<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>databreach &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/databreach/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Thu, 20 Aug 2020 22:01:55 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>databreach &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Former Uber security chief arrested for covering up 2016 hack</title>
		<link>https://www.efrtechgroup.com/tech/former-uber-security-chief-arrested-for-covering-up-2016-hack/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Thu, 20 Aug 2020 22:01:55 +0000</pubDate>
				<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[databreach]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[justice department]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ridesharing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Transportation]]></category>
		<category><![CDATA[Uber]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/former-uber-security-chief-arrested-for-covering-up-2016-hack/</guid>

					<description><![CDATA[[ad_1] In addition to obstruction of justice, prosecutors charged Sullivan with failing to share knowledge of a felony. In total, he faces up to eight years in prison if convicted of both charges.  &#8220;We expect good corporate citizenship,&#8221; said US Attorney David L. Anderson. &#8220;We expect prompt reporting of criminal conduct. We expect cooperation with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>In addition to obstruction of justice, prosecutors charged Sullivan with failing to share knowledge of a felony. In total, he faces up to eight years in prison if convicted of both charges. </p>
<p>&#8220;We expect good corporate citizenship,&#8221; said US Attorney David L. Anderson. &#8220;We expect prompt reporting of criminal conduct. We expect cooperation with our investigations. We will not tolerate corporate cover-ups. We will not tolerate illegal hush-money payments.&#8221; </p>
<p>Bradford Williams, Sullivan&#8217;s attorney, told <a href="https://www.nytimes.com/2020/08/20/technology/joe-sullivan-uber-charged-hack.html?partner=IFTTT" class="_e75a791d-denali-editor-page-rtfLink" target="_blank" rel="noopener noreferrer"><em>The New York Times</em></a><em> </em>there&#8217;s &#8220;no merit&#8221; to the charges. &#8220;If not for Mr. Sullivan&#8217;s and his team&#8217;s efforts, it&#8217;s likely that the individuals responsible for this incident never would have been identified at all,&#8221; he said. Williams added that Sullivan and his team worked closely with other Uber employees and followed the company&#8217;s policies.</p>
<p>Meanwhile, a spokesperson for Uber told <em>The New York Times </em>it continues to cooperate with the Justice Department’s investigation into the 2016 hack.<em> </em>&#8220;Our decision in 2017 to disclose the incident was not only the right thing to do, it embodies the principles by which we are running our business today: transparency, integrity, and accountability,&#8221; they said.</p>
<p>Sullivan may become the second former Uber employee to end up behind bars. At the start of August, Anthony Levandowski, the engineer at the center of the <a href="https://www.engadget.com/2017-02-23-alphabet-sues-uber-over-waymos-self-driving-car-tech.html" class="_e75a791d-denali-editor-page-rtfLink">trade secret legal battle</a> between Waymo and Uber, was sentenced to <a href="https://www.engadget.com/waymo-levandowski-sentenced-042932212.html" class="_e75a791d-denali-editor-page-rtfLink">18 months in prison</a>. </p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/former-uber-security-chief-joe-sullivan-obstruction-of-jusice-220155398.html">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Have I Been Pwned&#8217;s code base will be open sourced</title>
		<link>https://www.efrtechgroup.com/tech/have-i-been-pwneds-code-base-will-be-open-sourced/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Fri, 07 Aug 2020 15:34:39 +0000</pubDate>
				<category><![CDATA[breach]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[databreach]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[have i been pwned]]></category>
		<category><![CDATA[haveibeenpwned]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[opensource]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[troy hunt]]></category>
		<category><![CDATA[troyhunt]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/have-i-been-pwneds-code-base-will-be-open-sourced/</guid>

