<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>data leak &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/data-leak/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Sun, 08 Mar 2020 08:39:00 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>data leak &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>AMD CPUs for the past 9 years are vulnerable to data leak attacks</title>
		<link>https://www.efrtechgroup.com/tech/amd-cpus-for-the-past-9-years-are-vulnerable-to-data-leak-attacks/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Sun, 08 Mar 2020 08:39:00 +0000</pubDate>
				<category><![CDATA[amd]]></category>
		<category><![CDATA[athlon 64 x2]]></category>
		<category><![CDATA[cpu]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[graz university of technology]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[personal computing]]></category>
		<category><![CDATA[personalcomputing]]></category>
		<category><![CDATA[processor]]></category>
		<category><![CDATA[ryzen 7]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[take a way]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[threadripper]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/amd-cpus-for-the-past-9-years-are-vulnerable-to-data-leak-attacks/</guid>

					<description><![CDATA[[ad_1] Unlike some side channel attacks, it hasn&#8217;t taken long to show how these exploits would work in the real world. The team took advantage of the flaws using JavaScript in common browsers like Chrome and Firefox, not to mention virtual machines in the cloud. While Take A Way only dribbles out a small amount [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>Unlike some side channel attacks, it hasn&#8217;t taken long to show how these exploits would work in the real world.  The team took advantage of the flaws using JavaScript in common browsers like Chrome and Firefox, not to mention virtual machines in the cloud.  While Take A Way only dribbles out a small amount of information compared to <a href="https://www.engadget.com/2018/01/05/meltdown-and-spectre-are-wakeup-calls-for-the-tech-industry/">Meltdown or Spectre</a>,  that was enough for the investigators to access AES encryption keys.</p>
<p>It&#8217;s possible to address the flaw through a mix of hardware and software, the researchers said, although it&#8217;s not certain how much this would affect performance.  Software and firmware fixes for Meltdown and Spectre have typically involved speed penalties, although the exact hit depends on the task.</p>
<p>We&#8217;ve asked AMD for comment.  However, the authors suggest that AMD has been slow to respond.  They said they submitted the flaws to AMD in late August 2019, but haven&#8217;t heard back despite keeping quiet about the flaw for the past several months.</p>
<p>The findings haven&#8217;t been without controversy, although it doesn&#8217;t appear to be as questionable as some thought at first.  While <em>Hardware Unboxed</em> <a href="https://twitter.com/HardwareUnboxed/status/1236079970729865216">found</a> disclosures that Intel funded the research, raising concerns about the objectivity of the study, the authors have <a href="https://twitter.com/lavados/status/1236083330556231683">also received</a> backing from Intel (and other sources) for finding flaws in the company&#8217;s own chips as well as other products.  It appears to just be a general effort to spur security research, then.  As it stands, the funding source doesn&#8217;t change the practical reality &#8212; AMD may have to tweak its CPU designs to safeguard against Take A Way attacks going forward.</p>
</p></div>
<p><script async src="http://platform.twitter.com/widgets.js" charset="utf-8"></script><br />
<br />[ad_2]<br />
<br /><a href="https://www.engadget.com/2020/03/08/amd-cpu-take-a-way-data-leak-security-flaw/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Porn cam network leaked sensitive data for thousands of models</title>
		<link>https://www.efrtechgroup.com/tech/porn-cam-network-leaked-sensitive-data-for-thousands-of-models/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Thu, 16 Jan 2020 21:00:00 +0000</pubDate>
				<category><![CDATA[amazon s3]]></category>
		<category><![CDATA[cam model]]></category>
		<category><![CDATA[camgirl]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[exposure]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[imlive]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[porn]]></category>
		<category><![CDATA[pornography]]></category>
		<category><![CDATA[pussycash]]></category>
		<category><![CDATA[s3]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/porn-cam-network-leaked-sensitive-data-for-thousands-of-models/</guid>

					<description><![CDATA[[ad_1] Data leaks by their nature subject people to some kind of unnecessary risk, but this latest could be genuinely dangerous. Researchers at vpnMentor have discovered that a porn cam affiliate network, PussyCash, left nearly 20GB of models&#8217; extremely sensitive data exposed in an Amazon S3 bucket. The repository included not only 875,000 keys for [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p><a href="https://www.engadget.com/2019-12-30-wyze-leak-2-4-million-users.html">Data leaks</a> by their nature subject people to some kind of unnecessary risk, but this latest could be genuinely dangerous.  Researchers at vpnMentor have <a href="https://www.vpnmentor.com/blog/report-pussycash-leak/">discovered</a> that a porn cam affiliate network, PussyCash, left nearly 20GB of models&#8217; extremely sensitive data exposed in an Amazon S3 bucket.  The repository included not only 875,000 keys for different file types (such as photos and videos), but personal info for over 4,000 models worldwide that includes their names, ID photos, passport/ID numbers, release forms and driver&#8217;s license images.  Some of the data could be up to 20 years old, but other info is just weeks old &#8212; there&#8217;s a very real chance stalkers, extortionists and others could have used this to threaten many of the models.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2020/01/16/data-leak-exposes-cam-models/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Clothing resale site Poshmark suffers data breach</title>
		<link>https://www.efrtechgroup.com/tech/clothing-resale-site-poshmark-suffers-data-breach/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Fri, 02 Aug 2019 13:42:00 +0000</pubDate>
				<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[hashed passwords]]></category>
		<category><![CDATA[poshmark]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[usernames]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/clothing-resale-site-poshmark-suffers-data-breach/</guid>

