![]() TrueDialog could have easily avoided this leak if it had taken some basic security measures. identity theft and fraud … phishing and scams blackmail. There were hundreds of thousands of entries with details about users, including full names, phone numbers, addresses, and more. … This means that anyone … would be able to log in to the company account … and do an incredible amount of damage. Millions of email addresses, usernames, cleartext passwords … were easily accessible within the database. … It’s rare for one database to contain such a huge volume of information that’s also incredibly varied. … It included 604 GB … of highly sensitive data. The TrueDialog database is hosted by Microsoft Azure and runs on the Oracle Marketing Cloud in the USA. This was a huge discovery, with a massive amount of private data exposed, including tens of millions of SMS text messages … millions of account usernames and passwords, PII data of TrueDialog users and their customers, and much more. ![]() Who found it? Noam Rotem and Ran Locar-“ Huge Data and SMS Leak”: … The company reaches 5 billion subscribers worldwide. TrueDialog, which creates text messaging solutions for small and large businesses, has since taken the logs offline. The personal information contained in the text messages could be an asset to scammers it could also be used in blackmail schemes and lead to identity theft and fraud. … The database contained access information to online medical services along with passwords and usernames to websites such as Google and Facebook. Some of your text messages may have been left exposed on the internet for the world to see. Wright also did not answer any of our questions.Īnd Dalvin Brown adjusts for inflation-“ ‘Hundreds of millions of people’ may have had their text messages exposed”: … Despite reaching out several times, TrueDialog’s chief executive John Wright would not acknowledge the breach nor return several requests for comment. The data also contained usernames and passwords of TrueDialog’s customers, which if used could have been used to access and impersonate their accounts. contained information about university finance applications, marketing messages from businesses with discount codes, and job alerts, among other things. The data … contained detailed logs of messages sent by customers who used TrueDialog’s system, including phone numbers and SMS message contents. … The database stored years of sent and received text messages … none of the data was encrypted. The database is run by TrueDialog, a business SMS provider for businesses and higher education … which lets companies, colleges, and universities send bulk text messages to their customers and students have two-way conversations. What’s the craic? Zack Whittaker reports-“ Millions of SMS messages exposed in database security lapse”: Your humble blogwatcher curated these bloggy bits for your entertainment. Oops and oops again. In today’s SB Blogwatch, we try to grok the scale of this.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |