LogBox, South African app for patients, which was developed to ensure safe information exchange between patients and doctors, was breached a month ago. An exposed database was found by a security researcher who saw thousands of account access tokens belonging to the app users. Such news is taking a sharper turn now as the POPIA has recently came into effect.
Patient COVID-19 results keep being sent to wrong addresses by mistake. NHS Orkney faces the third data breach which impacts patients’ privacy. Personal information on staff travelling were dispatched to a journalist, a local business received a number of test results which were not to be mailed there. Another letter has recently popped up in the mail box of a wrong patient.
Learn more about personal data protection
Delhi University might face consequences of a major privacy issue affecting data of each and every DU student. The official website of the university exposed admit cards of the students. The problem is in the gateway password which allows anyone to access records of all those studying at Delhi University college as each college has a single password. An exam roll number, name and this gateway password should be entered to read the student details, making it simple to read also the information about anyone in the college whose name you know as roll numbers are also available from the previous semester. Students’ addresses, phones, emails, course and student type details appeared to be easily accessible.The college code is also a weak spot in the DU security, it repeats the gateway password. Moreover, college codes of Delhi University are publicly available.
Telkomsel employee stole the personal data of a local celebrity – the telco is the state-owned company based in Indonesia. The staffer was working in the office in East Java. He could access the personal information of the company’s clients. The violator made a photo of the person’s data and posted it on Twitter. The accusations were brought under Electronic Information and Transaction (ITE) Law. Telkomsel detected unauthorised access, as Telkomsel’s Grapari office has limited rights to the company’s server, and the violator was an outsourced employee working there.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!