IMAGE SOURCE
Licensed under Creative Commons

Here are just some of the improvements that are thought to shape the future.

LIMITLESS CONNECTION

When it comes to wireless plans, people are now getting much more for their money including free texts and even free calls. Plans such as this Verizon wireless plan offer incredibly strong signal and even mobile hotspot data. It’s thought that in the future, ‘unlimited data’ will become the norm and phone/wi-fi signal will be available practically everywhere allowing people to stay constantly connected.

FACIAL RECOGNITION

Facial recognition is already here with the iPhone X being the first to pass the tests. Other phones are thought to adopt this technology soon making it a standard feature in the future. Facial recognition can be used a secure alternative to a password preventing anyone else from being able to unlock your phone. It could also become the main form of payment – already you can use your phone to make payments and payment apps are now allowing you to use facial recognition technology. Cards may eventually become defunct given that they pose a greater security risk and facial recognition could take over.  

READ:  Mobile game celebrating LGBTQ equality marches onto devices

COLLAPSIBLE PHONES

This year, Samsung unveiled the prototype for the world’s first foldable phone. Once this technology has been perfected, we could see phones on the market that are able to fold up and fit neatly into the smallest pockets, whilst being able to then fold out to the size of tablets when we need a bigger screen. This could make them both more portable and more practical when doing activities such as reading and watching videos. On top of having foldable screens, phones of the future may even have self-healing screens to counteract damage (such technology is already in development, although it could still be a while until it is perfected).

SELF-CHARGING BATTERIES

This technology may be a fair way off yet, but researchers are already looking into it. By using a combination of solar power, hydrogen fuel cells, nanobatteries and perhaps even kinetic energy, it could be possible to keep our phones charged up on the go without ever needing to plug them into a wall. This remains the one big inconvenience with mobile phones – whilst portable chargers already exist, these chargers themselves need to be charged up beforehand. Having a phone that charges itself could make it easier to travel and get by in remote places without having to search for somewhere with a plug point.

Continue Reading

LIFESTYLE & CULTURE

Blued pokes fun on awkward sexting encounters to encourage safer sex & promote HIV awareness

Blued wants to remind its users to get tested for HIV and practice safer sex.

Published

on

From unsolicited dick pics to inappropriately direct sexual invitations, together with exposure to extreme kinks and aggressive flirting from total strangers, the online gay world can sometimes feel like the sexual equivalent of rush hour on a Friday night.  

But while hooking up in the digital age can be messy and confusing, one rule should be clear: when your partner refuses to practice safer sex, it’s time to stop and make a U-turn.

In celebration of World AIDS Day this December 1, the world’s largest gay social app Blued–a platform that’s facilitated millions of awkward sexting encounters–wants to remind its users to get tested for HIV and practice safer sex, through a series of videos where a user aggressively sexts multiple people, and hooks up with a guy who’s only willing to have sex, as long as it’s safe.

Currently, Blued has close to one million users in the Philippines, where as many as 32 people test positive for HIV every day, mostly among men having sex with men.

This stems from a lack of education on how HIV is transmitted, as well as the stigma of sex and the continuing discrimination of the LGBT community.

No longer just for gay trysts…

“We at Blued believe in sex-positivity, and that the abstinence-only solution to stopping HIV is not exactly the most realistic solution for a lot of people,” says Evan Tan, country marketing manager of Blued in the Philippines. “By making fun of awkward sexual encounters, we want people to lighten up their attitudes towards sex–but also remember that using condoms, getting tested for HIV regularly, adhering to your PrEP regimen, and establishing to your partners that safer sex is a non-negotiable rule, will allow you to enjoy your sex life even further.”

READ:  Phl volleyball team wins gold in The Straits Games 2016

Continue Reading

Health & Wellness

Healthcare providers – not hackers – leak more of your medical data

After reviewing detailed reports, assessing notes and reclassifying cases with specific benchmarks, researchers found that 53% were the result of internal factors in healthcare entities.

