HomeSecurity Operations"Mother of all data breaches" revealed in the latest widespread cyber attack

“Mother of all data breaches” revealed in the latest widespread cyber attack

Published on

spot_img

A “Mother of all Data Breaches” Hits Numerous Websites

In what is being described as the ‘mother of all data breaches,’ an astonishing 26 billion account records have been stolen, leaving popular websites like Dropbox, Linkedin, Telegram, and Twitter scrambling to secure their platforms. The extensive leak was detailed in a report from Cybernews.com and has left internet users feeling uneasy about the security of their personal information.

Huirong Fu, a professor at Oakland University and founding director of the Center for Cybersecurity, expressed her dismay at the scope of the breach, particularly emphasizing the difficulties it presents for consumers who are often compelled to register their information with companies they want to do business with. This includes sensitive details such as birthdays, addresses, and even Social Security numbers, putting many individuals in a difficult position.

The report from Cybernews.com dubbed this breach as the “Mother of all Breaches” due to the staggering 12 terabytes of compromised information. The magnitude of the breach is truly alarming, raising significant concerns about the safety of personal data on the internet.

So, what can consumers do to protect themselves in the wake of such a substantial breach? The Federal Trade Commission offers some general advice, including maintaining up-to-date security software and using strong passwords and multi-factor authentication for accounts containing personal information. They also recommend being cautious when sharing personal information, even with trusted organizations, as the threat of a hack is always a looming possibility.

This unprecedented breach serves as a stark reminder of the vulnerability of personal data in the online sphere. Despite the best efforts of companies to secure their platforms, the potential risk of a breach remains a constant concern for both businesses and consumers. For further details on the data breach, you can visit Cybernews.com to stay informed about this significant issue.

Source link

Latest articles

Bhojon Restaurant Management System 2.7 Vulnerable to Insecure Direct Object Reference

The Bhojon restaurant management system version 2.7 has been found to have an insecure...

North Korean Hackers Aim for Military Advantage by Targeting Critical Infrastructure

The global cybersecurity community has been put on high alert, as the UK, US,...

Learn PenTesting and hacking in this $45 course bundle

The cybersecurity industry is facing a high demand for skilled professionals, but the traditional...

More like this

Bhojon Restaurant Management System 2.7 Vulnerable to Insecure Direct Object Reference

The Bhojon restaurant management system version 2.7 has been found to have an insecure...

North Korean Hackers Aim for Military Advantage by Targeting Critical Infrastructure

The global cybersecurity community has been put on high alert, as the UK, US,...

Learn PenTesting and hacking in this $45 course bundle

The cybersecurity industry is facing a high demand for skilled professionals, but the traditional...
en_USEnglish