Research

Clean, precise, well-informed

 

Working with primary sources to create engaging informational content

IT Blog Post: Data Leaks

 

No one is perfectly safe from user data leaks in the 21st century. Security breaches make the headlines often enough to raise questions regarding the consequences for users and companies affected by them.

 

One of the most recent big user data leaks happened in March of this year at TransUnion. The largest credit bureau in South Africa that maintains both consumer and business data,[1] says at least 3 million South Africans were impacted by this user data leak. A Brazilian group going by the name of N4ughtySecTU took responsibility for this attack, claiming that someone at TransUnion was negligent enough to set the system password to – you guessed it – “password”.[2]

 

Whether that was the case or not, the consequences for the users whose data got leaked can vary from rather harmless spam emails (in case the information gets sold to the ad databases) to the users’ information popping up on the dark web market, known for its illegal activity. It could also result in phishing, when the criminals will try to use the leaked user data to steal financial details, such as banking info, and gain access to their money that way.[3]

 

Sometimes, however, like in the case of TransUnion, the hackers do it for cyber extortion: the hackers will blackmail the company for money in exchange for the data being returned to the company. This is a very common strategy and companies have to deal with major profit losses due to that. N4ughtySecTU, for example, demanded $15 million in exchange for a guarantee that they would not publish the records.[4] And a similar case allegedly happened to T-Mobile in August 2021, when it confirmed that the personal data of more than 54 million of its users got compromised by hackers.[5]

 

In order to protect the company’s reputation from the extensive damage it is likely to suffer due to a user data leak,[6] it will often pair up with a security company. T-Mobile, for example, chose the cybersecurity firm Mandiant to prove to its customers that the mistake was acknowledged and that work to prevent it from happening again is getting done.[7]

Academic Essays with Bibliographies

  • Sports and Politics in Art

    What do baseball, art and politics have in common?

  • Love Story of Mars and Venus

    Using objects, colours, and composition along with other techniques, Sandro Botticelli created a painting based on a mythological love story of Mars and Venus to celebrate the expectations of love and fertility in a union between two influential families of Florence

  • Symbols in The Handmaid's Tale

    Literary analysis: Symbols used in The Handmaid's Tale and their meaning

  • Orwell Analysis

    In the book Animal Farm, George Orwell has borrowed ideas from the Moral Code of the Builder of Communism and the Internationale song in order to emphasize the connection between his book and the Soviet regime.