Tag: data

  • Top 7 Must-Have Cyber Threat Intelligence Tools

    “Cyber Security is much more than the matter of IT” – Stephane Nappo

    With the increased internet usage, a large amount of personal and professional information and data is available online which is continuously under the threat of exposure. In the USA alone over 53 million individuals were affected due to data compromise in the first half of 2022.

    Source: Statista.com
    Source: Statista.com

    This threat has grown several folds with cyber crimes becoming incredibly sophisticated and the entire world shifting online, especially since 2020 amid the uncertainty and disruption of the global pandemic. As per a survey conducted by Statista, the average cost of data breaches worldwide from March 2020 to March 2022, combined in different sectors, is more than 150 million US dollars.

    Under these circumstances, cyber threat intelligence becomes an extremely valuable tool to protect, detect and respond to any cyber threat your data might be exposed to.

    In this blog, we will discuss in detail cyber threat intelligence and tools that can help you in protecting your data.

    What is Cyber Threat Intelligence?
    Cyber threat intelligence is the collection, processing, and analysis of data to discern the motive and behavior of a potential cyber attack and to help us make informed decisions and implement proactive security procedures. The cyber threat intelligence tools are designed to help us with the process.

    Threat intelligence is a cyclic, continuous process that is typically completed in 6 steps:

    1. Set goals and plan the direction
    2. Collection of data
    3. Processing of data
    4. Analysis of data
    5. Dissemination of data
    6. Report findings

    There are four types of cyber threat intelligence viz. strategic, tactical, technical, and organizational. Each one of these is meant for different users and describes the threat and its details in various depths as per the knowledge and requirement of the concerned user.

    Cyber Threat Intelligence Explained

    What Are Cyber Threat Intelligence Tools?

    Attackers today have learned and developed thousands of ways to breach data and wreak havoc. Also, with advanced technology and software involved, threats have grown more complex and crimes more sophisticated. Therefore, effective and timely detection of threats and strongly powerful retaliation are extremely important for protecting your data.

    Cyber threat intelligence tools are developed and designed to counter these issues. They provide up-to-date information about the latest threats such as malware, exploits, etc. These tools also provide information about the tactic, technology, and procedure (TTP) involved in a particular threat and suggest the best methods for protection against it. Further, these tools are capable of analyzing any potential or specific threat detected on a particular network.

    These tools are capable of managing the risk as well as enhancing your cyber security through artificial intelligence or machine learning. They give an organization the ability to plan preventive measures, detect threats, and resolve security issues.

    Key Features Your Cyber Threat Intelligence Tool Must Have

    As per a survey by Statista, the most useful type of cyber intelligence tool, as per the users, is the one that provides detailed information about the malware being used in the attack.

    Source: Statista.com
    Source: Statista.com

    Although the basic function of most cyber threat intelligence tools remains the same, there are certain key features that you must look for while choosing your CTI.

    Flexibility

    Any cyber threat intelligence tool that you choose must fit in with your already existing security mechanisms including Firewalls and SIEM (Security Information and Event Management).

    A threat intelligence tool processes data from various sources and provides risk scores. Therefore, it cannot act as a standalone tool. Combining it with other security systems enables prioritization, and proactive alerting, as well as adds circumstantial data for alerts that ease the investigation.

    Moreover, this flexibility of function would also let the tool collect accurate data from the dark web and other sources.

    Comprehensible

    A single-window dashboard simplifies the entire process of threat detection and remediation. Being comprehensive the tool collects information from every possible source and displays it together which also accelerates the decision-making process.

    Multiple Source Information

    To exactly analyze an organization’s position in terms of cyber security the tool must be able to extract information from as many sources as possible. Through this real-time indicators can be discovered that can help in forming accurate correlations.

    Alert Quality

    Several security alerts are often ignored owing to a large number of false positives. This causes alert fatigue amongst the security team who are unable to decipher the actual high-priority issues.

    A good threat intelligence tool should be able to prioritize and categorize the actual security alerts, which is only possible when it can correlate the data in the alert with the already available database. This would ensure that the important notifications do receive a response from the security team.

