Tagged articles
8 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 22, 2026 · Information Security

Hacker Breaches ANTS Portal via IDOR, Proving Government Systems Vulnerable

An IDOR access‑control flaw allowed a hacker to infiltrate France’s ANTS portal, which issues IDs, passports and driver’s licences, exposing up to 19 million citizens’ personal data—including names, addresses, birth details and authentication credentials—as the attacker claimed the breach was merely to demonstrate governmental vulnerability.

ANTSFranceIDOR
0 likes · 2 min read
Hacker Breaches ANTS Portal via IDOR, Proving Government Systems Vulnerable
Java Architect Essentials
Java Architect Essentials
Dec 11, 2021 · Information Security

Protecting Mobile Privacy in the Big Data Era: Risks of Data Leakage and How to Stay Safe

In today's big‑data era, excessive stress leads many to seek relief through risky online activities, but unauthorized app permissions and visits to dubious sites can expose personal information, so users must stay vigilant, limit permissions, avoid harmful sites, and use security tools to protect their mobile privacy.

Big DataMobile Securitydata leakage
0 likes · 6 min read
Protecting Mobile Privacy in the Big Data Era: Risks of Data Leakage and How to Stay Safe
21CTO
21CTO
Aug 28, 2018 · Information Security

500 Million Hotel Records Exposed: How the Massive Data Leak Impacts Your Privacy

A recent dark‑web sale revealed that over 500 million records from dozens of Huazhu hotel brands—including personal IDs, booking details, and login credentials—were compromised, prompting urgent security advice and highlighting the growing risks of large‑scale data breaches.

cybercrimedata breachhotel security
0 likes · 6 min read
500 Million Hotel Records Exposed: How the Massive Data Leak Impacts Your Privacy
ITPUB
ITPUB
Dec 21, 2015 · Information Security

How to Shield Your Personal Data: Cold War Secrets and Modern Privacy Hacks

The article explores historical privacy tactics of the USSR and the United States, offers practical habits for protecting personal information online, explains how to detect leaked data using search engines and social‑media checks, and suggests strategies for mitigating exposure and crafting false identities.

identity protectioninformation securitypersonal data
0 likes · 6 min read
How to Shield Your Personal Data: Cold War Secrets and Modern Privacy Hacks