Connect with us

Press Release

533 million Facebook users’ phone numbers and personal data have been leaked online

Published

on

533 million Facebook users' phone numbers and personal data have been leaked online

Over 500 million Facebook users’ personal data have been leaked online in a low-level hacking forum. look trend micro q3lyngaascyberscoop.
Phone numbers, full names, addresses, email addresses, and biographical data are all included.
According to security experts, hackers might use the information to conduct fraud and pose as real people.

Get the most recent tech news and scoops delivered to your inbox every day.
On Saturday, a user on a low-level hacker forum made available for free the contact information and personal information of hundreds of millions of Facebook users.

Over 533 million Facebook users’ personal data from 106 different countries was exposed, including over 32 million records for US users, 11 million for UK users, and 6 million for Indian users. It contains their contact information, Facebook IDs, full names, addresses, dates of birth, biographies, and, in some cases, email addresses.

By cross-referencing known Facebook users’ phone numbers with the IDs included in the data collection, an insider examined a sample of the stolen information and validated several records. We also tested emails from the data set in Facebook’s password-reset feature, which can be used to partially reveal a user’s phone number in order to verify records.

Due to a flaw that the firm remedied in 2019, a Facebook spokeswoman told Insider that the data had been scraped.

Alon Gal, the chief technology officer of the cybercrime intelligence company Hudson Rock, who discovered the trough of leaked data on Saturday, claims that despite being a couple of years old, the leaked data could be useful to cybercriminals who use people’s personal information to impersonate them or con them into handing over login credentials.

According to Gal, “a large database that contained the private information, such as phone numbers, of many Facebook users would undoubtedly result in bad actors using the data to undertake social-engineering assaults [or] hacking attempts.”

When a user in the same hacker forum advertised an automated bot that could provide phone numbers for hundreds of millions of Facebook users for a fee, Gal came across the stolen information in January. At the time, Motherboard confirmed that the data was accurate and reported on the existence of that bot.

Now that the data set has been freely uploaded on the hacker forum, anyone with a basic understanding of data can access it.
Insider used the messaging service Telegram to try and contact the leaker but received no response.

Numerous Facebook users’ phone numbers have previously been discovered online in an open state. In violation of Facebook’s terms of service, the vulnerability discovered in 2019 allowed millions of phone numbers to be scraped from its systems. Facebook reported that the flaw was fixed in August 2019.

After Cambridge Analytica violated Facebook’s terms of service by collecting the data of over 80 million users in order to target voters with political advertisements during the 2016 election, Facebook committed to take action against bulk data-scraping.

From a security perspective, according to Gal, Facebook couldn’t do much to assist people who had their data exposed; however, he noted that Facebook could alert users so they could be on the lookout for fraud or phishing schemes using their data.

People who sign up with a respected firm like Facebook are entrusting them with their personal information, and Facebook is responsible for treating that information with the highest respect, according to Gal. “Users’ personal information being disclosed is a serious violation of trust and should be addressed appropriately.”

Continue Reading

Press Release

Customer engagement analytics startup Retain.ai nabs $23M

Published

on

By

Customer engagement analytics startup Retain.ai nabs $23M

With participation from Baseline Ventures, Upside Partnership, and Afore Capital, Retain.ai, a platform that offers businesses a perspective of customer engagement across teams, processes, and apps, has raised $23 million in a funding round led by Emergence Capital. By the end of 2021, Retain.ai headcount would have more than doubled thanks to the fresh funding, according to co-founder and CEO Eric Chernoff. The company has now raised more than $27 million in total, thanks to this round.

It can be challenging for businesses to comprehend how each of their divisions is providing customer service as they expand. This may result in expending excessive effort on the incorrect clients while underinvesting in the appropriate ones. Customers who aren’t paying their bills, for instance, may consume the most time from the product, engineering, marketing, and other teams. Sadly, compiling the data required for customer interaction research frequently necessitates lengthy, account-specific timesheets, process and time studies, or analyses employing data from many sources of record.

The Prospects for AI-based By giving a breakdown of client data, Customer Service Retain.ai attempts to automate the process. The platform uses browser-based applications to build an image of customer engagement and gives managers and customer-facing teams measurements of internal process effectiveness.