    Proactive Intelligence

    To manage and control security issues a cyber threat intelligence tool must be proactive. This means that the tool should be able to identify the threat and vulnerabilities before the commencement of the actual attack.

    A tool integrated with automated response processes helps in early detection and effective response to the threat.

    Top 7 Cyber Threat Intelligence Tools

    The right threat intelligence tool would help point out the potential issues and nip the problem in the bud. Based on the requirements of users as well as the opinions of the experts we have made a list of the top 7 cyber threat intelligence tools that will secure your system from cyber threats.

    Fortinet’s FortiRecon
    Recorded Future
    Cisco Security Malware Analytics
    Echosec
    IntSights External Threat Protection(ETP) Suite
    ThreatConnect
    ZeroFOX

    Fortinet’s FortiRecon

    Website Fortinet.com
    Rating 4.7
    Demo Provided Yes
    Used For External attack surface monitoring
    Fortinet's Fortirecon - Cyber Threat Intelligence Tool
    Fortinet’s Fortirecon – Cyber Threat Intelligence Tool

    As per Statista, Fortinet led the global threat intelligence software industry in 2022 with almost 39% of the total market share.

    Experts label Fortinet’s FortiRecon as one of the best cyber threat intelligence tools. It is a Digital Risk Protection Service product. Other than its outside-the-network view of the risk, it can also mitigate three additional risk areas viz. Digital assets risk, brand-related risks, and underground & imminent threats. It uses automation, machine learning as well as human intelligence to analyze the brand risk for an organization and deliver proactive custom intel.

    Key Features:

    • External Attack Surface Management
    • Adversary Central Intelligence
    • Extensive asset and exposure discovery
    • Comprehensive reporting

    Pros:

    • Easy to use
    • Contextualized threat insights
    • Early-stage lifecycle protection
    • Far-reaching threat sources
    • Comprehensive report

    Cons:

    • Not suitable for any non-MS domain device
    • Logging services do not include many details

    Pricing:

    Contact the vendor to get the quotes for Fortinet’s Fortirecon threat intelligence license.

    Recorded Future

    Website Recordedfuture.com
    Rating 4.6
    Demo Provided Yes
    Used For Providing coverage against adversaries, infrastructure, and targets
    Recorded Future - Cyber Threat Intelligence Tool
    Recorded Future – Cyber Threat Intelligence Tool

    It is headquartered in Boston cyber security platform. Recorded Future is widely recognized for its predictive or proactive cyber threat intelligence. It gives you real-time visibility into the vast digital ecosystem and automates the entire process of collection, analysis, and reporting. It provides coverage against adversaries, infrastructure, and targets.

    Key Features:

    • Manages risk landscape through a single-platform approach
    • Advance filters to narrow down your search
    • Powerful integration ability connects with both SIEM and SOAR providers
    • Graphical representation of worldwide threat data

    Pros:

    • A wide variety of threat intelligence is covered
    • Direct source evidence for effective decision making
    • Easy navigation owing to modular design
    • 10+ years of reference data updated regularly

    Cons:

    • Overwhelming search results
    • Comparatively expensive, starts at USD 10,000 for AWS

    Pricing:

    Contact Recorded Future to obtain the current pricing of the license.

    Cisco Security Malware Analytics

    Website Cisco.com
    Rating 4.4
    Demo Provided No
    Used For Providing contextual analytics for malware and threats
    Cisco Security Malware Analytics - Cyber Threat Intelligence Tool
    Cisco Security Malware Analytics – Cyber Threat Intelligence Tool

    Earlier recognized by the name threat grid, it is a cloud-based unified security solution. It generates alerts for malware activities and helps analyze the threat levels to draw strategies for tackling them. It provides end-to-end visibility and protection by leveraging threat intelligence.

    Key Features:

    • Contextual analytics for malware and threats
    • Huge malware knowledge base
    • Uses behavioral indicators to predict and prioritize attacks
    • Automation and integration abilities through APIs

    Pros:

    • Easy integration without reprogramming
    • Cross-product security data from Cisco and third-party sources
    • Thorough analysis and comprehensive reporting of threat
    • Automated sample upload through API integration

    Cons:

    • Frequent delays in the alert mechanism
    • Strenuous on-premise appliance setup

    Pricing:

    Contact the vendor to get the quotes for Cisco Security Malware Analytics license.