Published

on

Photo by @rawpixel from Unsplash.com

Yes, your personal identity may be at the mercy of sophisticated hackers on many websites; but surprisingly, when it comes to health data breaches, hackers aren’t the ones to blame. Instead, hospitals, doctors’ offices and even insurance companies are oftentimes the culprits.

This is according to a research from Michigan State University and Johns Hopkins University, which found that more than half of the recent personal health information (or PHI) data breaches were because of internal issues with medical providers – not because of hackers or external parties.

“There’s no perfect way to store information, but more than half of the cases we reviewed were not triggered by external factors – but rather by internal negligence,” said John (Xuefeng) Jiang, lead author and associate professor of accounting and information systems at MSU’s Eli Broad College of Business.

The research, published in JAMA Internal Medicine, follows the joint 2017 study that showed the magnitude of hospital data breaches in the US. The research revealed nearly 1,800 occurrences of large data breaches in patient information over a seven years, with 33 hospitals experiencing more than one substantial breach.

For this research, Jiang and co-author Ge Bai, associate professor at the John’s Hopkins Carey Business School, dove deeper to identify triggers of the PHI data breaches. They reviewed nearly 1,150 cases between October 2009 and December 2017 that affected more than 164 million patients.

“Every time a hospital has some sort of a data breach, they need to report it to the Department of Health and Human Services and classify what they believe is the cause,” Jiang said. “These causes fell into six categories: theft, unauthorized access, hacking or an IT incident, loss, improper disposal or ‘other.'”

READ:  Phl volleyball team wins gold in The Straits Games 2016

After reviewing detailed reports, assessing notes and reclassifying cases with specific benchmarks, Jiang and Bai found that 53% were the result of internal factors in healthcare entities.

“One quarter of all the cases were caused by unauthorized access or disclosure – more than twice the amount that were caused by external hackers,” Jiang said. “This could be an employee taking PHI home or forwarding to a personal account or device, accessing data without authorization, or even through email mistakes, like sending to the wrong recipients, copying instead of blind copying or sharing unencrypted content.”

While some of the errors seem to be common sense, Jiang said that the big mistakes can lead to even bigger accidents and that seemingly innocuous errors can compromise patients’ personal data.

“Hospitals, doctors offices, insurance companies, small physician offices and even pharmacies are making these kinds of errors and putting patients at risk,” Jiang said.

Of the external breaches, theft accounted for 33% with hacking credited for just 12%.

While some data breaches might result in minor consequences, such as obtaining the phone numbers of patients, others can have much more invasive effects. For example, when Anthem Inc. suffered a data breach in 2015, 37.5 million records were compromised. Many of the victims were not notified immediately, so weren’t aware of the situation until they went to file their taxes only to discover that a third-party fraudulently filed them with the data they obtained from Anthem.

READ:  Lenovo eyes bigger share in Philippine tablet market, announces new distributors

While tight software and hardware security can protect from theft and hackers, Jiang and Bai suggest health care providers adopt internal policies and procedures that can tighten processes and prevent internal parties from leaking PHI by following a set of simple protocols. The procedures to mitigate PHI breaches related to storage include transitioning from paper to digital medical records, safe storage, moving to non-mobile policies for patient-protected information and implementing encryption. Procedures related to PHI communication include mandatory verification of mailing recipients, following a “copy vs. blind copy” protocol (bcc vs cc) as well as encryption of content.

“Not putting on the whole armor opened health care entities to enemy’s attacks,” Bai said. “The good news is that the armor is not hard to put on if simple protocols are followed.”

Continue Reading

LIFESTYLE & CULTURE

Technological advancements up to present day

Back in the day things would be developed over a certain period of time. But they have since changed. Here we explore the various things that have been developed over the past few years.

