

Federal law enforcement agencies have also been notified.

Once alerted to the open database, on Monday, Whisper restricted access and plugged the authentication security gap. The location information included coordinates from the last post a user has submitted, "which pointed back to specific schools, workplaces, and residential neighborhoods," according to the publication.ĬNET: Clearview AI facial recognition app maker sued by Vermont While the records did not include user names, it included nicknames, stated ages, ethnicities, genders, hometowns, group memberships - some of which are sexual in nature - and location data tied to posts.

Independent researchers Matthew Porter and Dan Ehrlich came across the data treasure trove, which contained approximately 900 million records spanning back from the app's launch in 2012 to the present day. See also: Chinese hackers use decade-old Bisonal Trojan in cyberespionage campaigns The inadvertent data exposure was caused by an open database with no credentials or password protection in place, as reported by the Washington Post. Hit by ransomware? Don't make this first obvious mistake.Bosses are reluctant to spend money on cybersecurity.The best VPNs for small and home-based businesses in 2021.Log4j zero-day flaw: What you need to know and how to protect yourself.
