Remove 2009 Remove Accountability Remove Authentication Remove Information Security
article thumbnail

ENISA provides data related to major telecom security incidents in 2021

Security Affairs

Every European telecom operator that suffers a security incident, notifies its national authorities which share a summary of these reports to ENISA at the start of every calendar year. The reporting of security incidents has been part of the EU’s regulatory framework for telecoms since the 2009 reform of the telecoms package.

article thumbnail

Personal info of 90k hikers leaked by French tourism company La Malle Postale

Security Affairs

The leaked information included names, phone numbers, emails, private communication via SMS messages, passwords, and employees’ credentials. Founded in 2009, the company provides luggage and passenger transportation services on many popular hiking routes, including the famous Santiago de Compostela pilgrimage trail.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RockYou2021: largest password compilation of all time leaked online with 8.4 billion entries

Security Affairs

billion unique password variations with other breach compilations that include usernames and email addresses, threat actors can use the RockYou2021 collection to mount password dictionary and password spraying attacks against untold numbers of online accounts. Enable two-factor authentication (2FA) on all of your online accounts.

Passwords 112
article thumbnail

Billions of FBS Records Exposed in Online Trading Broker Data Leak

Security Affairs

User information on online trading platforms should be well secured to prevent similar data leaks. Founded in 2009, FBS is an international online forex broker with more than 400,000 partners and 16 million traders spanning over 190 countries. A German User’s Account. An Australian User’s Account. Account Takeover.

Passwords 121
article thumbnail

Key aerospace player Safran Group leaks sensitive data

Security Affairs

Knowing them, a threat actor could be able to hijack the session and therefore the account. The leak also included the JWT secret key, another type of token, which is usually used for authentication. If attackers had access to this key, they could create an admin account and have privileged access to a website.

article thumbnail

Telehealth: A New Frontier in Medicine—and Security

SecureList

Number of data leaks from medical organizations, 2009–2020. Let’s see if there are any informational security issues with these wearables. Healthcare professionals that use telehealth should protect their work accounts with strong passwords, as well as use two-factor authentication. Source: HIPAA Journal.

Phishing 128
article thumbnail

HITRUST vs. HIPAA: Ensuring Data Security and Compliance

Centraleyes

While both HITRUST and HIPAA have substantial relevance in ensuring data security in the healthcare sector, they are very different standards. HIPAA, or the Health Insurance Portability and Accountability Act of 1996, is a federal law, whereas HITRUST is a comprehensive control framework. HITRUST vs. HIPAA: What Sets Them Apart?