    Echosec

    Website Flashpoint.io/platform/echosec
    Rating 4.9
    Demo Provided 10 days free trial
    Used For Social media and open source intelligence (OSINT) gathering.
    Echosec - Cyber Threat Intelligence Tool
    Echosec – Cyber Threat Intelligence Tool

    It is a Canada-based company that specializes in Open Source Intelligence Tools (OSINT). Its flagship platform leverages data from social media, the dark web, as well as open community platforms. It collects real-time risk information and allows you to perform ad hoc dark web searches alongside internal threat monitoring.

    Key Features:

    • Pre-built data search filters with 24X7 monitoring.
    • An externally focused tool that connects with global security feeds, illicit forums, etc.
    • Directly feeds information to the co-security tools
    • Collects data from 18 social media platforms, news portals, and blogs

    Pros:

    • Simple and easy-to-use investigative tool
    • Makes investigation easy and provides actionable results quickly
    • Extraordinarily intuitive GUI

    Cons:

    • For any OSINT newbie, the learning curve can be steep
    • Occasional random results require human verification

    Pricing:

    Pricing information for Echosec is supplied by the software provider. Final cost negotiations to purchase Echosec must be conducted with the seller.

    IntSights External Threat Protection(ETP) Suite

    Website Intsights.com
    Rating 3.5
    Demo Provided Yes
    Used For Monitoring phishing attacks, malicious domains, and data breaches
    IntSights External Threat Protection - Cyber Threat Intelligence Tool
    IntSights External Threat Protection – Cyber Threat Intelligence Tool

    It is a 360-degree tool for cyber security that provides rich, real-time, actionable insights within 24 hours. It delivers enterprise-grade external, contextualized, and prioritized threat intelligence. It can be used either as separate modules for external intelligence, risk analysis, and threat investigation or as an end-to-end cyber threat intelligence tool.

    Key Features:

    • It collects data from the dark web, provides external threat feeds, and conducts custom research.
    • Well-built analytical report and automatic risk mitigation
    • Critical vulnerability patching
    • Comes with use-case-specific solutions or APIs for extensible integration capability.

    Pros:

    • Supports all major languages including Japanese, Portuguese, German, French, and others.
    • Focuses on external channels such as social media, black markets, etc.
    • Extremely flexible, adaptable, and comprehensive tool

    Cons:

    • Weak alerting mechanism
    • Steep learning curve

    Pricing:

    Pricing information for IntSights External Threat Protection is supplied by the software provider. Final cost negotiations to purchase IntSights External Threat Protection must be conducted with the seller.

    ThreatConnect

    Website Threatconnect.com
    Rating 4.5
    Demo Provided Yes
    Used For Dealing in threat intelligence, risk quantification, and intelligence-powered security operations
    ThreatConnect - Cyber Threat Intelligence Tool
    ThreatConnect – Cyber Threat Intelligence Tool

    It is a Romania-based company that deals in threat intelligence, risk quantification, and intelligence-powered security operations. It strengthens security and defense by breaking down complex data into actionable information. The information and data collected can be analyzed manually or with automation assistance.

    Key Features:

    • Uses Playbooks which are an intelligence-driven orchestration feature
    • Extensible integration and automation for all cybersecurity features
    • Intuitive dashboard with prioritized risks on the face of it
    • Show threat prevalence through crowdsourcing analytics

    Pros:

    • A powerful data model that establishes links between incidents, threats, and IOCs.
    • Proactive detection through the combination of orchestration and automation.
    • Updated information on the latest cyber threats and malware

    Intro to ThreatConnect

    Cons:

    • One of the most expensive threat intelligence tools
    • Not flexible enough to suit user requirements

    Pricing:

    Pricing information for ThreatConnect is supplied by the software provider. Final cost negotiations to purchase ThreatConnect must be conducted with the seller.

