Zomato reports data theft of 17 million users

May 18, 2017

New Delhi, May 18: Online restaurant guide and food ordering app Zomato today said about 17 million user records have been stolen from its database.Zomato

The stolen information contains user email addresses and 'hashed' passwords but no payment information or credit card data has been stolen/leaked, Zomato said in a blogpost on its website.

The startup's disclosure comes at a time when the world is grappling with the cyber attack by ransomware 'WannaCry', which has impacted IT networks in over 150 countries.

Zomato said the data theft was discovered recently by its security team, without indicating the exact time or if it was related to the 'WannaCry' ransomware attack.

"Our team is actively scanning all possible breach vectors and closing any gaps in our environment. So far, it looks like an internal (human) security breach - some employee's development account got compromised," it said.

Assuring its users that their credit card information on Zomato is fully secure, the company said "payment related information on Zomato is stored separately from this (stolen) data in a highly secure PCI Data Security Standard (DSS) compliant vault".

As a precaution, Zomato said it has reset passwords for all affected users and logged them out of its app and website and all of the user accounts were secure.

It, however, encouraged users to change password for any other services where they were using the same password.

Zomato said over 120 million users visit its site every month.

The company said it will be actively working to plug any more security gaps in its systems.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 9,2020

New Zealand's research institute in Antarctica is scaling back the number of projects planned for the upcoming season, in an effort to keep the continent free of coronavirus, it was reported on Tuesday.

The government agency, Antarctica New Zealand, told the BBC on Tuesday that it was dropping 23 of the 36 research projects.

Only long-term science monitoring, essential operational activity and planned maintenance will go ahead.

The upcoming research season runs from October to March.

"As COVID-19 sweeps the planet, only one continent remains untouched and (we) are focused on keeping it that way," Antarctica New Zealand told the BBC.

The organisation's chief executive Sarah Williamson said the travel limits and a strict managed isolation plan were the key factors for keeping Scott Base - New Zealand's research facility - virus free.

"Antarctica New Zealand is committed to maintaining and enhancing the quality of New Zealand's Antarctic scientific research. However, current circumstances dictate that our ability to support science is extremely limited this season" she said.

Earlier in April, Australia announced that it would scale back its activity in the 2020-21 summer season.

This included decreasing operational capacity and delaying work on some major projects.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 25,2020

In a study conducted in 117 countries, researchers have found that the world is experiencing the most dramatic reduction in the seismic noise (the hum of vibrations in the planet's crust) in recorded history due to global COVID-19 lockdowns.

Measured by instruments called seismometers, seismic noise is caused by vibrations within the Earth, which travel like waves and the waves can be triggered by earthquakes, volcanoes, and bombs - but also by daily human activity like travel and industry.

This quiet period was likely caused by the total global effect of social distancing measures, closure of services and industry, and drops in tourism and travel, the study published in the journal Science, reported.

The new research, led by the Royal Observatory of Belgium and five other institutions around the world including Imperial College London (ICL), showed that the dampening of 'seismic noise' caused by humans was more pronounced in more densely populated areas.

"Our study uniquely highlights just how much human activities impact the solid Earth, and could let us see more clearly than ever what differentiates human and natural noise," said study co-author Stephen Hicks from ICL in the UK.

For the findings, the research team looked at seismic data from a global network of 268 seismic stations in 117 countries and found significant noise reductions compared to before any lockdown at 185 of those stations.

Researchers tracked the 'wave' of quietening between March and May as worldwide lockdown measures took hold.

The largest drops in vibrations were seen in the most densely populated areas, like Singapore and New York City, but drops were also seen in remote areas like Germany's the Black Forest and Rundu in Namibia.

Citizen-owned seismometers, which tend to measure more localised noise, noted large drops around universities and schools around Cornwall, UK and Boston, US - a drop in noise 20 per cent larger than seen during school holidays.

The findings showed that countries like Barbados, where lockdown coincided with the tourist season, saw a 50 per cent decrease in noise.

"The changes have also given us the opportunity to listen in to the Earth's natural vibrations without the distortions of human input," the study authors wrote.

Earlier in April, a study published in the journal Nature, reported at least a 30 per cent reduction in that amount of ambient human noise since lockdown began in Belgium.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.