Home Technology peripherals It Industry Personal data of more than 25,000 BBC employees leaked, official denies ransomware attack

Personal data of more than 25,000 BBC employees leaked, official denies ransomware attack

Jun 11, 2024 pm 12:55 PM
data breach information leakage BBC

超 2.5 万名 BBC 员工个人数据遭泄露,官方否认勒索软件攻击

News from this site on June 3, according to the British "Guardian" report, the details of more than 25,000 current and former BBC (British Broadcasting Corporation) employees were compromised due to a data breach. exposed, the BBC has launched an investigation. It is reported that the data breach involved sensitive information including names, birthdays, work records and salaries, covering more than 25,000 employees. The BBC has launched an investigation into this matter and taken appropriate measures to ensure the security of employees' personal information. The data breach is not yet clear

The company's pension scheme wrote to members last Wednesday local time to say their details had been stolen in a data security incident that the company was taking "extremely seriously" this event. A spokesman for the pension scheme said details of around 25,290 people were affected.

According to the BBC, no evidence was found to indicate that the incident was a ransomware attack. This site inquired and learned that the BBC has one of the largest occupational pension schemes in the UK, with more than 50,000 members.

In an email to those affected, the pension scheme did not explain how the breach occurred, saying only that private records were "copied from an online data storage service". The leaked data includes members' names, dates of birth and gender, home addresses, national insurance numbers and information indicating they are members of the BBC pension scheme.

The pension scheme said the breach did not include any banking details, financial information, phone numbers, email addresses, usernames or passwords, or any sensitive health information.

The latest news shows that the incident has been reported to the British privacy regulator, the Information Commissioner’s Office (ICO) and the Pensions Regulator. Catherine Claydon, chair of the BBC Pensions Trust, said in an email: "We are taking this incident very seriously and would like to reassure you that we and the BBC have taken immediate steps to assess and contain the incident."

The BBC also stated that there is currently no evidence that private information has been misused, but this is being monitored. It advised members to "remain vigilant for any activity that appears to be unusual".

The above is the detailed content of Personal data of more than 25,000 BBC employees leaked, official denies ransomware attack. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Roblox: Bubble Gum Simulator Infinity - How To Get And Use Royal Keys
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Nordhold: Fusion System, Explained
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Mandragora: Whispers Of The Witch Tree - How To Unlock The Grappling Hook
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

Java Tutorial
1672
14
PHP Tutorial
1277
29
C# Tutorial
1257
24
PHP data filtering: How to prevent information leakage PHP data filtering: How to prevent information leakage Jul 28, 2023 pm 11:33 PM

PHP Data Filtering: How to Prevent Information Leakage With the development of the Internet, we are increasingly dependent on online communication and information transfer. In this information age, security and privacy protection have become particularly important. Issues such as cyberattacks, data breaches and information theft are increasingly a cause for concern. For developers, how to prevent information leakage has become an important task. PHP is one of the most popular development languages, and many websites are developed based on PHP. In PHP development, data filtering and ensuring the security of information are very important. Book

A serious configuration error occurred in Zotac's server, leading to the leakage of user after-sales and other information A serious configuration error occurred in Zotac's server, leading to the leakage of user after-sales and other information Jul 11, 2024 pm 01:58 PM

This website reported on July 8 that according to the YouTube channel GamersNexus video, Zotac, a hardware brand well-known for its graphics cards, had previously experienced a serious server configuration error. This error led to information leakage in Zotac’s after-sales and other systems, involving ordinary consumers and corporate customers. GamersNexus stated that it could once directly search on Google for the information submitted by users when applying for RMA after-sales. After clicking, you can directly see the content that has not been encrypted by Zotac, including the name and address of the applicant and other sensitive information: ▲Source GamersNexus, below GamersNexus showed some leaked corporate orders in the video. The picture below shows that a customer purchased multiple Zotac RTX on January 10 this year.

