Skip to main content

New LinkedIn data leak exposed details of 92% of users

New LinkedIn data leak exposed details of 92% of users. Professional networking platform LinkedIn has denied reports of a data breach that allegedly compromised the data of more than 700 million users.

“Our teams have investigated a set of alleged LinkedIn data that has been posted for sale. We want to be clear that this is not a data breach and no private LinkedIn member data was exposed,” the company said in a note posted on its website. Our initial investigation has found that this data was scraped from LinkedIn and other various websites and includes the same data reported earlier this year in our April 2021 scraping update.”

The data was obtained by a hacker who exploited the official LinkedIn API. The hacker is currently selling the information online and posted a sample of the data on June 22, containing the information of 1 million users. The leaked user data includes email address, full name, phone numbers, physical address, geolocation, user name, profile URL, gender, social media link and professional experience details.

For now, it doesn’t appear that login credentials or sensitive financial information are part of the leak. However, the data does include inferred salaries, and the obtained information could still pose a threat to users.

RestorePrivacy reports the hacker is on a popular dark web forum attempting to sell a database of 700 million LinkedIn records. The hacker published a free sample of one million records to entice potential buyers.

The team at RestorePrivacy analyzed and cross-checked data from the sample with publicly available data to determine that it is actually authentic. The team also found that much of the data is current. Much of the information was updated on user profiles as recently as 2020 or even 2021.

The hacker tells RestorePrivacy that he exploited the LinkedIn API to harvest data from the site. At the time of writing, the massive trove of LinkedIn records is still up for sale on the forum.

Popular posts from this blog

Signal Introduces Usernames for Encrypted Messaging: A Secure Way to Connect

Signal, the encrypted messaging service, is launching a new feature in the coming weeks: support for usernames. This beta feature allows users to establish unique usernames, enabling connections without divulging phone numbers. source: Signal Blog To create a username, navigate to your settings and select "Profile." Once you've chosen a unique username, generate a QR code or link to share with others. Recipients can connect by entering your username into the chat bar. Usernames can be changed at any time, though previous usernames may be claimed by others. Signal began testing usernames last fall. Unlike social media platforms, Signal usernames do not serve as logins or public handles. They offer a discreet means of communication without revealing personal phone numbers. While a phone number is required to register for Signal, sharing it is optional. Usernames remain private and do not appear on profiles or in chats unless shared explicitly. As Randall Sarafa, Signal'

Safeguarding Internet Privacy: Supreme Court of Canada Upholds Protection of IP Addresses

In a recent ruling, the Supreme Court of Canada affirmed the significance of privacy rights concerning internet addresses. The court declared that police cannot simply obtain a suspect’s IP address without a court order, emphasizing the expectation of privacy that Canadian residents hold for such information. The court's decision stemmed from a case in 2017 involving Calgary police investigating fraudulent online activities at a liquor store. Initially, police demanded IP addresses from a credit card processor, which eventually led to obtaining subscriber information from Telus. This information was pivotal in making arrests and securing convictions in multiple offenses. Despite previous convictions, the accused contested the legality of obtaining IP addresses without proper authorization. The Supreme Court, in a 5-4 decision, asserted that IP addresses carry a reasonable expectation of privacy, necessitating judicial approval before access. The ruling emphasizes that obtaining jud

AT&T Resets Millions of Customer Passcodes After Data Leak: What You Need to Know

AT&T recently confirmed a significant data breach affecting over 7.6 million current customers and 65 million former customers. The leaked information, which dates back to 2019 or earlier, includes personal details like names, addresses, phone numbers, and social security numbers. Fortunately, financial information and call history were not compromised. In response to the breach, AT&T has reset passcodes for affected customers. Passcodes, usually four-digit numbers, serve as an additional layer of security when accessing accounts. However, security experts warn that the encrypted passcodes leaked alongside customer information could be easily deciphered, posing a risk of unauthorized account access. Affected customers are advised to set up free fraud alerts with major credit bureaus and remain vigilant for any suspicious activity related to their accounts. AT&T is proactively reaching out to impacted customers via email or letter to inform them about the breach and the meas