					<description><![CDATA[[ad_1] Hunt noted there were a few reasons for this, including the prevalence of open source projects and the fact Have I Been Pwned has always been “open in spirit.” On a practical level, it’ll enable others to fix bugs and implement ideas that he’s not necessarily able to. It’ll take some time to fully [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>Hunt noted there were a few reasons for this, including the prevalence of open source projects and the fact Have I Been Pwned has always been “open in spirit.” On a practical level, it’ll enable others to fix bugs and implement ideas that he’s not necessarily able to. </p>
<p>It’ll take some time to fully open up the code base, and Hunt plans to do so gradually. “The transition from completely closed to completely open will happen incrementally, bit by bit and in a fashion that&#8217;s both manageable and responsible,” he wrote. </p>
<p>It’s a complex process, especially when you consider the highly sensitive troves of data that make Have I Been Pwned an important service. While much of that data is already in the wild, Hunt said he needed to ensure “privacy controls prevail across the breach data itself even as the code base becomes more transparent.”</p>
<p>Some other services, <a href="https://www.engadget.com/2018-02-23-1password-check-password-leaked.html">particularly</a> <a href="https://www.engadget.com/lastpass-security-dashboard-dark-web-monitoring-130006738.html">password managers</a>, also help people monitor whether their data or credentials have been included in a breach. Still, Have I Been Pwned is perhaps the best-known such resource, allowing people to search find out whether their email address is among billions of records from hundreds of data breaches. Taking steps to ensure it’ll remain available in the long run is a welcome move on Hunt’s part.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/have-i-been-pwned-open-source-153439253.html">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MoviePass confirms breach that leaked credit card numbers</title>
		<link>https://www.efrtechgroup.com/tech/moviepass-confirms-breach-that-leaked-credit-card-numbers/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Thu, 22 Aug 2019 03:24:00 +0000</pubDate>
				<category><![CDATA[databreach]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[heliosandmathesonanalytics]]></category>
		<category><![CDATA[moviepass]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[services]]></category>
		<category><![CDATA[subscription]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/moviepass-confirms-breach-that-leaked-credit-card-numbers/</guid>

					<description><![CDATA[[ad_1] On Tuesday TechCrunch reported that security researcher Mossab Hussein, with the firm SpiderSilk, found an exposed, unencrypted MoviePass database with millions of records. Some of those included numbers for its custom debit cards that are used when subscribers purchase tickets, while others listed customer&#8217;s personal information including their credit card numbers, expiration dates and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>On Tuesday <a href="https://techcrunch.com/2019/08/20/moviepass-thousands-data-exposed-leak/"><em>TechCrunch</em></a> reported that security researcher Mossab Hussein, with the firm SpiderSilk, found an exposed, unencrypted <a href="https://www.engadget.com/tag/MoviePass/">MoviePass</a> database with millions of records. Some of those included numbers for its custom debit cards that are used when subscribers purchase tickets, while others listed customer&#8217;s personal information including their credit card numbers, expiration dates and billing information. Another researcher had located the vulnerable information back in July and notified the company, but neither was able to get a response, while yet another found evidence the database had been public since May of this year.</p>
<p>MoviePass took the database offline yesterday after the report, and today finally publicly responded with a statement from a spokesperson.</p>
<blockquote>
<p><small>MoviePass recently discovered a security vulnerability that may have exposed subscriber records. After discovering the vulnerability, we immediately secured our systems to prevent further exposure and to mitigate the potential impact of this incident. MoviePass takes this incident seriously and is dedicated to protecting our subscribers&#8217; information. We are working diligently to investigate the scope of this incident and its potential impact on our subscribers. Once we gain a full understanding of the incident, we will promptly notify any affected subscribers and the appropriate regulators or law enforcement.</small></p>
</blockquote>
<p>The company <a href="https://www.engadget.com/2019/07/05/moviepass-temporarily-shuts-down-app-improvements/">put its services &#8220;on hold&#8221; in July</a> while saying it was working on its app, but couldn&#8217;t close this security hole &#8212; despite apparent attempts at notifications before restoring access &#8220;to a substantial number of our current subscribers.&#8221; </p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/08/21/moviepass-data-leak/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>After Math: Plead the fifth</title>
		<link>https://www.efrtechgroup.com/tech/after-math-plead-the-fifth/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Sun, 18 Aug 2019 15:30:00 +0000</pubDate>
				<category><![CDATA[8chan]]></category>
		<category><![CDATA[after math]]></category>
		<category><![CDATA[aftermath]]></category>
		<category><![CDATA[biometric]]></category>
		<category><![CDATA[congress]]></category>
		<category><![CDATA[databreach]]></category>
		<category><![CDATA[davechappelle]]></category>
		<category><![CDATA[fcc]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[jimmykimmellive]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[tomorrow]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/after-math-plead-the-fifth/</guid>

