Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:20 PM

Uber Takes Over 5 Months To Issue Breach Notification

50,000 Uber drives just being told now that their names and license numbers were exposed.

Uber, the service that allows users to hire cars or conduct ride shares via mobile app (which has banned in several cities), last Friday announced it had experienced a data breach that exposed the names and license numbers of approximately 50,000 current and former Uber drivers. In a statement, Uber's Managing Counsel of Data Privacy Katherine Tassi said that the company initially discovered the suspicious activity Sep. 17.  

Upon discovery, says Tassi, Uber immediately changed the access protocols for that database. After investigation, they determined that the database was accessed by an unauthorized party one time, May 13, 2014. No reports of misuse of this data have been reported yet, she says.

Uber is notifying its drivers and offering them one year of Experian's ProtectMyID credit alert service. The company has also filed a "John Doe" civil lawsuit -- used to subpoena ISPs, email providers, and other services that may contain identity information for an unknown fraudster. 

Mark Bower, vice-president of product management and solution architecture for Voltage Security believes that Uber might use PostgreSQL for their database, because an Uber job posting specifically requests experience with Postgre. Bower points out that Postgre has known problems regarding encryption key disclosure, and that the Uber breach underscores the need for better key management.

“It’s a bit like [having] a well-locked door but the keys left in the lock or under the mat nearby," says Bower. "Encryption keys should be isolated and separated from the database and independently controlled and monitored, otherwise they are prone to disclosure. Data should be protected at a field level using modern methods which avoid the need to decrypt data for applications to work. The less decryption needed, the less exposure of sensitive records during analytics, operations and lookups."

See Uber's full statement at http://blog.uber.com/2-27-15.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Kelly Sheridan, Staff Editor, Dark Reading,  8/22/2019
Capital One Breach: What Security Teams Can Do Now
Dr. Richard Gold, Head of Security Engineering at Digital Shadows,  8/23/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-08-23
The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect).
PUBLISHED: 2019-08-23
An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI.
PUBLISHED: 2019-08-23
Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods.
PUBLISHED: 2019-08-23
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this im...
PUBLISHED: 2019-08-23
The webtoffee "WordPress Users & WooCommerce Customers Import Export" plugin 1.3.0 for WordPress allows CSV injection in the user_url, display_name, first_name, and last_name columns in an exported CSV file created by the WF_CustomerImpExpCsv_Exporter class.