How data leaks can be avoided

July 2018 Editor's Choice, Information Security, News & Events, Security Services & Risk Management

The past few weeks have seen a number of high-profile data leaks and cybersecurity breaches. In addition to these, a collection of 2844 files containing passwords connected to 80 million email addresses has been discovered online. The latest cache of data was discovered on a hacking forum, where a poster was linked to an 8,8 GB zip file.

It contained almost 3000 files of usernames, email addresses, and plain text passwords. The files appeared to be named after the service the credentials were taken from. Amongst the data was a set of email addresses and plain text passwords that appeared to be from Dropbox. Information that Dropbox had been breached surfaced in 2016, with the company confirming the hack.

Websites listed in the reported data breach include Plex (plex.tv), Lord of the Rings Online (lotro.com), and MalwareBytes.org. The South African sites listed were:

• africanaffair.net

• bioafrica.net

• jozifm.co.za

• kgolagano-it.co.za

• khansmeat.co.za

• amarider.co.za

• beautysecrets.co.za

• crsolutions.co.za

• easterncapescubadiving.co.za

• engineeringnews.co.za

Simon Campbell-Young.
Simon Campbell-Young.

• saonline.co.za

• studentcommune.co.za

• videospot.co.za

• wickedimports.co.za

Simon Campbell-Young, CEO of MyCybercare, says that MyID (www.myidglobal.com) helps to remediate breaches of this nature. “MyID runs as a service, monitoring your ID number, email address, mobile number and credit card number for fraudulent usage or fraudulent input on the Web. The service sends users immediate real-time notifications, notifying the user where and when the data has been tracked. This service also advises on the required remediation action to be taken, in order to avoid or minimise damage,” he explains.

For more information, go to www.myidglobal.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...