					<description><![CDATA[[ad_1] With Dave Chappelle coming back to Netflix for the one, two, three, four, fif time later this month, we&#039;re taking a look at all of this week&#039;s headlines that will make you want to plead against self-incrimination. [ad_2] Source link]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
<br /><img decoding="async" src="https://www.efrtechgroup.com/wp-content/uploads/2019/08/After-Math-Plead-the-fifth.jpeg" />With Dave Chappelle coming back to Netflix for the one, two, three, four, fif time later this month, we&#039;re taking a look at all of this week&#039;s headlines that will make you want to plead against self-incrimination.<br />
<br />[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/08/18/after-math-plead-the-fifth/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Iranian hackers stole terabytes of data from software giant Citrix</title>
		<link>https://www.efrtechgroup.com/tech/iranian-hackers-stole-terabytes-of-data-from-software-giant-citrix/</link>
					<comments>https://www.efrtechgroup.com/tech/iranian-hackers-stole-terabytes-of-data-from-software-giant-citrix/#respond</comments>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Sun, 10 Mar 2019 01:33:00 +0000</pubDate>
				<category><![CDATA[breach]]></category>
		<category><![CDATA[citrix]]></category>
		<category><![CDATA[crime]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[databreach]]></category>
		<category><![CDATA[fbi]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[iran]]></category>
		<category><![CDATA[iridium]]></category>
		<category><![CDATA[Nasa]]></category>
		<category><![CDATA[resecurity]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[saudi aramco]]></category>
		<category><![CDATA[saudiarabia]]></category>
		<category><![CDATA[saudiaramco]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/iranian-hackers-stole-terabytes-of-data-from-software-giant-citrix/</guid>

					<description><![CDATA[[ad_1] Resecurity understood that hackers from Iridium, an Iran-linked group, stole data in December 2018 and again on March 4th. They made off with at least 6TB of documents and as much as 10TB, and they seemed to be focused on project data for the aerospace industry, the FBI, NASA and Saudi Arabia&#8217;s state-owned oil [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>Resecurity understood that hackers from Iridium, an Iran-linked group, stole data in December 2018 and again on March 4th.  They made off with at least 6TB of documents and as much as 10TB,  and they seemed to be focused on project data for the aerospace industry, the FBI, NASA and Saudi Arabia&#8217;s state-owned oil company.  The intruders may have been lurking for a long time, too.  Resecurity&#8217;s Charles Yoo said that Iridium broke into Citrix&#8217;s network roughly 10 years ago and had been hiding since then.</p>
<p>The researchers said they&#8217;d told Citrix about the first attack on December 28th.  It&#8217;s not clear if Citrix addressed the issue then, although it took a number of steps after the FBI got in touch on March 6th.  The company said it launched a &#8220;forensic investigation&#8221; with the help of an unnamed security firm and took &#8220;actions&#8221; to lock down its network.</p>
<p>Citrix stressed there was &#8220;no indication&#8221; that the intruders compromised its products or services.  However, that&#8217;s not the major concern here.  As a government contractor that focuses on networking and the cloud, Citrix could hold sensitive data on other companies.  It may be aware of their network layouts and security measures, for instance.  Like the <a href="https://www.engadget.com/2017/08/25/fbi-nabs-chinese-national-opm-hack/">OPM hack</a>, the consequences could reach well beyond the initial target.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/03/09/iranian-hackers-target-citrix/">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.efrtechgroup.com/tech/iranian-hackers-stole-terabytes-of-data-from-software-giant-citrix/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
