Personal Data of Millions of Verizon Customers Leaked

On July 12, Verizon confirmed that customer numbers, names, and some PINs were all made available to the public due to a “security lapse”.

ZDNet was first to report that an Israeli-based company, NICE Systems, was the one responsible for the leak. Chris Vickery of UpGuard, a cybersecurity firm, brought the incident to light.

The UpGuard Cyber Risk Team is a unit devoted to discovering data exposures where they exist, helping to secure them moreover raising awareness about the issues of cyber risk driving data insecurity across the digital landscape.

If you are a Verizon customer who’s called the telecommunications company’s customer service within the last six months you may want to update your PIN or any other identifying information. With the information collected, hackers can impersonate you and take over your account as well as any sensitive information such as email, social media, and banking details.

But, how does something like this happen? According to CNN Tech, “the company made a security setting public, instead of private, on an Amazon S3 storage server.” This kind of technology is used to keep data in “the cloud”.

A Verizon representativeĀ told Buzzfeed this,

“Verizon is committed to the security and privacy of our customers. We regret the incident and apologize to our customers.”

Verizon, the nation’s largest wireless carrier, also told CNN Tech that, “No loss or theft of information occurred.” Regardless if this is true or not, you should update your security information NOW!

For more on cybersecurity, visit Spyfly.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s