Published

on

Technology has really shocked everyone. Back in the day things would be developed over a certain period of time. But they have since changed. Things are being developed every day from cars, cell phones, top Australian online casinos, applications, modes of energy and many others.

In this article, we will explore the various things that have been developed over the past few years.

Electric Cars

Cars are known to use gasoline. For cars, gasoline is like the nutrient that they require for them to function. But then again at the same time, the exhaust gases are bad for the environment. But great minds are always thinking ahead. So what was simply done was to make cars use electric energy for them to function. That way nothing on earth will be threatened. With car technology, we could go on about it forever. Everything on cars has been developed. They now have cars that don’t require keys to start the car as you can use your phone or a car button.  And as for unlocking you only need your fingerprint.

3D Printers

Printers have been known to print papers from when there were introduced. And they were slowly developing to printing plastics. Jaws dropped when they started printing metal, we thought that probably that is where they are going to end. But clearly they did not stop; now they have what is known as the 3-D metal printing. This one prints the exact thing that you want to be printed, for instance, you want to print a car part now that is possible.

READ:  Mama, dili nimo sala nga bayot ko

Robot Technology

Asians have always been known for their fondness for robots. And they managed to advance them from the normal robots that we are used to. Asians have developed robots that can help people in restaurants and are now the actual waiters. They do away with human labour.

Clearly one can note that technology is definitely advancing and for the better. Even in the world of online casinos, first, they were just yebo casino games. But now we have Live Dealer online casino games, technology truly is amazing.

Continue Reading

LIFESTYLE & CULTURE

Apple blocks its LGBTQI Pride watch face in Russia

While Apple regularly brandishes its “unwavering commitment to equality and diversity” in highly-produced LGBTQI Pride videos, the company – apparently – has its limits, with its Pride Apple Watch face hardcoded to not show up if the paired iPhone is using the Russian locale.

Published

on

In case anyone forgets: Pride support has its limits for businesses.

While Apple regularly brandishes its “unwavering commitment to equality and diversity” in highly-produced LGBTQI Pride videos, the company – apparently – has its limits, with its Pride Apple Watch face hardcoded to not show up if the paired iPhone is using the Russian locale.

As its is, Apple support forum users have been questioning the lack of a Pride watch face in Russia. The company – helmed by an openly gay man himself, CEO Tim Cook – first introduced its Pride Apple Watch face during the company’s Worldwide Developers Conference (WWDC) in June, drawing inspiration from the rainbow flag to celebrate LGBTQI Pride and stand against discrimination of LGBTQI people.

But tested on an iPhone running the latest iOS 12 beta, the Pride watch face simply disappears once a user switches to a Russian location.

In 2013, Russia implemented a “gay propaganda” law that – according to the European Court of Human Rights – reinforces prejudice and encourages homophobia. The law comes with the threat of jail time and fines for what Russia deems to be offensive speech.

With the non-appearance of the Pride-related product, Apple seems to be avoiding this particular legal quandary.

Apple sells a special Pride edition Apple Watch strap, donating a portion of the proceeds toward LGBTQI advocacy organizations. But the same product is also not available in Russia, one of the countries with worsening LGBTQI-related situations and where the support is most needed.

READ:  This is how you use your 'gay privilege'

With this, the company worth about $945 billion in June highlights many companies’ “we support you… but only to an extent” approach to LGBTQI Pride. Just this August, for instance, Unilever in the Philippines started to offer a 20-day paid leave for fathers, healthcare benefits for same-sex partners and paid absences for adoptive parents. But the company has also been accused of putting profit before the human rights of LGBTQIA people – e.g. Unilever North Africa Middle East has production facilities in countries such as Tunisia and Algeria, where – according to a 2015 report by the International Lesbian, Gay, Bisexual, Trans, and Intersex Association – homosexual activity continues to be illegal.

Unilever starts offering 20-day paternity leave, same-sex partner benefits in Phl

Continue Reading
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement

Facebook

Most Popular