Its been Tmobile been unlucky last year by a massive breach and now by an internal employee who sold more than 1.5 millionCzech Republic customer data.
As per the local media MF DNES, it is unknown how much of name, e-mail address, account number and various other information the marketing database contained. T-Mobile Czech Republic says only that it did not include location, traffic, or other “sensitive data such as passwords”.
T-Mobile Czech-Republic has refused to provide any additional information about what data was leaked, due to an ongoing police investigation.
Although the company assured its customers that the stolen database did not contain any sensitive information such as location, traffic or other sensitive data like passwords, rather the stolen data was only used for marketing purposes.
This also means in the coming days users will expect to see increase SPAM from unknown companies.
T-Mobile Czech Republic managing director Milan Vašina says there was “no actual data leak” adding that “data are (sic) safe”.
Until the investigation gets completed we need to wait and see the extent of information lost as a result of insider data leak.
After the TalkTalk incident when data of over 1.2 million customers was stolen and leaked online; The Mail has reported that 14 other companies are also victims of similar attack. The Mail has also reported in its news item that the stolen data is being sold on “Dark Web” that can be accessed from a […] Continue reading →
The Lithuanian 000Webhost is one of the most popular free webhosting services and has over 13.5 million users. It ranks among the top search results in Google and is quite popular for its services. However, according to a report from Forbes, the login credentials of these users, that includes their usernames, passwords, email addresses, last […] Continue reading →
In September, researchers at FireEye Labs discovered a group of malicious adware created by a company based in China and Singapore called NGE Mobi/Xinyinhe. On October 7, FireEye detected a similar adware family capable of completely taking over Android based devices. Researchers have named it kemoge after its CnC domain aps.kemoge.net. It is believed that […] Continue reading →
Palo Alto Networks has detected a malware capable of attacking even those non-jailbroken iOS devices. The researchers have named the malware as YiSpecter. It follows unique methods that involves exploiting private APIs in iOS and infecting them. Private APIs are undocumented by Apple and, therefore, avoid being detected. Apple’s App Store has around 100 such […] Continue reading →
St. Louise-based Scottrade Inc. has sent out an email to its clients informing them of a recent cyber -attack that affected their systems. The company has revealed that they were alerted of the breach by FVI agents who have been investigating it since it occurred sometime between late 2013 and early 2014. It was further […] Continue reading →
Recent reports presented by Scott Erven and Mark Collao at Derbycon have revealed that thousands of medical systems are exposed to widespread cyber-attacks. The researchers reported that a giant U.S. medical organization with 12,000 staff and 3,000 physicians has over 68,000 systems that are vulnerable. The researchers indicate that this is just the tip of […] Continue reading →
Gatekeeper is the security feature of Mac OS X that protects users from malicious applications and code execution on their Mac computers. It warns Mac users from installing unsigned apps or the ones downloaded through an unencrypted connection. Gatekeeper does an efficient job of preventing the installation of Trojans and applications with malicious codes. However, […] Continue reading →
On 28th September 2015, a vulnerability was detected in WinRAR SFX v5.21. It is the latest version of WinRAR, a commonly used file compression tool. Attackers can exploit the vulnerability and compromise a computer with WinRAR installed on it. The bug is in the “text and icon function” under the module “Text to display in […] Continue reading →
One of the most malicious attacks that can ever be launched on a website is being flooded with multiple requests that it cannot handle, otherwise known as DDoS’es. According to internet security researchers, this nightmare may have recently become a reality after one site was targeted in such a manner with an aim of overwhelming […] Continue reading →