DATA LEAK

How our sensitive data ends up in the wrong hands

Introduction

A data leak is the unauthorised disclosure of sensitive data caused by vulnerabilities in systems. It can occur via the internet, email or storage devices such as USB sticks and hard drives, and affects both individuals and businesses. Criminals can use this information to carry out further data theft.
The causes include human error, malware, third-party breaches, phishing, weak passwords, or insiders leaking data. One of the most well-known cases is that of Yahoo in 2010, in which millions of records were exposed due to weak, unencrypted security systems.
There are also less obvious cases, such as that of Polar Fitness in 2018, where a public feature allowed users to be identified, along with their places of residence or work, via a map of sporting activities.
UNUSUAL ACCOUNT
BEHAVIOR

Appearance of unusual pop-ups or more apps installed than normal.

NON-WORKING
PASSWORDS

Receiving password reset notifications or login alerts on new devices.

UNUSUAL EMAILS
OR MESSAGES

Receiving emails and calls that impersonate real accounts or people.

If you fall victim to a data leak, there are several signs that may indicate a data breach. By gaining access to sensitive information such as email addresses, passwords and usernames, criminals can access the victim’s accounts and take control of them.
Among the most common signs are unusual behaviour in computers or applications, such as suspicious pop-ups or the presence of apps that haven’t been installed. You may also receive login notifications from unknown devices or unsolicited password reset emails. In the most serious cases, the account may become inaccessible because the credentials have been changed.
Following a data breach, email addresses and telephone numbers may also be used for fraudulent activities. Criminals may send messages or emails that appear to be legitimate communications, or make deceptive calls targeting both the victim and their contacts.
Let’s defend humanity
in the digital age

We are building collaborative and innovative approaches to
protect those in need

/ CYBER NEWS

Articles & Blog

Scroll to Top