Concept explainers
CASE STUDY #1: Uber Announces New Data Breach Affecting 57 Million Riders and Drivers
Ridesharing company Uber Technologies, Inc. has disclosed that hackers have stolen the personal information of about 57 million customers and drivers, according to a report by Bloomberg News. The news outlet also reported that Uber discovered the data breach in late 2016 and then waited to disclose the news almost a year later.
What was stolen?
Chief Executive Officer Dara Khosrowshahi states in a press release on Uber’s website that the stolen
information included the following:
• The names and driver’s license numbers of around 600,000 drivers in the United States were stolen.
It is important to note that the driver’s license numbers affect the drivers working for Uber and not
their ridesharing customers.
• Aside from the driver’s license numbers, other personal information of all 57 million Uber riders and drivers around the world was compromised: names, e-mail addresses, and mobile phone numbers.
• According to the company’s statement: “Our outside forensics experts have not seen any indication
that trip location history, credit card numbers, bank account numbers, Social Security numbers or
dates of birth were downloaded.”
Uber rider or driver?
For Uber riders, the company says it doesn’t believe affected individuals need to take action. “We have seen no evidence of fraud or misuse tied to the incident,” its statement to riders said. “We are monitoring the Affected accounts and have flagged them for additional fraud protection.”Uber has stated that it’s notifying affected drivers whose driver’s license numbers were accessed and areproviding them with free credit monitoring and identity theft protection service. The company is providing additional information for its drivers on its website.
How did the Uber breach happen?
Uber said two (2) people who didn’t work for the company accessed the data on a third-party cloud-based service that Uber uses. The company also said that outside forensics experts had not seen evidence that the hackers accessed other types of information.
Study Questions:
A. What is the write-up all about? What technology-related issue/s is/are apparent?
B. What possible impacts or problems may arise in conjunction with the data breach?
C. How can Uber Technologies, Inc. and other similar businesses prevent such from happening again? What measures can you recommend?
D. Considering this scenario, would you consider technological developments as advantageous? Why or why not? Justify your responses.
Trending nowThis is a popular solution!
Step by stepSolved in 5 steps
- Describe the events leading up to and including the data breach that has been much in the news lately.arrow_forwardCASE STUDY #1: Uber Announces New Data Breach Affecting 57 Million Riders and Driversd Ride sharing company Uber Technologies, Inc. has disclosed that hackers have stolen the personal information of about 57 million customers and drivers, according to a report by Bloomberg News. The news outlet also reported that Uber discovered the data breach in late 2016 and then waited to disclose the news almost a year later chief Executive Officer Dara Khosrowshahi states in a press release on Uber’s website that the stolen inforrmation included the following: • The names and driver’s license numbers of around 600,000 drivers in the United States were stolen. It is important to note that the driver’s license numbers affect the drivers working for Uber and not their ridesharing customers. • Aside from the driver’s license numbers, other personal information of all 57 million Uber riders and drivers around the world was compromised: names, e-mail addresses, and mobile phone numbers. • According…arrow_forwardHow has the data breach impacted cloud security? What are some potential solutions that may be put into place?arrow_forward
- Data Security is considered a senior Management concern and responsibility. It affects every company’s operation, reputation and ultimately impacts revenue, profits, and a competitive edge. Yet many companies do not implement defenses that could help to prevent and control data breaches. In June 2012 LinkedIn a business social network site was hacked, this data breach was discovered when IT security experts discovered millions of LinkedIn passwords on a Russian underground site. The reason this happened was that the company was using outdated encryption methods and within 2 days, most passwords were cracked. What steps can a business take to keep control of its data security? What security management processes and activities in each process should a business follow to ensure they have an Information Technology Risk management strategy in place?arrow_forwardWhy did a data breach happen because Facebook and Cambridge Analytica worked together?arrow_forwardDescribe the events leading up to and including the recent data breach that made headlines.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education