The engine behind Retain.ai, which Chernoff and Vlad Shulman cofounded in 2020, “delivers a trusted, adaptable system for discovering and sharing the habits that drive client retention and income,” Chernoff, a former LiveRamp employee, said in an email to VentureBeat. Every employee across the client lifecycle deserves a copilot, driven by billions of data points each month, who can make suggestions such, “Relative to accounts that increase three times, we saw you should be doing more of the things that work for other accounts. Organizations may spread the best practises throughout whole teams and processes using Retain as their copilot, improving everyone’s performance at work.

customer data integration

ADVERTISEMENT

Retain admins create a “allow list” of applications, websites, and attributes during setup in order to capture data and execute workflows. Retain is a browser extension that users can download, and it gathers comprehensive session information such as page URLs, start and end times, page properties, process categories, and more. The platform uses visualizations and summaries to transform this data into usable information, acting as a single source of truth for all team, customer, and app interactions within an organisation.

The Retain platform, according to Chernoff, may respond to inquiries about return on investment in relation to customer expenditure, which can be utilised to develop new revenue sources for customer success. According to Chernoff, firms can use Retain to capture engagement time on certain accounts outside of the period allotted for it to do so.

In addition to providing visibility into client connections, retention serves as an early churn indicator. With the help of these “relationship scorecards,” brands can track consumer interactions and make any necessary course corrections.

Through information on the efforts [and] activities that go into servicing customers throughout their lifecycle, [Retain] helps firms understand overall cost-to-serve clients, according to Chernoff. “[Most] leaders struggle to concentrate on the highest value customers and processes and are unsure on how to fix the problem,” Our background is in data networking, therefore we recognized a chance to use adtech-related methods. to assist businesses in determining whether or not their financial commitment in a certain customer’s growth was profitable.

Retain.ai, a company with 20 workers based in San Francisco, California, claims that thousands of people at more than a dozen Fortune 500 firms, including Google, Nielsen, and Salesforce, are currently using its software. According to reports, annual recurring revenue has increased by 8 times in the past year, while growth among Retain’s current clients has increased by 36 times on average.

“My vision is for Retain to be the next generation of customer experience data, replacing all the time-consuming consultancy and spliced-together self-reporting data,” the author says. In order to maximise customer-facing interaction and increase revenue by 25% by raising engagement with high-value customers and strengthening retention, [for our clients] we are returning the 23,000 hours per year spent on time-consuming internal processes, Chernoff stated. The adoption of work-from-anywhere and hybrid models by businesses has led us to the conclusion that every employee at a company has a remote interaction with their team and customers. Enterprises now more than ever require visibility and to make sure nothing slips between the gaps.

Continue Reading

Press Release

Anti-Secrecy Activists Publish a Trove of Ransomware Victims’ Data DDoSecrets

Published

on

By

Anti-Secrecy Activists Publish a Trove of Ransomware Victims' Data DDoSecrets

In the interest of openness, the WikiLeaks successor DDoSecrets has gathered a contentious new collection of business ddosecrets wikileakslike 1tbgreenbergwired.

Radical transparency advocates like WikiLeaks have been fusing hacking and whistleblowing for years. No matter how dubious the source, they frequently publish any data they deem to be of public importance. However, one leak-focused organisation is currently mining a contentious new source of information: the enormous data caches that ransomware teams steal and release online when victims refuse to pay.

The transparency group of data activists known as Distributed Denial of Secrets today released a sizable new amount of data on its website, all of which were gathered from dark web sites where the material was initially disclosed online by ransomware hackers. About 1 terabyte of the information, which includes more than 750,000 emails, pictures, and documents from five companies, has been made public by DDoSecrets. With selected journalists or university researchers, the organisation is also offering to confidentially share an extra 1.9 gigabytes of data from over a dozen other firms. The massive data gathering covers a wide range of businesses, including manufacturing, finance, software, retail, real estate, and oil and gas.

All of that data, along with the gigabytes more that DDoSecrets claims it will provide in the upcoming weeks and months, comes from a trend among ransomware operations run by cybercriminals that is becoming more and more widespread. Ransomware hackers now frequently steal huge quantities of victim data and threaten to publish it publicly unless their hacking targets pay, going beyond simply encrypting victim PCs and demanding a payment for the decryption keys. The victims frequently reject that extortion, and the cybercriminals often carry out their threat. As a result, dozens or even hundreds of terabytes of private corporate information are exposed and posted on dark web servers, the web addresses of which are known to hackers and security experts.

