Zomato reports data theft of 17 million users

May 18, 2017

New Delhi, May 18: Online restaurant guide and food ordering app Zomato today said about 17 million user records have been stolen from its database.Zomato

The stolen information contains user email addresses and 'hashed' passwords but no payment information or credit card data has been stolen/leaked, Zomato said in a blogpost on its website.

The startup's disclosure comes at a time when the world is grappling with the cyber attack by ransomware 'WannaCry', which has impacted IT networks in over 150 countries.

Zomato said the data theft was discovered recently by its security team, without indicating the exact time or if it was related to the 'WannaCry' ransomware attack.

"Our team is actively scanning all possible breach vectors and closing any gaps in our environment. So far, it looks like an internal (human) security breach - some employee's development account got compromised," it said.

Assuring its users that their credit card information on Zomato is fully secure, the company said "payment related information on Zomato is stored separately from this (stolen) data in a highly secure PCI Data Security Standard (DSS) compliant vault".

As a precaution, Zomato said it has reset passwords for all affected users and logged them out of its app and website and all of the user accounts were secure.

It, however, encouraged users to change password for any other services where they were using the same password.

Zomato said over 120 million users visit its site every month.

The company said it will be actively working to plug any more security gaps in its systems.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 24,2020

New Delhi, Jun 24: The Centre has made it mandatory for sellers to enter the 'Country of Origin' while registering all new products on government e-marketplace (GeM).

The e-marketplace is a special purpose vehicle (SPV) under the Ministry of Commerce and Industry which facilitates the entry of small local sellers in public procurement, while implementing 'Make in India' and MSE Purchase Preference Policies of the Centre.

Accordingly, the ministry said the move has been made to promote 'Make in India' and 'Atma Nirbhar Bharat'.

The provision has been enabled via the introduction of new features on GeM.

Besides the registration process, the new feature also reminds sellers who have already uploaded their products, to disclose their products' 'Country of Origin' details.

The ministry further said that failing to disclose the detail will lead to removal of the products from the e-marketplace.

"GeM has taken this significant step to promote 'Make in India' and 'Aatmanirbhar Bharat'," the ministry said in a statement.

"GeM has also enabled a provision for indication of the percentage of local content in products. With this new feature, now, the 'Country of Origin' as well as the local content percentage are visible in the marketplace for all items. More importantly, the 'Make in India' filter has now been enabled on the portal. Buyers can choose to buy only those products that meet the minimum 50 per cent local content criteria."

In case of bids, the ministry said that buyers can now reserve any bid for a "Class I Local suppliers. For those bids below Rs 200 crore, only Class I and Class II Local Suppliers are eligible to bid, with Class I supplier getting purchase preference".

In addition to this, the Department for Promotion of Industry and Internal Trade (DPIIT) has reportedly called for a meeting with all e-commerce companies such as Amazon and Flipkart to display the country of origin on the products sold on their platform, as well as the extent of value added in India.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 17,2020

Google on Monday announced it is gradually winding down its free public Wi-Fi Station programme currently available at over 400 railway stations in India, and will work with the Indian Railways and Railtel Corporation to help them with existing sites so they can remain useful resources for people.

Google launched its Station initiative in India in 2015 to bring fast, free public Wi-Fi to over 400 of the busiest railway stations in the country by mid-2020.

"We crossed that number by June 2018 and implemented Station in thousands of other locations around the country in partnership with telecommunications companies, ISPs and local authorities," Caesar Sengupta, Vice President, Payments and Next Billion Users, Google, said in a statement.

"Over time, partners in other countries asked for Station too and we responded accordingly. We're grateful for these partnerships, especially with the Indian Railways and the Government of India, that helped us serve millions of users over the last few years," he added.

According to Google, the decision to shut Station has been taken keeping the affordable mobile data plans and mobile connectivity in mind that is improving globally including in India.

"India, specifically now has among the cheapest mobile data per GB in the world, with mobile data prices having reduced by 95 per cent in the last 5 years, as per TRAI in 2019," said Sengupta.

The Indian users consume close to 10GB of data, each month, on average, according to reports.

"Our commitment to supporting the next billion users remains stronger than ever, from continuing our efforts to make the internet work for more people and building more relevant and helpful apps and services," Sengupta noted.

Global networking giant Cisco last year teamed up with Google to roll out free, high-speed public Wi-Fi access globally, starting with India.

The first pilot under the partnership was rolled out at 35 locations in Bengaluru.

Sengupta said that in addition to the changed context, the challenge of varying technical requirements and infrastructure among our partners across countries has also made it difficult for Station to scale and be sustainable, especially for our partners.

"And when we evaluate where we can truly make an impact in the future, we see greater need and bigger opportunities in building products and features tailored to work better for the next billion user markets," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.