    ZeroFOX

    Website Zerofox.com
    Rating 4.3
    DemoProvided Yes
    Used For Monitoring the web for data leakage and ransomware
    Zerofox - Cyber Threat Intelligence Tool
    Zerofox – Cyber Threat Intelligence Tool

    It is a US-based company that provides cyber intelligence solutions. It safeguards an organization against online threats such as phishing, data leakage, impersonation, and others. It monitors the web for data leakage and ransomware and brings relevant data to the attention of the user.

    Key Features:

    • It is equipped with the latest AI, ML, and OCR technologies
    • Combines artificial intelligence with human intelligence to review and prioritize threats
    • Solely designed for external threat protection
    • Visual indicators on the dashboard offer absolute visibility

    Pros:

    • Hacker elimination through adversary disruption and takedown as a service
    • Huge integration library covering all popular IT tools
    • Streamlined workflow with a straightforward setup process

    Cons:

    • Overwhelming subdomain alerts
    • Generates a large number of false positives

    Pricing:

    Contact ZeroFOX to know about the price of the license.

    Conclusion

    Cyber threat intelligence tools play a crucial role in the growth of any business by protecting it from the commonest and biggest of threats. They identify, predict, alert, and manage cyber attacks. Also, with the number of cyber-attacks rising every year to a great degree and the world shifting online there is no alternative to these tools. However, with a large number of options available in the market, making a final choice can be hard.

    In this article, we shared with you the 7 best cyber threat intelligence tools to make your search convenient. Hope we could help.

    FAQs

    What is Cyber Threat Intelligence?

    Cyber Threat Intelligence is the process of gathering and analyzing information about cyber threats to protect an organization’s digital assets and infrastructure. It provides actionable intelligence to support cyber security strategies and enhance the ability to prevent, detect, and respond to cyber-attacks.

    What are the 3 types of cyber threats?

    • Malware
    • Phishing
    • DDoS (Distributed Denial of Service) Attacks

    What are the benefits of Crime Threat Intelligence tools?

    The benefits of using Cyber Threat Intelligence (CTI) tools are:

    • Improved threat awareness and detection
    • Enhanced incident response
    • Increased efficiency and cost savings
    • Compliance with regulatory requirements

    What is the most common cyber threat?

    The most common type of cyber threat is malware, including viruses, trojans, and ransomware.

  • How did Air India suffer a massive data breach and why should you be concerned about it?

    There has been a lot of recent incidents related to data breaches from different companies which include the top companies in and around the country. The most recent data breach was reported by the well-known airline of India, Air India. Let’s look at the information about the data breach faced by the airline.

    About the Air India Data breach
    What is SITA?
    Details of the Air India Data breach
    Steps taken by Air India after the Data Breach
    How does the Data breach Affects you?
    FAQ

    About the Air India Data breach

    Air India has conveyed that the data of millions of passengers have been compromised due to a cyber attack and it involves the personal data of the passengers registered between 26 August 2011 and 20 February 2021.

    The airline has announced that the data breach had taken place due to a breach from the SITA passenger service system and the data breach involved the information of around 45 lakh passengers.

    What is SITA?

    SITA is a technology based company which is located in Switzerland. The company specializes in information technology and air transport communications. The country that was started with a 11-member airline now has a customer base of 2,500 customers in more than 200 countries across the globe.

    Some of the services offered by the company include reservation systems, passenger processing, etc. In the year 2017 Air India had entered into a deal with SITA to enable the airlines to join Star Alliance by updating its IT infrastructure.


    Jet Airways Case Study | Jet Airways Bankruptcy and Possible Revival
    The Jet Airways case study is now so popular that it is mentioned in almostevery Business School’s curriculum due to the airline’s unimaginable debacle.Founder Naresh Goyal [https://startuptalky.com/naresh-goyal-jet-airways/] is beinginvestigated by the Enforcement Directorate (ED) and a large nu…


    Details of the Air India Data breach

    In the month of March, Air India had communicated that SITA had been under a cyberattack in the last week of February which led to the leakage of personal information of its passengers.

    The company in a statement had mentioned that the data of around 45 lakh passengers have been compromised due to the cyber attack from across the world. The personal data that were registered in between 26 August 2011 and 20 February 2011 have been compromised.