PHP security protection: avoid sensitive data leakage PHP security protection: avoid sensitive data leakage Jun 24, 2023 am 10:04 AM

With the development of the Internet, people rely more and more on various websites and applications, and data security has become an increasingly important issue. PHP is a widely used server-side scripting language used to build dynamic web pages and applications, so PHP security is also an important topic. This article will introduce some common PHP security issues and provide solutions to help developers strengthen PHP security protection and avoid sensitive data leakage. SQL Injection Attack A SQL injection attack is a type of attack that exploits a web application

PHP secure coding practices: Prevent sensitive data leakage and theft PHP secure coding practices: Prevent sensitive data leakage and theft Jul 03, 2023 am 10:01 AM

As a widely used programming language, PHP is used by many developers to build various websites and web applications. However, due to the importance of security, the security of PHP coding has become an issue that cannot be ignored. In this article, we will explore the practical methods of secure coding in PHP, especially how to prevent the leakage and theft of sensitive data. First, let’s look at the issue of sensitive data leakage. Sensitive data usually includes users’ passwords, personally identifiable information, transaction records and other important information. If this information is exposed to unauthorized

Data Breach Vulnerabilities and Protection in Java Data Breach Vulnerabilities and Protection in Java Aug 09, 2023 pm 04:22 PM

Overview of Data Breach Vulnerabilities and Protection in Java: A data breach is the unauthorized or accidental exposure of sensitive data to unauthorized people or systems. In Java applications, data leakage vulnerabilities may lead to serious security issues, such as personal information leakage, account theft, etc. This article will introduce some common data leakage vulnerabilities and provide corresponding code examples to help readers understand how to protect Java applications. 1. Common data leakage vulnerabilities 1.1 Log leakage: Logs are important for diagnosing and debugging applications

Massive data leak! Microsoft AI team accidentally leaked more than 30,000 pieces of internal information Massive data leak! Microsoft AI team accidentally leaked more than 30,000 pieces of internal information Sep 19, 2023 pm 05:33 PM

According to a research report released on September 18 local time, Chinese cloud security startup WizResearch pointed out that Microsoft's artificial intelligence (AI) research team accidentally leaked a large amount of private data cache on GitHub. This situation is caused by a misconfigured SAS token. Microsoft's AI research team released open source training data on GitHub, but inadvertently exposed 38TB of other internal data, including disk backups of the personal computers of two Microsoft employees. The backups contained confidential information, private keys, passwords and more than 30,000 internal Microsoft Teams messages. Microsoft responded that day that it had revoked the SAS token and completed an internal investigation into the potential impact.

How artificial intelligence is revolutionizing cybersecurity: Preventing phishing attacks How artificial intelligence is revolutionizing cybersecurity: Preventing phishing attacks Sep 23, 2023 am 08:49 AM

In an era where technology dominates our daily lives, cyber threats are becoming increasingly sophisticated and dangerous. Phishing attacks, in particular, remain an ongoing threat, causing significant financial losses and data breaches to individuals and organizations. In response to this growing threat, artificial intelligence (AI) has become a powerful tool in preventing phishing attacks. Phishing attacks include the use of deception to trick individuals into revealing sensitive information such as login credentials, credit card numbers, or personal data. These attacks often come in the form of convincing emails, messages, or websites that impersonate legitimate entities, making it difficult for users to distinguish genuine communications from malicious communications. Here’s how artificial intelligence is revolutionizing cybersecurity by proactively detecting and thwarting phishing attempts. 1. Complex emails

Involving 30,000 pieces of internal information and 38TB of data! Microsoft AI team exposed to data leak Involving 30,000 pieces of internal information and 38TB of data! Microsoft AI team exposed to data leak Sep 22, 2023 am 09:49 AM

Wiz cloud security company discovered that more than 30,000 communication messages and a large number of files within Microsoft were leaked. Microsoft deleted the leaked data immediately after being alerted A team at cloud security company Wiz discovered that Microsoft's artificial intelligence research team accidentally exposed a large amount of data on the software development platform GitHub. Wiz said that these data were accidentally leaked when the AI ​​team released open source training data on GitHub. The Wiz blog post states that Microsoft lets users download AI models from a link, however, the link is misconfigured to grant permissions to the entire storage account and also grants the user full control instead of read-only permissions, meaning they can Delete and overwrite existing files. According to Wiz, the exposed data includes Microsoft

See all articles