5 of the worst safety missteps by tech firms

2018 marked the yr that governments, companies, and different organizations all over the world began implementing GDPR — not simply in Europe however worldwide.

However, at the same time as companies have clamored for enhanced knowledge safety, there have been main missteps alongside the way in which, lots of which resulted in catastrophic compromise of vital consumer knowledge.

Why does knowledge maintain such significance?

Firstly, I would like to debate why knowledge has turn out to be the forex of at the moment’s companies.

This not solely contains buyer or consumer knowledge, but additionally knowledge on processes, funds, transactions, and absolutely anything referring to how a enterprise operates. With the rise of the internet-of-things, this now contains sensor and machine knowledge, which is more and more turning into vital in automation and enterprise intelligence.

Data is vital in an organization’s analytics technique, which implies knowledge and traits are important to decision-making processes.

In current instances, knowledge has additionally turn out to be vital in communications technique, that means advertisers and entrepreneurs make the most of aggregated – and generally private – consumer knowledge in focusing on their messaging. This, nevertheless, has been beset with controversy, particularly as customers at the moment are beginning to really feel the intrusiveness of such use of information for focusing on.

The draw back to that is that, as companies and repair suppliers ramp up on their knowledge amassing actions, there’s at all times the danger that such knowledge might be uncovered to undesirable use.

This article showcases a couple of notable cases of safety missteps, and the precise or potential injury they’ve delivered to customers.


In September 2017 to July 2018, Facebook customers had been sufferer to an enormous knowledge assortment scheme, whereby attackers gained entry to knowledge from 29 customers, and entry to an extra 1 accounts. Such knowledge included delicate info, together with gender, faith, relationship standing, house cities, present cities, beginning dates, login units, training, checked-in areas, current searches, and get in touch with particulars.

Hackers exploited vulnerabilities in Facebook code to achieve “access tokens” that are digital keys that gave them entry to consumer knowledge. Facebook has since addressed the vulnerability, and likewise cooperated with legislation enforcement companies within the investigation.

It wasn’t over for Facebook, nevertheless, because it was embroiled in an excellent larger controversy. It was in 2018 when the Cambridge Analytica scandal got here to gentle. A persona prediction app constructed by a professor from Cambridge University improperly handed on info to firms. The real-world influence was that knowledge was despatched to an analytics agency – Cambridge Analytica – which was utilized by Donald Trump’s marketing campaign in focusing on adverts utilizing knowledge from thousands and thousands of Facebook customers.

Facebook has since made modifications to the way in which purposes on its platform share knowledge, to keep away from a recurrence.

Reddit, Tinder, Pinterest, Amazon Music, and so forth.

In an period whereby social networks, e-commerce companies, relationship websites, and just about all the pieces might be accessed from one’s cell phone, safety breaches might be devastating — particularly if one’s knowledge, id, or cash had been to be stolen. In 2018, a large-scale Cross-Site Scripting (XSS) vulnerability was found to have affected main social, e-commerce, and different companies, probably affecting 685 million customers throughout the globe.

An XSS vulnerability primarily permits malicious hackers to inject third-party code into an in any other case legit web site, which is commonly used as an assault vector in delivering payloads to customers’ shopper machines or stealing consumer knowledge by means of spoofing. When customers entry a web site or service, this includes a number of classes whereby the shopper and server ship and obtain knowledge back-and-forth. Given the interactivity of content material, this will additionally contain retrieving knowledge from third-party websites, and right here’s the place the XSS vulnerability stems from.

The misstep highlighted right here doesn’t instantly contain the websites talked about, however relatively a third-party service that optimizes consumer expertise for cell customers. Apart from those listed above, different websites like Reddit, Western Union, Yelp, Ticketmaster, and others. The subject has since been addressed, rendering customers secure from the mentioned XSS vulnerability. There isn’t any point out, nevertheless, of whether or not attackers had been in a position to make use of this vulnerability, nor how a lot injury was performed, if any in any respect.

Also Read:  Tech giants commit to fight Covid-19 misinformation


Google is virtually the go-to search engine for billions of customers throughout the globe, particularly these utilizing Android units. Its social service Google+ isn’t as in style although – however this is perhaps factor, contemplating a current vulnerability.

In March to November of 2018, Google+ had a software program glitch that probably uncovered private profiles of 500,000 customers, as reported by the Wall Street Journal. In December that yr, Google itself found one other vulnerability that uncovered round 52 million customers to potential knowledge theft.

Vulnerable knowledge included names, employers, job titles, electronic mail addresses, beginning dates, and relationship statuses of customers.

Google has since introduced that it’s going to shut down Google+ by April 2019. There isn’t any indication, although, of whether or not knowledge was really stolen, though the potential for knowledge being had been large.


Not precisely a firm, however Aadhaar is India’s nationwide identification system, which meant that a knowledge breach would influence the nation’s 1.1 billion inhabitants. That’s simply what occurred when personal info, together with names, 12-digit identification numbers, and different knowledge comparable to checking account data, had been stolen.

The vulnerability concerned a knowledge leak skilled by a state-owned utility, Indane, which didn’t safe entry to its API. This meant that anybody with entry to the API might entry Aadhar knowledge – which encompasses id and biometric info, to not point out associated knowledge, comparable to checking account numbers, addresses, and so forth.

It isn’t identified when the breach really started, nevertheless it was found solely on March 2018, 9 years after the Aadhar platform launched in 2009.


Imagine knowledge on each US citizen being uncovered to entry by an attacker. This is simply what occurred with Exactis, a advertising and marketing and knowledge aggregation agency that confronted a knowledge leak that probably uncovered consumer knowledge from 340 million data. Not such a well-liked model or identify, however apparently, the corporate works with companies and platforms in brokering knowledge entry.

The knowledge dealer left round 2 terabytes of information out within the open, and this included private and personal info on each people (a whole lot of thousands and thousands of American adults) and companies.

While the information probably leaked doesn’t embody social safety numbers, it included highly-personal knowledge, comparable to telephone numbers, house addresses, electronic mail addresses, pursuits and habits, in addition to the quantity, age, and gender of the individual’s kids. It even had in-depth info on folks, comparable to whether or not an individual is a smoker, pet proprietor, and the like. Even if there was low chance of id theft (since SSNs weren’t included), such detailed private info might have been used for social engineering assaults.

As with the earlier slip-ups, it’s not clear whether or not malicious entities really accessed the database, though it will have been simple sufficient to search out. The vulnerability was found by a safety researcher, who came upon that the database was not protected behind a firewall.


This record contains a mixture of “what ifs”, which implies we’re maybe lucky that among the greatest safety missteps had been simply that – missteps.

Leaving databases out within the open might probably be dangerous if such knowledge will get into the improper palms. The urgent query now’s whether or not it obtained into the improper palms in any respect, and if the information might be used for malicious actions afterward.

You might also like More from author

Comments are closed.