    The company has conveyed that the data that were breached during the cyber attack included the name, date of birth, contact details, passport information, ticket information, frequent flyer data and even the credit card information.

    Steps taken by Air India after the Data Breach

    The airlines have conveyed that it would launch an investigation into the incident. Other than this they have conveyed that, they have taken steps to secure the compromised servers, engaging certain external specialists of data security incidents, resetting passwords of its frequent flyer programme and contacting the credit card customers.

    Global Average Total cost of Data breach
    Global Average Total cost of Data breach

    Everything you Need to know about Facebook Data leak
    On 2 April 2021, around 533 million Facebook users data were leaked in a lowlevel hacking forum. The published information includes Phone numbers andpersonal data. The data was leaked online and uploaded for free in low levelhacking forums. The data breach was found by the co-founder and the Chi…


    How does the Data breach Affects you?

    This data breach would affect you as an individual only if you have used to airline services in between the mentioned dates. The important point is that the credit card information has also been compromised and it can be a threat to your credit card.

    However, Air India has assured its passengers that they were no evidence of any misuse of the compromised data, the airline has asked everyone to change the passwords of their confidential data which includes your credit card password and frequent flyer programme.

    FAQ

    What data got leaked in the Air India data breach?

    The personal data of around 45 lakh passengers were leaked, which includes name, date of birth, contact details, passport information, ticket information, frequent flyer data and even the credit card information.

    How did Air India faced a data breach?

    Air India announced that the data breach had taken place due to a breach from the SITA passenger service system.

    Who took over Air India?

    Tata Sons Ltd were the frontrunner in acquiring Air India.

    Conclusion

    Cyberattacks have been reported frequently by different companies and are posing a serious threat towards the privacy of individuals. The rise in digitalization across the globe has led to an increase in the cyber crimes and cyber attacks by the criminals.

  • How did Upstox suffer a data breach and What does it mean for the users

    Upstox is the leading discount broker in the country. Upstox was formerly known as RKSV technologies. Upstox is backed by some of the top investors in the country which include Tiger Global and Ratan Tata. The company has nearly 30 Lakh users making it the second-largest stockbroker in the country.

    Over the last few years, Upstox has increased its client base and ramped up its operations because of the easy availability of Smart Phones and cheap data prices. Recently Upstox had signed up with the Board of Cricket in India to be one of the sponsors of the Indian Premier League (IPL)

    The company has announced and passed on an alert to their customer of the data breach. Let’s look at the further details of the data breach.

    How Upstox suffered a Data breach
    Measures taken by Upstox
    Measures taken by Upstox for the customers
    Funds and Securities of the customers
    FAQ

    How Upstox suffered a Data breach

    Retail broking firm and one of the leading discount brokers of the country Upstox had alerted its customers that there has been a data breach in the company. They have told that details such as contact data and KYC details of the customers have been breached.

    A spokesman of the company through an email statement had said that the hackers’ group has put the sample of the data on the Dark Web. The spokesman of the company added on saying that for now, the company is not exactly sure about the certainty of the number of customers whose data has been exposed.

    It is estimated that around 25 lakhs of its customers KYC data and contact numbers have been gained access by the hackers. This incident has happened in the midst of data breaches in some of the leading domestic companies and global giants such as LinkedIn, Facebook and Mobikwik.

    Upstox Data breach
    Upstox Data breach

    Why Password manager is Essential for your Business in 2021
    Password Managers are considered to be essential even if it for your personaluse or a business. In the recent years with the increase of cyber crimes andvarious other cyber related activities, it is always wise to choose a passwordmanager for your business or an enterprise. Let’s look at some of …


    Measures taken by Upstox

    The company has said that they had received receipts of emails that claimed unauthorized access to their databases. In response to it, the company has appointed a leading international cyber-security firm that will investigate the possibilities of the data breach of KYC details of customers. They would investigate on the KYC data stored in third-party data warehouse systems.

    The spokesman of the company has added that as a proactive measure the company has taken steps to initiate multiple security enhancements which will particularly concentrate on the third-party warehouses.

