Friday, March 29, 2024

Uber to Pay $148 Million as a Settlement for Data Breach Cover

Uber Agreed to Pay $148 Million as a Settlement for 2016 Uber data breach which impacts 57 million Uber users around the world and 600,000 drivers names including their license numbers were stolen.

The breach took place in October 2016 and the leaked data includes names, email addresses and mobile phone numbers that related to Uber accounts.

The case was filed against Uber for violating Pennsylvania’s data breach notification law. More than 13,500 Pennsylvania Uber drivers were affected by the breach.

“Uber violated Pennsylvania law by failing to put our residents on timely notice of this data breach,” Attorney General Josh Shapiro said. Uber tried to hide the incident by paying to hacker instead of notifying to the customer about the incident.

“The Pennsylvania Attorney General’s case against Uber was settled as part of the national settlement announced today, which will require to pay $148 million to the 51 participating Attorneys General and Uber drivers.” reads the press release.

In addition to the settlement agreed to take precautions to protect any user data, strong password policies, to deploy overall data security policy, third-party to asses Uber’s data security efforts and to implement corporate integrity program.

Things Need to follow post-Data Breach

If you are a customer of an organization, that has suffered a data breach, you would need to know the steps to mitigate the effect of the data breach and do it quickly.

These steps will differ, based on the situation surrounding the breach and the vulnerability of the stolen information. Importantly, consider the current situation:

  • Verify that the breach has taken place, affecting your data
  • What kind of data breach has taken place?
  • Was your data or credentials affected in the data breach?
  • Has any data concerning your personal information been stolen, or is the breach more constrained?
  • Do you have proof that the cybercriminals have done anything with your personal data, such as used it to carry out identity theft?

Related Read

Cyber Attack Hits SHEIN Fashion Retailer, More Than Affected 6.42 Million Customers

Best ways to Lock Down the Highly Sensitive Data From the Massive Breaches

Hackers Uploaded 42M Record that Contains Email Address and Credit Card Data to Free Anonymous Hosting Service

Huge E-marketing Database that Contains 11 Million Sensitive Personal Records Exposed Online

Website

Latest articles

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government...

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to...

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles