<html xmlns="http://www.w3.org/1999/xhtml" xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office"><head><!--[if gte mso 9]><xml><o:OfficeDocumentSettings><o:AllowPNG/><o:PixelsPerInch>96</o:PixelsPerInch></o:OfficeDocumentSettings></xml><![endif]--></head><body><div style="color:#000; background-color:#fff; font-family:garamond, new york, times, serif;font-size:16px"><div id="yui_3_16_0_ym19_1_1511895666215_114006" dir="ltr"><span style="color: rgb(68, 68, 68); font-family: Verdana, Geneva, sans-serif;" id="yui_3_16_0_ym19_1_1511895666215_114352"><i id="yui_3_16_0_ym19_1_1511895666215_114353">"Uber didn’t confirm the precise details of the hack, but, according to Bloomberg, two hackers found Uber’s login credentials to Amazon Web Services, a Cloud computing service, where the data was stored. The hackers then blackmailed Uber for $100,000 in exchange for deleting the data and keeping quiet. </i></span><span style="color: rgb(68, 68, 68); font-family: Verdana, Geneva, sans-serif;" id="yui_3_16_0_ym19_1_1511895666215_114354">But what did Uber think this would achieve? The organisation had no way of knowing whether the hackers would keep their word. The information hasn’t surfaced yet, but given that these are criminals who had the audacity to steal from and then blackmail a large company, there’s every chance that they either still have the information or have sold it on the dark web.</span><i style="color: rgb(68, 68, 68); font-family: Verdana, Geneva, sans-serif;" id="yui_3_16_0_ym19_1_1511895666215_114355"> "</i></div><div id="yui_3_16_0_ym19_1_1511895666215_114006" dir="ltr"><span style="color: rgb(68, 68, 68); font-family: Verdana, Geneva, sans-serif;"><br></span></div><div id="yui_3_16_0_ym19_1_1511895666215_114006" dir="ltr"><font face="Verdana, Geneva, sans-serif"><br></font></div><div id="yui_3_16_0_ym19_1_1511895666215_114006" dir="ltr"><font face="Verdana, Geneva, sans-serif" id="yui_3_16_0_ym19_1_1511895666215_114042">As the dark web grows and becomes bolder, while bigger players may boldly navigate such negotiations, though not desired, this is certainly a killer to small business and a tall demand for the small businesses that may not have (setup) such capabilities.</font></div><div id="yui_3_16_0_ym19_1_1511895666215_114006" dir="ltr"><span style="font-family: Verdana, Geneva, sans-serif;"><br></span></div><div id="yui_3_16_0_ym19_1_1511895666215_114006" dir="ltr"><span style="font-family: Verdana, Geneva, sans-serif;" id="yui_3_16_0_ym19_1_1511895666215_114192">Be blessed.</span></div><div id="yui_3_16_0_ym19_1_1511895666215_114006" dir="ltr"><span style="font-family: Verdana, Geneva, sans-serif;"><br></span></div><div id="yui_3_16_0_ym19_1_1511895666215_114006" dir="ltr"><span style="font-family: Verdana, Geneva, sans-serif;" id="yui_3_16_0_ym19_1_1511895666215_114056">Regards/Wangari</span></div><div></div><div id="yui_3_16_0_ym19_1_1511895666215_113903"> </div><div class="signature" id="yui_3_16_0_ym19_1_1511895666215_113777">---<br><font style="font-weight:bold;font-family:verdana, helvetica, sans-serif;" size="2" id="yui_3_16_0_ym19_1_1511895666215_114011"><span style="color:rgb(127, 0, 63);" id="yui_3_16_0_ym19_1_1511895666215_114010">Pray God Bless. 2013Wangari circa - </span><span style="color:rgb(127, 0, 63);">"Being of the Light, We are Restored Through Faith in Mind, Body and Spirit; We Manifest The Kingdom of God on Earth".</span></font><br></div><div class="signature" id="yui_3_16_0_ym19_1_1511895666215_113777"><font style="font-weight:bold;font-family:verdana, helvetica, sans-serif;" size="2"><span style="color:rgb(127, 0, 63);"><br></span></font></div><div class="signature" id="yui_3_16_0_ym19_1_1511895666215_113777"><font style="font-weight:bold;font-family:verdana, helvetica, sans-serif;" size="2"><span style="color:rgb(127, 0, 63);"><br></span></font></div><div class="signature" id="yui_3_16_0_ym19_1_1511895666215_113777" dir="ltr"><font style="" size="2" id="yui_3_16_0_ym19_1_1511895666215_113918"><font color="#7f003f" face="verdana, helvetica, sans-serif" id="yui_3_16_0_ym19_1_1511895666215_113914"><b id="yui_3_16_0_ym19_1_1511895666215_113915"><a href="https://www.itgovernance.co.uk/blog/uber-attempted-to-cover-up-a-data-breach-affecting-57-million-people/?utm_source=Email&utm_medium=Macro&utm_campaign=S01&utm_content=2017-11-29&kmi=wangarikabiru%40yahoo.co.uk" id="yui_3_16_0_ym19_1_1511895666215_113917" class="enhancr2_7ec0b3f7-d504-27a5-6192-c9d27c699757">Uber attempted to cover up a data breach affecting 57 million people</a></b></font><br></font></div><div><br></div><div id="enhancr2_7ec0b3f7-d504-27a5-6192-c9d27c699757" class="yahoo-link-enhancr-card ymail-preserve-class ymail-preserve-style" style="max-width:400px;font-family:'Helvetica Neue', Helvetica, Arial, sans-serif;" contenteditable="false" data-url="https://www.itgovernance.co.uk/blog/uber-attempted-to-cover-up-a-data-breach-affecting-57-million-people/?utm_source=Email&utm_medium=Macro&utm_campaign=S01&utm_content=2017-11-29&kmi=wangarikabiru%40yahoo.co.uk" data-type="yenhancr" data-category="article" data-embed-url="" data-size="medium" dir="ltr"> <a href="https://www.itgovernance.co.uk/blog/uber-attempted-to-cover-up-a-data-breach-affecting-57-million-people/?utm_source=Email&utm_medium=Macro&utm_campaign=S01&utm_content=2017-11-29&kmi=wangarikabiru%40yahoo.co.uk" style="text-decoration:none !important; color: #000 !important;" class="yahoo-enhancr-cardlink" target="_blank" rel="noreferrer" id="yui_3_16_0_ym19_1_1511895666215_113943"> <table class="card-wrapper yahoo-ignore-table" cellpadding="0" cellspacing="0" border="0" style="max-width:400px;" id="yui_3_16_0_ym19_1_1511895666215_113942"> <tbody id="yui_3_16_0_ym19_1_1511895666215_113941"><tr id="yui_3_16_0_ym19_1_1511895666215_113940"> <td width="400" id="yui_3_16_0_ym19_1_1511895666215_113939"> <table class="card yahoo-ignore-table" cellpadding="0" cellspacing="0" border="0" width="100%" style="max-width:400px;" id="yui_3_16_0_ym19_1_1511895666215_113938"> <tbody id="yui_3_16_0_ym19_1_1511895666215_113937"><tr id="yui_3_16_0_ym19_1_1511895666215_113936"> <td class="card-primary-image-cell" style="background:#000 url('https://s.yimg.com/vv//api/res/1.2/srwUw_r9WpHY7xBILwIlMg--~A/YXBwaWQ9bWFpbDtmaT1maWxsO2g9MjAwO3c9NDAw/https://www.itgovernance.co.uk/blog/wp-content/uploads/2017/11/app-2941689_960_7201-e1511428376429.jpg.cf.jpg') no-repeat center center;background-size:cover;height:200px;position:relative;" background="https://s.yimg.com/vv//api/res/1.2/srwUw_r9WpHY7xBILwIlMg--~A/YXBwaWQ9bWFpbDtmaT1maWxsO2g9MjAwO3c9NDAw/https://www.itgovernance.co.uk/blog/wp-content/uploads/2017/11/app-2941689_960_7201-e1511428376429.jpg.cf.jpg" bgcolor="#000000" valign="top" id="yui_3_16_0_ym19_1_1511895666215_113935"> <!--[if gte mso 9]><v:rect fill="true" stroke="false" style="width:400px;height:218px;position:absolute;top:0;left:0;"><v:fill type="frame" color="#000000" src="https://s.yimg.com/vv//api/res/1.2/srwUw_r9WpHY7xBILwIlMg--~A/YXBwaWQ9bWFpbDtmaT1maWxsO2g9MjAwO3c9NDAw/https://www.itgovernance.co.uk/blog/wp-content/uploads/2017/11/app-2941689_960_7201-e1511428376429.jpg.cf.jpg"/></v:rect><![endif]--> <table class="yahoo-ignore-table" cellpadding="0" cellspacing="0" border="0" valign="top" style="width:100%;" id="yui_3_16_0_ym19_1_1511895666215_113934"> <tbody id="yui_3_16_0_ym19_1_1511895666215_113933"><tr id="yui_3_16_0_ym19_1_1511895666215_113932"> <td style="background:transparent url('https://s.yimg.com/nq/storm/assets/enhancrV2/12/overlay-tile.png') repeat left top;height:200px;" background="https://s.yimg.com/nq/storm/assets/enhancrV2/12/overlay-tile.png" bgcolor="transparent" valign="top" id="yui_3_16_0_ym19_1_1511895666215_113931"> <!--[if gte mso 9]><v:rect fill="true" stroke="false" style="width:400px;height:218px;position:absolute;top:-18px;left:0;"><v:fill type="pattern" color="#000000" src="https://s.yimg.com/nq/storm/assets/enhancrV2/12/overlay-tile.png"/><v:textbox inset="0,0,20px,0"><![endif]--> <table class="yahoo-ignore-table" height="185" style="width:100%;height:185px;min-height:185px;" id="yui_3_16_0_ym19_1_1511895666215_113930"> <tbody id="yui_3_16_0_ym19_1_1511895666215_113929"><tr id="yui_3_16_0_ym19_1_1511895666215_113928"> <td class="card-richInfo2" style="text-align:left;text-align:left;padding:15px 0 0 15px;vertical-align:top;"> </td> <td class="card-actions" style="text-align:right;padding:15px 15px 0 0;vertical-align:top;" id="yui_3_16_0_ym19_1_1511895666215_113927"> <div class="card-share-container"></div> </td> </tr> </tbody></table> <!--[if gte mso 9]></v:textbox></v:rect><![endif]--> </td> </tr> </tbody></table> </td> </tr> <tr> <td> <table class="card-info yahoo-ignore-table" align="center" cellpadding="0" cellspacing="0" border="0" style="background:#fff;position:relative;z-index:2;width:95%;max-width:380px;border:1px solid #e0e4e9;border-bottom:3px solid #000000;margin-top:-40px;margin-left:auto;margin-right:auto;"> <tbody><tr> <td style="background-color:#ffffff;padding:16px 0 16px 12px;vertical-align:top;"> </td> <td style="vertical-align:middle;padding:16px 12px;width:99%;"> <h2 class="card-title" style="font-size: 16px; line-height:19px; margin:0 0 4px 0;font-family:'Helvetica Neue', Helvetica, Arial, sans-serif;word-break:break-word;">Uber attempted to cover up a data breach affecting 57 million people</h2> <div class="card-description" style="font-size:11px;line-height:15px;color:#999;word-break:break-word;">Uber paid criminal hackers $100,000 (£75,000) to delete personal data belonging to its customers and drivers, th...</div> </td> <td style="text-align:right;padding:16px 12px 16px 0;"> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </a></div><div id="yui_3_16_0_ym19_1_1511895666215_113965"><br></div><div class="signature" id="yui_3_16_0_ym19_1_1511895666215_113777"><font style="font-weight:bold;font-family:verdana, helvetica, sans-serif;" size="2"><span style="color:rgb(127, 0, 63);"><br></span></font></div><div class="signature" id="yui_3_16_0_ym19_1_1511895666215_113777"><header style="margin: 0px 0px 5px; padding: 0px; border: 0px; font-variant-numeric: inherit; font-stretch: inherit; line-height: inherit; font-family: Verdana, Geneva, sans-serif; vertical-align: baseline; float: left; width: 661.547px; position: relative; color: rgb(68, 68, 68);" id="yui_3_16_0_ym19_1_1511895666215_113841"><h1 itemprop="headline" style="margin-top: 0px; margin-bottom: 12px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: normal; font-stretch: inherit; font-size: 38px; line-height: 1.4; vertical-align: baseline; color: rgb(34, 34, 34); clear: both; float: left; width: 661.547px;" id="yui_3_16_0_ym19_1_1511895666215_113842">Uber attempted to cover up a data breach affecting 57 million people</h1><div style="margin: 0px; padding: 0px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline; color: rgb(170, 170, 170); float: left; clear: both; width: 661.547px;" id="yui_3_16_0_ym19_1_1511895666215_113843"><span style="margin: 0px 7px 0px 0px; padding: 0px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113844"><span style="margin: 0px; padding: 0px; border: 0px; font-variant: inherit; font-stretch: inherit; font-size: inherit; line-height: 1; font-family: FontAwesome; vertical-align: baseline; display: inline-block; -webkit-font-smoothing: antialiased;" id="yui_3_16_0_ym19_1_1511895666215_113845"></span> <span itemprop="author" style="margin: 0px 7px 0px 0px; padding: 0px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113846"><a rel="nofollow" href="https://www.itgovernance.co.uk/blog/author/lirwin/" title="Posts by Luke Irwin" style="border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline; text-decoration-line: none; color: rgb(119, 119, 119); transition: all 0.25s linear;" id="yui_3_16_0_ym19_1_1511895666215_113847" title-off="">Luke Irwin</a></span></span> <span style="margin: 0px 7px 0px 0px; padding: 0px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113848"><span style="margin: 0px; padding: 0px; border: 0px; font-variant: inherit; font-stretch: inherit; font-size: inherit; line-height: 1; font-family: FontAwesome; vertical-align: baseline; display: inline-block; -webkit-font-smoothing: antialiased;" id="yui_3_16_0_ym19_1_1511895666215_113849"></span> <span itemprop="datePublished" style="margin: 0px 7px 0px 0px; padding: 0px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113850">23rd November 2017</span></span></div></header><div style="margin: 0px; padding: 0px; border: 0px; font-variant-numeric: inherit; font-stretch: inherit; line-height: inherit; font-family: Verdana, Geneva, sans-serif; vertical-align: baseline; clear: both; float: left; width: 661.547px; color: rgb(68, 68, 68);" id="yui_3_16_0_ym19_1_1511895666215_113851"><div itemprop="articleBody" style="margin: 10px 0px 0px; padding: 0px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113852"><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113853">Uber paid criminal hackers $100,000 (£75,000) to delete personal data belonging to its customers and drivers, the company has confirmed.</div><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113854">The transport app company was breached in October 2016, and the criminals behind the hack offered to delete the data in exchange for money. Uber took the offer and ignored its legal requirement to disclose the breach, only admitting its error when <a href="https://www.bloomberg.com/news/articles/2017-11-21/uber-concealed-cyberattack-that-exposed-57-million-people-s-data" style="border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline; text-decoration-line: none; color: rgb(146, 152, 3); transition: all 0.25s linear;" id="yui_3_16_0_ym19_1_1511895666215_113855">Bloomberg uncovered the cover-up</a>.</div><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113856">The stolen data includes the names, email addresses and phone numbers of 50 million Uber customers, as well as the personal information of about 7 million drivers – 600,000 of whom also had their driver’s license numbers exposed. No Social Security numbers, payment card information, trip location details or other information was taken, Uber said.</div><h3 style="margin-top: 0px; margin-bottom: 12px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: normal; font-stretch: inherit; font-size: 22px; line-height: 1.4; vertical-align: baseline; color: rgb(34, 34, 34);" id="yui_3_16_0_ym19_1_1511895666215_113857"><strong style="margin: 0px; padding: 0px; border: 0px; font-style: inherit; font-variant: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113858">Cynical</strong></h3><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113859">Data breaches are often accompanied by embarrassing stories about how the situation was mismanaged. Organisations sometimes take years to disclose an incident, and other times they deny being breached at all, but Uber has managed to combine both of those blunders in a spectacularly cynical cover-up.</div><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113860">Uber didn’t confirm the precise details of the hack, but, according to Bloomberg, two hackers found Uber’s login credentials to Amazon Web Services, a Cloud computing service, where the data was stored. The hackers then blackmailed Uber for $100,000 in exchange for deleting the data and keeping quiet.</div><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113861">But what did Uber think this would achieve? The organisation had no way of knowing whether the hackers would keep their word. The information hasn’t surfaced yet, but given that these are criminals who had the audacity to steal from and then blackmail a large company, there’s every chance that they either still have the information or have sold it on the dark web.</div><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113862">Regardless, any unauthorised access to or destruction of information is considered a breach. Paying the blackmailers only served to protect the company’s reputation at the expense of the affected individuals, whose information remains categorically breached.</div><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113863">At the time of the breach, Uber was under investigation for separate claims of privacy violations, which probably affected its decision-making. But these are not the only controversies it has been involved in. Since it was founded in 2009, Uber has faced four other criminal probes, which have looked into possible bribes, illicit software, questionable pricing schemes and theft of a competitor’s intellectual property.</div><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113864">Uber also faces dozens of civil lawsuits, with London among several cities to have taken steps to ban the organisation’s service.</div><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113865">Uber clearly didn’t want to add a data breach to its list of problems, but the public’s response to this story has rightly focused on the cover-up more than the breach itself. Data breaches are inevitable, so all you can ask organisations to do is identify them promptly and respond responsibly.</div><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" id="yui_3_16_0_ym19_1_1511895666215_113866">Speaking to Bloomberg, Dara Khosrowshahi, who took over as chief executive officer of Uber in September, commented: “None of this should have happened, and I will not make excuses for it.”</div><div style="margin-bottom: 20px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: inherit; font-family: inherit; vertical-align: baseline;" dir="ltr" id="yui_3_16_0_ym19_1_1511895666215_113867">He added: “We are changing the way we do business.”</div></div></div></div></div></body></html>