Skip to main content

E3 Organizer Says It's Tightened Security After Accidentally Doxxing Thousands of Attendees

The Electronic Software Association is introducing tighter security measures around press registration for E3, following an incident last year in which sensitive personal information belonging to thousands of journalists, YouTube creators, and Twitch streamers was made public. The Verge reports: A new blog post published today details updates to the conference and its "media registration process," which the company says "received a lot of attention this past summer." "Earning back your trust and support is our top priority," the post reads. "That's why we rebuilt the E3 website with enhanced and layered security measures developed by an outside cybersecurity firm. This included updating our data management processes, including the handling of personally identifiable information, and we will no longer store that data on our site."

Changes to the registration process will also occur this year. The ESA will "collect the minimum information necessary" for attendees registering. The post doesn't state what those specific changes are. Last year's leak, which involved an unprotected file uploaded online and available for anyone to download, led to personal information like home addresses and phone numbers appearing on hateful forums like Kiwi Farms. After data leaked, multiple journalists -- including staff members of The Verge -- received texts and phone calls from complete strangers.



from Slashdot: News for nerds, stuff that matters https://ift.tt/38KQI2K
via IFTTT

Comments

Popular posts from this blog

An AI Epidemiologist Sent the First Warnings of the Wuhan Virus

An anonymous reader shares a report: On January 9, the World Health Organization notified the public of a flu-like outbreak in China: a cluster of pneumonia cases had been reported in Wuhan, possibly from vendors' exposure to live animals at the Huanan Seafood Market. The US Centers for Disease Control and Prevention had gotten the word out a few days earlier, on January 6. But a Canadian health monitoring platform had beaten them both to the punch, sending word of the outbreak to its customers on December 31 . BlueDot uses an AI-driven algorithm that scours foreign-language news reports, animal and plant disease networks, and official proclamations to give its clients advance warning to avoid danger zones like Wuhan. Speed matters during an outbreak, and tight-lipped Chinese officials do not have a good track record of sharing information about diseases, air pollution, or natural disasters. But public health officials at WHO and the CDC have to rely on these very same health of...

4 Trends that are Transforming the Future of Healthcare

4 Trends that are Transforming the Future of Healthcare Yoav Vilner / AI , Health , ReadWrite From drinking one’s own urine as a cure for broken bones to blood-letting to sending electrical shocks through a person’s body as a cure for mental illness — healthcare has a somewhat jaded past. Fortunately, as technology has improved our ability to study human physiology, medical professionals have become increasingly adept at diagnosing and curing […] from ReadWrite - The Blog of Things https://ift.tt/37qWAxu via IFTTT

New Web Service Can Notify Companies When Their Employees Get Phished

Starting today, companies across the world have a new free web service at their disposal that will automatically send out email notifications if one of their employees gets phished . From a report: The service is named " I Got Phished " and is managed by Abuse.ch, a non-profit organization known for its malware and cyber-crime tracking operations. Just like all other Abuse.ch services, I Got Phished will be free to use. Any company can sign-up via the I Got Phished website. Signing up only takes a few seconds. Subscribing for email notifications is done on a domain name basis, and companies don't have to expose a list of their employee email addresses to a third-party service. Once a company's security staff has subscribed to the service, I Got Phished will check its internal database for email addresses for the company's email domain. This database contains logs from phishing operations, with emails for phished victims. from Slashdot: News for nerds, stuff tha...