Uber Agreed to Pay $148 Million as a Settlement for 2016 Uber data breach which impacts 57 million Uber users around the world and 600,000 drivers names including their license numbers were stolen.
The breach took place in October 2016 and the leaked data includes names, email addresses and mobile phone numbers that related to Uber accounts.
The case was filed against Uber for violating Pennsylvania’s data breach notification law. More than 13,500 Pennsylvania Uber drivers were affected by the breach.
“Uber violated Pennsylvania law by failing to put our residents on timely notice of this data breach,” Attorney General Josh Shapiro said. Uber tried to hide the incident by paying to hacker instead of notifying to the customer about the incident.
“The Pennsylvania Attorney General’s case against Uber was settled as part of the national settlement announced today, which will require to pay $148 million to the 51 participating Attorneys General and Uber drivers.” reads the press release.
In addition to the settlement agreed to take precautions to protect any user data, strong password policies, to deploy overall data security policy, third-party to asses Uber’s data security efforts and to implement corporate integrity program.
If you are a customer of an organization, that has suffered a data breach, you would need to know the steps to mitigate the effect of the data breach and do it quickly.
These steps will differ, based on the situation surrounding the breach and the vulnerability of the stolen information. Importantly, consider the current situation:
Cyber Attack Hits SHEIN Fashion Retailer, More Than Affected 6.42 Million Customers
Best ways to Lock Down the Highly Sensitive Data From the Massive Breaches
Huge E-marketing Database that Contains 11 Million Sensitive Personal Records Exposed Online
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…
Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…
Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…
Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…
Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…