    The company has also taken steps to increase real-time monitoring to 24/7 and adding an additional ring-fencing to its network said the spokesman of the company.

    He added that the company has ensured to restrict the access to the databases which has impacted in the breach. The company has also added multiple security enhancements at all third-party warehouses.

    Upstox has taken measures to speed up its bug bounty programme to encourage the ethical hackers to stress-test its systems and protocols. This is a step taken by the company where it makes ethical hackers to hack into their systems to understand the vulnerabilities and identify the problems in the safety of the company’s data. This activity will be undertaken from time to time in regular intervals.


    Can you Rely on a Password manager in 2021
    A password manager has a lot of benefits. It would help you in a lot of ways andthe doubt which you would have in your mind would be “Can I rely on a passwordmanager”. You can read the below article to get a clear understanding of whetherpassword managers are reliable or not. Security and Conven…


    Measures taken by Upstox for the customers

    The company has taken an abundant caution towards the security of the customers. The company has taken the initiative to provide a secured password reset through OTPs for all its customers. The company has said that they take the safety of customers very seriously.

    The CEO of the company Ravi Kumar has said that this time the company has strongly fortified its systems to the most highest standards to ensure higher safety.

    The company has always made the customers to use unique passwords that are strong. They have ensured that the customers would change their passwords in regular intervals and stressed on not to share their OTPs with anyone.

    The company has said that it has also taken steps to warn the customers about the online frauds and to double-check the legitimacy of the links and senders. They have asked the customers to keep a check on the OTPs they receive and the ones they have requested.

    Upstox has always asked its customers to report and alert the service providers if they notice such activities.


    Top 5 Technologies That Can Change The Future Of Cybersecurity
    Cybersecurity is at the tipping point entering 2021. Advances in AI and ML areaccelerating its technological progress. Technology which can take us forwardand empower us, can also show the flip side that is Cyber Crime. By creating cybersecurity systems that encourage diversity and value equality…


    Funds and Securities of the customers

    The spokesperson of Upstox has said that, the funds and securities of all Upstox customers are safe and have been protected by the company.

    Ravi Kumar who is the CEO and Co-founder of the company has also tweeted about it saying that funds and securities of the customers are protected and kept safe by the company.

    FAQ

    Is Upstox funded by Ratan Tata?

    Yes. Upstox is an online discount stock broker backed by funding from Mr. Ratan Tata. He held 1.33% stake in the company As of Jan 2020.

    Who is owner of Upstox?

    Founders of RKSV Securities (Changed to Upstox Later) are Ravi Kumar, Raghu Kumar and Shrinivas Viswanath are the owner of Upstox.

    Is Upstox SEBI registered?

    Yes, It is registered with the Securities & Exchange Board of India (SEBI) as a stock broker.

    Conclusion

    These are the steps taken by Upstox regarding their data breach.

  • Everything you Need to know about recent Facebook Data leak

    On 2 April 2021, around 533 million Facebook users data were leaked in a low level hacking forum. The published information includes Phone numbers and personal data. The data was leaked online and uploaded for free in low level hacking forums.

    The data breach was found by the co-founder and the Chief Technical Officer of Hudson Bay, Alon Gal. Hudson Bay is a cybersecurity firm. He found the cache of the leaked data online on 3 April 2021.

    Leaked data
    Previous Data Breach of Facebook
    Various possibilities to misuse the data
    Legal Solution in India
    FAQ

    Leaked data

    According to Alon Gal, all your details on Facebook which include your name, occupation, gender, marital status, relationship status, the date of joining on Facebook, the place where you work, the date of joining your occupation, your Facebook bio, etc. He said in some cases even your Email ids and Phone numbers would have been leaked on the internet.

    It is said that the exposed data includes the personal information of 533 million users across 106 countries. It is estimated that 36 million personal information has been leaked from the U.S, 11 million users personal information has been leaked from the U.K and around 6 million users personal information has been leaked from India, 8 million personal information from Brazil 3.8 million users personal information from Bangladesh, 1.2 million users personal information from Australia, etc.

    These are some of the major countries whose users data have been released on the internet.