Co Founder of DDoSecrets

Emma Best, co-founder of DDoSecrets, asserts that the data dump trails that ransomware operations leave in their wake frequently contain information that should be examined and, in some cases, made public. In a text message discussion with WIRED, Best said, “Ignoring critical data that can educate the public about how companies operate isn’t something we can afford to do.” Given that there is too much data for DDoSecrets to look through on its own, Best, who uses the pronoun they, was unable to state in many instances with certainty what secrets of possible public interest those enormous data sets may contain. But they contend that any proof of corporate wrongdoing revealed by those records, or even intellectual property that can benefit the public, should be regarded as fair game.

According to Best, “we have a duty to make that information available to researchers, journalists, and scholars so they can learn about how typically opaque industries (many of which control significant aspects of our lives and the future of the planet) operate.” This could be a pharmaceutical company, a petroleum company, or any other business with technical data and specs.

Exploiting data leakage left behind by cybercriminal hackers, however, raises significant ethical dilemmas for those battling the spreading global scourge of ransomware attacks. In his opinion, amplifying the leaks from ransomware groups only encourages them to threaten those leaks against more victims. Allan Liska is an analyst and researcher for the security firm Recorded Future. He claims to have personally witnessed the devastating effects of ransomware attacks on businesses of all sizes. Personally, I believe it to be incorrect, says Liska. “I believe you are taking advantage of someone who has a crime committed against them, even if you believe your motives are good,”
The best defence is that DDoSecrets isn’t disclosing any information that those hackers haven’t already made available. They claim that all of the information was previously published by ransomware hackers. “We don’t collaborate with them in any manner or receive anything from them directly. We are making data available that journalists are unable or frightened to access. Best adds that DDoSecrets will often discuss the majority of the leaks in private with journalists and scholars rather than publishing the material themselves. In those circumstances, they will request that anyone publishing the data redact anything that is excessively sensitive and doesn’t serve the public interest, including personally identifiable information. However, if the organisation decides that revealing such private information would be in the public interest, they reserve the right to do so. They also intend to grant the journalists and academics they share data with the same freedom to publish their findings.

DDoSecrets further points out that, whether or not it obtains personally identifying information, cybercriminals who might use it in ransomware leaks are already searching those breaches. The bogeymen that everyone enjoys worrying about? best authors. “They already have the information.”

Best cites the instance of Perceptics, a company that makes technology for license-plate readers. Perceptics experienced a breach in the spring of last year, and as per tech news site the Register, a ransomware hacker likely released its files onto the black web. In order to demonstrate how Perceptics had lobbied Congress for Customs and Border Protection contracts and downplayed security and privacy issues with its tech—even as the delicate license-plate data it was collecting was left vulnerable to hackers—journalists at the Intercept dug through the leaked data.

We cannot afford to ignore important data that can educate the public about how various sectors function.

BEST, EMMA; DDoSecrets

DDoSecrets released their own explosive collection of breached documents in June of this year. The group received BlueLeaks, a sizable collection of law enforcement information, from a hacker affiliated with Anonymous. The DDoSecrets account was suspended by Twitter, and all tweets including links to its website were even blocked, as a result of the 269 GB collection of papers from 200 state and local police organisations. The r/blueleaks subreddit was blocked by Reddit. Shortly after, DDoSecrets suffered a huge setback from which it is still trying to recover when German prosecutors in the town of Zwickau ordered police to take a server belonging to the organisation that housed many of its files and the search engine for its data gathering. It now intends to store its data on Tor-protected.onion sites that conceal the physical location of servers, making future seizures much more challenging.

DDoSecrets is still committed to completing its bigger objective in spite of those obstacles. It has also tapped into a large new stream of leaks thanks to its new malware trove. According to Liska of Recorded Future, more than 1,000 ransomware victims had their data leaked onto dark web sites just last year. He calculates that the total amount of stolen data posted to numerous dark web sites during a single year of ransomware outbreaks is between 100 and 200 gigabytes.

Sign up for the Fast Forward newsletter to receive the latest news on everything from self-driving cars and artificial intelligence to newly launched enterprises and altered cities.
that email

Type in your email.

