Attacks/Breaches

11/27/2018
02:45 PM
50%
50%

Uber Hit With $1.2 Million Additional Fines for 2016 Data Breach

Now the penalties are coming from Europe.

UK and Dutch authorities have fined Uber a total of $1.7 million in fines for exposing customers' personal information in its 2016 data breach.

The latest financial fallout for Uber comes in the wake of September's $148 million settlement with the 50 US states and the District of Columbia for violating data breach reporting laws in its cover-up of the epic hack that affected 57 million US users.

The UK Information Commissioner's Office fined the ride-sharing firm $491,284, while the Dutch Data Protection Authority set a $679,257 penalty, CNBC reported. Some 2.7 million Uber customers were affected in the UK and 174,000 in The Netherlands.

"This was not only a serious failure of data security on Uber's part, but a complete disregard for the customers and drivers whose personal information was stolen," said ICO director of investigations Steve Eckersley. "At the time, no steps were taken to inform anyone affected by the breach, or to offer help and support. That left them vulnerable."

Read more here

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ChristopherJames
50%
50%
ChristopherJames,
User Rank: Strategist
1/4/2019 | 3:38:42 AM
Secret noncompliance
There are so many situations where businesses can get into trouble because they haven't made the effort to protect data an digital information. Problem for them is that people are getting smarter about what constitutes as their right to privacy. So that means companies will have to pay more money to make sure that they do their due diligence! Unfortunately chances are those companies that don't adhere to the rules will only be caught when they are caught...
Ritu_G
50%
50%
Ritu_G,
User Rank: Apprentice
12/14/2018 | 1:13:34 AM
Channel the fine properly
It has become ever so often that we hear of organizations being fined due to their security lax that led to breaches. However, where do those hefty sums of money go to? Are they being channelled to a proper platform that can assist those affected organizations improve their security measures? Or do they simply go to the government body that fined them? What good will that do if that is indeed the case?
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10014
PUBLISHED: 2019-03-24
In DedeCMS 5.7SP2, member/resetpassword.php allows remote authenticated users to reset the passwords of arbitrary users via a modified id parameter, because the key parameter is not properly validated.
CVE-2019-10015
PUBLISHED: 2019-03-24
baigoStudio baigoSSO v3.0.1 allows remote attackers to execute arbitrary PHP code via the first form field of a configuration screen, because this code is written to the BG_SITE_NAME field in the opt_base.inc.php file.
CVE-2019-10017
PUBLISHED: 2019-03-24
CMS Made Simple 2.2.10 has XSS via the advanced_search.php Name field, which is reachable via an "Add a new Profile" action to the File Picker.
CVE-2019-10010
PUBLISHED: 2019-03-24
Cross-site scripting (XSS) vulnerability in the PHP League CommonMark library before 0.18.3 allows remote attackers to insert unsafe links into HTML by using double-encoded HTML entities that are not properly escaped during rendering, a different vulnerability than CVE-2018-20583.
CVE-2019-9978
PUBLISHED: 2019-03-24
The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.