Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

Samsung, Zoom and Uber, suffer breaches in their cybersecurity

Uber sufre ciberataque

International. Samsung, Zoom and Uber have been accountable news of cyberattacks and security breaches that have exposed the provision of their services and the data of their users. Being the transport platform perhaps the most affected by the level of acuity of the attack suffered.

These large companies, which are always in the media eye at a global level, suffer a second level of affectation due to these negative events in their cybersecurity; the detriment of the trust of its customers and the negative perception in the market.

Samsung: Massive Data Loss
Samsung Electronics admitted to having a cybersecurity breach in late July, which exposed personal information of some customers in the United States, such as names, date of birth, registered products, demographic information and contact details.

On the other hand, the company assured that other relevant data such as social security numbers and credit cards were not affected. However, the total number of users affected was not made known to the public.

Database

- Publicidad -

In addition, Samsung stated that it has taken steps to protect compromised U.S. systems. "As part of our ongoing investigation, we have also hired a leading third-party cybersecurity firm and are coordinating with law enforcement."

Zoom: Vulnerability in audio and video control
Recently, 2 vulnerabilities of unauthorized access in Zoom were detected, by which the control of the audio and video of this program of conferences and virtual meetings could be compromised.

Specifically, the Zoom security bulletin published, on September 13, a highly relevant information:

"Zoom On-Premise Meeting Connector MMR prior to version 4.8.20220815.130 contains an inappropriate access control vulnerability. As a result, a malicious actor could obtain audio and video streaming of a meeting they were not authorized to join and cause other disruptions to the meeting."

In that sense, the National Institute of Cybersecurity of Spain (INCIBE), through the Office of Internet Security (OSI), recommended "keeping applications and programs correctly updated. And if the configuration allows it, activate the automatic update option so that whenever an update that fixes security flaws is released, it is installed as soon as possible."

Uber: hacked "down to the source code"
Last Thursday, January 15, through its official Twitter account, the transport services platform shared that it was under attack. "Currently, we are responding to a cybersecurity incident. We are in contact with the Police and will post additional updates here as they become available."

Also, the company had to disconnect the Slack system that it used as a business chat, in the afternoon hours of that same day, after its employees received a message from the alleged cybercriminal who was carrying out the attacks. "I announce that I am a hacker and that Uber has suffered a violation." The comment included emojis, memes and a list of several internal databases, so they could verify the veracity of the situation.

- Publicidad -

Twitter oficial de Uber

According to a New York Times publication , the person responsible would be an 18-year-old person, who provided screenshots of the internal systems of the transport platform to prove the veracity of his statement. The self-styled Hacker assured the media that he managed to infiltrate by doing social engineering, through a text message, to an Uber employee.

Other statements by the perpetrator were that he had broken into the systems because the company had little security and that Uber drivers should receive a higher salary.

The New York Times contacted Sam Curry, security engineer at Yuga Labs, who had a correspondence conversation with the hacker, of said communication the expert indicated several situations: "the person seemed to have access to the source code, email and other internal systems of Uber", that is, "they practically have full access" and assured that apparently it was an attack with a total compromise of the system.

Finally, according to screenshots shared by the cybercriminal, the cybercriminal has full access to Uber's IT systems, including the company's security software and Windows domain. A complex situation to solve and that adds to the incident of 2016, the year in which the company suffered theft of information and paid $ 100,000 in ransom, a circumstance that today involves a trial against former employee Joe Sullivan, who claims to be a scapegoat of the company.

Iris Montoya Ricaurte
Author: Iris Montoya Ricaurte
Editora
Periodista con amplia experiencia en corrección de estilo y generación de contenidos de valor para el sector especializado - [email protected]

No thoughts on “Samsung, Zoom and Uber, suffer breaches in their cybersecurity”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter