Tag Archive for: Ashley

How to check if you were victim of massive online data breach from likes of LinkedIn and Ashley Madison – Metro


Metro

How to check if you were victim of massive online data breach from likes of LinkedIn and Ashley Madison
Metro
If you have ever been signed up to a website that has been the victim of a massive online security breach, then you might find this very useful. In recent months data stolen in huge breaches, from the likes of LinkedIn and Ashley Madison, has been
How to check if your LinkedIn account was hackedWired.co.uk
LinkedIn is Latest Contributor to Breach FatigueThreatpost
Do This Now to Protect Your LinkedIn AccountFortune
Tom’s Guide –Chicago Tribune –Business 2 Community
all 15 news articles »

“data breach” – Google News

Want to sue Ashley Madison over data breach? You must use your real name – Ars Technica

Want to sue Ashley Madison over data breach? You must use your real name
Ars Technica
We all remember last year's hype surrounding the Ashley Madison dating site's data breach. Hackers exposed identifying information about millions of users of the site that has the tagline, "Life is short. Have an affair." Then came the lawyers smelling

“data breach” – Google News

Ashley Madison hauled to court in class action suits over data breach

Legal pressure on Ashley Madison and its parent company is picking up with more class-action lawsuits filed this week in the U.S. against the extramarital hookup site, alleging its negligence in protecting confidential user data.

Suits filed in federal courts in California and Texas by people using John Doe as a pseudonym, claim for damages, alleging that Avid Life Media, the parent company based in Toronto, did not have adequate and reasonable measures to secure the data of users from being compromised, and failed to notify users in time of the breach.

Avid Life Media said it had been made aware of an attack on its systems. Hacker group, Impact Team, released data last week that it claimed it had obtained from the website.

To read this article in full or to leave a comment, please click here

Network World Security