SUBMIT

By registering, you consent to our User Agreement, which includes the arbitration and class action waiver clauses, as well as our Privacy Policy & Cookie Statement. You also consent to receive communications from WIRED about marketing and your account. You are always free to unsubscribe.

According to Thomas Rid, a professor of strategic studies at Johns Hopkins University who wrote extensively about hack-and-leak operations in his book Active Measures, the ethics of searching through that deluge of leaked data for information of public interest is dependent on more than just whether the data was leaked by an insider or stolen by a hacker, or even the intentions of whoever might have stolen it. It would be significantly different from WikiLeaks’ widely criticized decision to release previously unpublished emails taken from the Democratic National Committee by Russia’s military intelligence agency in 2016 if the data had actually been made public by hackers prior to DDoSecrets obtaining it.

In an auto repair shop, the most popular car technicians’ tools are hung on a blue wall.
HIGH-TECH CARS: The Death of the Auto Repair Shop

MARCIAN AARIAN

smartphone Samsung Galaxy Note 20 Ultra lying on a white table against an orange background.
DAVID NIELD’s GEAR 19 Android Settings You May Not Know

The 12 Best Electric Bikes for All Types of Riding

DARRENNE SO

a person reading a book while curled up with a grey blanket on a grey couch
The 15 Books You Must Read This Fall, According to CULTURE WIRED’s Picks WIRED STAFF

ADVERTISEMENT DDoSecrets

But Rid points out that DDoSecrets’ decision to keep the data forever is more morally dubious because, in many situations, the material may only be accessible on a dark web site for a little period of time. When you are the sole source, Rid explains, “you are essentially the publisher at that point.” “These ethical edge scenarios must be acknowledged by Emma and their colleagues. They cannot simply act as though they are not in uncharted territory.”

Best claims that ignoring the existence of ransomware data merely permits hackers to take advantage of it, leaving its value as a source of newsworthy muckraking or other benefits to the general public. Terabytes of data are “inundating the dark web and being utilised almost exclusively by hackers and the kind of people security experts and commentators love to wring their hands over,” says Best. “But they’re virtually wholly unavailable to the public and to journalists.” Our main objective has always been to help and inform the people.

Continue Reading

Press Release

Paymentus to Acquire Payveris in $152.2 Million Deal

Published

on

By

cloudbased Paymentus payveris crowdfundinsider

A legally binding agreement has been struck by Paymentus, a provider cloudbased paymentus payveris crowdfundinsider cloud-based bill payment technology, to acquire Payveris, which also offers cloud-based bill payment services. $152.2 million is the purchase price, with roughly 56 percent being paid in cash and 44 percent being paid in Paymentus Class A common stock.

With real-time capabilities, improved electronic bill presentation, and more payment alternatives for banks, credit unions, and financial institutions of all sizes, the combination is anticipated to increase the addressable market opportunity for Paymentus’ current offerings.

The president and CEO of Paymentus, Dushyant Sharma, said, “We started our connection with Payveris as a multifaceted partnership and it immediately became evident that their technology and team are best-in-class and would be immensely additive to our platform and goal. “This purchase helps us give additional value to our billers, strategic partners, and financial institutions while also accelerating our potential to disrupt the old bill pay paradigm. We are eager for the Payveris team to join Paymentus’ rapidly expanding team.

Once the agreements are fulfilled, Paymentus will provide Payveris‘ bank and credit union clients access to the Instant Payment Network as well as its omni-channel bill presentation and payment platform to Payveris clients who service loans in order to modernize their loan payment operations. The Paymentus platform can be made available to business and commercial clients of Payveris’ bank and credit union clients so that they can present and pay bills.

The acquisition should benefit Payment us clients since their consumers will soon be able to view bills and make real-time payments at the more than 265 banks and credit unions that Payveris supports. By enabling better control, quicker payments, and greater transparency when paying bills and moving money from any account to any end point, the combination of Paymentus and Payveris will simplify money management for consumers.

“Paymentus is the ideal place for Payveris to live. A real-time payment network connecting customer accounts at their financial institutions and their billers is created when the companies’ highly complementary technologies are joined, according to Ron Bergamesca, CEO of Payveris. “This network will serve as the cornerstone for providing financial institutions with quick innovation in digital payments.”

Continue Reading

Trending

Copyright © 2021 fabulaes.com. Developed by Imran Javed Awan