    Previous Data Breach of Facebook

    This is not the first time the data from Facebook has been leaked on the internet. In the year 2019 the same data, the data of 419 million users was leaked. It was being sold on telegram an instant messaging platform by charging a fee of $20 per search.

    2019 Facebook Data Leak
    2019 Facebook Data Leak

    Similarly, the data was leaked in the month of June 2020 as well. Now the data has been leaked again and this time anyone who requires the data can access it for free from low level hacking forums. It is easily accessible to any individual who can misuse it.

    Alon Gal has said that he discovered the leaked data in the month of January 2021 for the first time. It was through an advertisement by a hacking forum of an automated bot. The automated bot could provide phone numbers for hundreds of millions of Facebook users in return for a particular amount of money.

    The Motherboard had reported on that bot’s existence during that point of time and also verified that the data was legitimate. He added that if you have a Facebook account then it is extremely likely that the phone number you used for your account was leaked online. Cyber researcher Dave Walker confirmed that Mark  Zuckerberg’s  data was also leaked that revealed that he uses its competitors Signal messaging app.



    Privacy Focused Messaging Apps you should use in 2021
    We all have private discussions, yeah, private! If it’s an embarrassing story, abureau gossip, or opening your emotions, and the last thing you expect issomeone to see or use your messages to serve your ads. You can leave anythingexposed unless you use an encrypted chat program. As per the most …


    Various possibilities to misuse the data

    The leaked data is easily accessible by anybody on the internet. It can be used on different individuals for various cybercrimes. The details can be used and exploited by advertisers to target their set of customers to push targeted advertisements.

    The data can also be used by hackers to perform hacking attempts or social media engineering attacks. In simple terms, they can use your data to hack your social media profiles. Even an individual with the basic level or underdeveloped data skill can use the leaked data to perform certain Cybercrimes.

    In the year 2018, it was said that the political firm called Cambridge Analytica had mined the data from 50 million Facebook profiles. The firm had mined and gathered the data and later used it to help the political candidate from across the globe to target their candidates and making them win the elections. This was also covered in a Netflix documentary – The Great Hack.

    2018 Facebook-Cambridge Analytica Scandal
    2018 Facebook-Cambridge Analytica Scandal

    This was revealed after the backdrop of the U.S presidential elections of 2016 and the referendum of Brexit.

    According to Alon Gal, the leaked data could provide valuable information to cybercriminals who use people’s information to scam them or impersonate them into handing over their login credentials.

    He also said that the huge information and the phone numbers which are leaked on the internet will lead certain bad actors to easily take advantage of the data.


    Startup News for the Week by StartupTalky| April 2021
    Startup Ecosystem has changed the outlook on business and enterprises, and hasimpacted our economy, budgets, and a lot more. Here we bring you fresh news onstartups their operations, budgets, and all the new technology they bring forth.This week’s startup headlines include funding and investment …


    India is yet to have a strict data protection regulatory bill. Several countries in the West have Data Protection Regulation. In India, a bill names the Personal Data Protection bill is yet to be passed in the Lok Sabha. It has been pending since 2019.

    The bill is said to contain certain provisions regarding to the breach of personal data. However, one can rely on sections 43A and 72A of the Information Technology Act of 2000. This article provides compensation in the case of improper disclosure of personal information.

    From a security point of view, there is nothing much Facebook can do about the data leak of the users since it is already leaked on the internet and it has affected the users said, Alon Gal.

    FAQ

    How did Facebook leak data?

    The recent data breach is believed to relate to a vulnerability which Facebook reportedly fixed in August of 2019. While the exact source of the data can’t be verified.

    How to check if your Facebook data was leaked?

    haveibeenpwned.com is a site developed by Australian web-security consultant Troy Hunt, where you can enter your phone number or email address and see the result.

    How does Facebook make money from data?

    Facebook  makes most of its money by serving ads on the social media and messaging platforms it owns — Facebook, Messenger, Instagram, and WhatsApp. Advertisers pay Facebook to make their ads visible to people.

    Conclusion

    Alon Gal added on saying that what Facebook could possibly do is notifying users, so that they could stay cautious on certain phishing schemes or frauds using their personal data.