					<description><![CDATA[[ad_1] In response, Poshmark announced it conducted an internal investigation with support from a security forensics firm and &#8220;did not find any material vulnerabilities.&#8221; It has, however, &#8220;enhanced security measures across all systems to help prevent this type of incident from happening in the future.&#8221; In a blog post, Poshmark advises users to change their [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>In response, Poshmark announced it conducted an internal investigation with support from a security forensics firm and &#8220;did not find any material vulnerabilities.&#8221; It has, however, &#8220;enhanced security measures across all systems to help prevent this type of incident from happening in the future.&#8221;</p>
<p>In a blog post, Poshmark advises users to change their passwords just in case. The accessed data does not include financial information or physical addresses, and affected users will be notified by email. The company added that hashed passwords are <a href="https://www.engadget.com/2019/05/29/flipboard-security-breach/">protected by encryption</a>, which should make them difficult (<a href="https://www.engadget.com/2016/08/10/dota-2-forum-hack-spills-almost-two-million-passwords/">but not impossible</a>) to crack. This sort of data does, however, leave people open to the risk of <a href="https://www.engadget.com/2019/01/22/alphabet-google-jigsaw-phishing-scam-quiz/">phishing scams</a>.</p>
<p>The company apologized for the breach, saying, &#8220;Poshmark is a platform built on love and transparency, and we&#8217;re committed to serving you, and our entire community, every step of the way. You are the core of our business, and without you, we wouldn&#8217;t be the community we are today. We sincerely regret any concern this may cause you, and we&#8217;re here to answer any questions you may have.&#8221;</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/08/02/poshmark-data-breach/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Nearly 70 percent of hotel websites leak personal data, Symantec study finds</title>
		<link>https://www.efrtechgroup.com/tech/nearly-70-percent-of-hotel-websites-leak-personal-data-symantec-study-finds/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Wed, 10 Apr 2019 19:42:00 +0000</pubDate>
				<category><![CDATA[data leak]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[gdpr]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[hotel]]></category>
		<category><![CDATA[hotel booking]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[online travel]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[travel]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/nearly-70-percent-of-hotel-websites-leak-personal-data-symantec-study-finds/</guid>

					<description><![CDATA[[ad_1] The main issue involved booking confirmation emails, according to Symantec principal threat researcher Candid Wueest. Many of the messages include an active link that directs to a separate website where guests can access their reservation having to log in again. The booking code and the guest email are often in the URL itself, which [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>The main issue involved booking confirmation emails, according to <a href="https://www.engadget.com/tag/symantec/">Symantec </a>principal threat researcher Candid Wueest. Many of the messages include an active link that directs to a separate website where guests can access their reservation having to log in again. The booking code and the guest email are often in the URL itself, which in and of itself isn&#8217;t a big deal.</p>
<p>But, like many businesses, <a href="https://www.engadget.com/2018/06/19/amazon-launches-alexa-for-hotels/">hotels </a>share your personal data with third parties, meaning that your booking code and email are visible to them as well. The attacker would only need access to your booking code and email in order to find your address, full name, cell phone number, passport number and other highly sensitive information. Symantec also found that a smaller number of hotels didn&#8217;t encrypt the links sent in confirmation emails, giving attackers another window of opportunity.</p>
<p>A Symantec spokesperson told Engadget that the company contacted the hotels that had the security flaw and that most, but not all, of the hotels were taking measures to fix it. Symantec would not disclose which hotels were named in the study, but said it looked at a total of 45 different websites, including boutique hotels and major chains with hundreds of locations, covering more than 1,500 hotels.</p>
<p>What can customers do in the meantime to guard their privacy? Symantec advises that people use a VPN to change their hotel reservation when connected to public WiFi. Also, you can check the URL of your confirmation link to see if your booking details are exposed. A URL with the security flaw would look like this: <strong><em>https://booking.the-hotel.tld/retrieve.php?prn=1234567&amp;mail=john_smith@myMail.tld</em></strong></p>
<p>Wueest told Engadget in an email that he also looked at five travel search engines, and found similar security flaws. &#8220;This (&#8230;finding) shows it is a general issue in the travel industry and not just a local issue,&#8221; he wrote.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/04/10/nearly-70-percent-of-hotel-websites-leak-personal-data-symantec/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
