T-mobile insider employee steals 1.5 million customer information and sells the dump to make quick money

Tmobile Data Breach

Its been Tmobile  been unlucky last year  by a massive breach and now by an internal employee who sold more than 1.5 millionCzech Republic customer data.

As per the local media MF DNES, it is unknown how much of name, e-mail address, account number and various other information the marketing database contained. T-Mobile Czech Republic says only that it did not include location, traffic, or other “sensitive data such as passwords”.

T-Mobile Czech-Republic has refused to provide any additional  information about what data was leaked, due to an ongoing police investigation.

Although the company assured its customers that the stolen database did not contain any sensitive information such as location, traffic or other sensitive data like passwords, rather the stolen data was only used for marketing purposes.

This also means in the coming days users will expect to see increase SPAM from unknown companies.

T-Mobile Czech Republic managing director Milan Vašina says there was “no actual data leak” adding that “data are (sic) safe”.

Until the investigation gets completed we need to wait and see the extent of information lost as a result of insider data leak.

Share Button

Information of customers of 14 companies being sold on Dark Web

malware_yahoo After the TalkTalk incident when data of over 1.2 million customers was stolen and leaked online; The Mail has reported that 14 other companies are also victims of similar attack. The Mail has also reported in its news item that the stolen data is being sold on “Dark Web” that can be accessed from a […]
Share Button
Continue reading →

Credentials of 13 million users breached from 000Webhost, a free webhosting company

000webhost The Lithuanian 000Webhost is one of the most popular free webhosting services and has over 13.5 million users. It ranks among the top search results in Google and is quite popular for its services. However, according to a report from Forbes, the login credentials of these users, that includes their usernames, passwords, email addresses, last […]
Share Button
Continue reading →

More than 20 countries were infected with adware mobile malware – Kemoge

kemoge1 In September, researchers at FireEye Labs discovered a group of malicious adware created by a company based in China and Singapore called NGE Mobi/Xinyinhe. On October 7, FireEye detected a similar adware family capable of completely taking over Android based devices. Researchers have named it kemoge after its CnC domain aps.kemoge.net. It is believed that […]
Share Button
Continue reading →

YiSpecter malware can infect non Jailbroken iOS devices

YiSpecter Palo Alto Networks has detected a malware capable of attacking even those non-jailbroken iOS devices. The researchers have named the malware as YiSpecter. It follows unique methods that involves exploiting private APIs in iOS and infecting them. Private APIs are undocumented by Apple and, therefore, avoid being detected. Apple’s App Store has around 100 such […]
Share Button
Continue reading →

Trading firm Scottrade hacked, loses information of 4.6 million customers

Scottrade hacked St. Louise-based Scottrade Inc. has sent out an email to its clients informing them of a recent cyber -attack that affected their systems. The company has revealed that they were alerted of the breach by FVI agents who have been investigating it since it occurred sometime between late 2013 and early 2014. It was further […]
Share Button
Continue reading →

Thousands of medical systems are exposed to widespread cyber-attacks – Derbycon

medical devices hacked fox Recent reports presented by Scott Erven and Mark Collao at Derbycon have revealed that thousands of medical systems are exposed to widespread cyber-attacks. The researchers reported that a giant U.S. medical organization with 12,000 staff and 3,000 physicians has over 68,000 systems that are vulnerable. The researchers indicate that this is just the tip of […]
Share Button
Continue reading →

An exploit can completely bypasses Mac’s malware Gatekeeper

Mac Gatekeeper malware Gatekeeper is the security feature of Mac OS X that protects users from malicious applications and code execution on their Mac computers. It warns Mac users from installing unsigned apps or the ones downloaded through an unencrypted connection. Gatekeeper does an efficient job of preventing the installation of Trojans and applications with malicious codes. However, […]
Share Button
Continue reading →

50 million users users impacted by WINRAR bug

WinRAR On 28th September 2015, a vulnerability was detected in WinRAR SFX v5.21. It is the latest version of WinRAR, a commonly used file compression tool. Attackers can exploit the vulnerability and compromise a computer with WinRAR installed on it. The bug is in the “text and icon function” under the module “Text to display in […]
Share Button
Continue reading →

Smartphone browsers can deliver powerful DDoS attack with 4.5billion requests causing Flood Attack

Bangkok Thailand -  January 10, 2015: Application and social media icons on smart phone screen One of the most malicious attacks that can ever be launched on a website is being flooded with multiple requests that it cannot handle, otherwise known as DDoS’es. According to internet security researchers, this nightmare may have recently become a reality after one site was targeted in such a manner with an aim of overwhelming […]
Share Button
Continue reading →