But rare are these times.

Most often, we need days of investigation before we understand whats at stake or whos leaking the data.

Understanding a breach and its potential impact takes careful attention and time.

Report: Web Browser for Developers Leaves User Data Exposed

We work hard to publish accurate and trustworthy reports, ensuring everybody who reads them understands their seriousness.

Some affected parties deny the facts, disregarding our research or playing down its impact.

So, we need to be thorough and double-check everything we find is correct and true.

Article image

First of all, and most obviously, thatBlisk was not keeping the data secure in any way.

Secondly,the nature in which it was collecting the data.

Its like a burglar looking for an easy way into a house.

Article image

Of course, hackers can also sell the data theyve gathered on the dark web.

To learn more data vulnerabilities in general, read ourcomplete guide to online privacy.

Every one of these gaps is then meticulously probed for potential data leakage.

Article image

If possible, we will also alert those affected by the breach.

Our team was able to access this database because it was completely unsecured and unencrypted.

The company was using an Elasticsearch database, which is ordinarily not designed for URL use.

Article image

The purpose of this web mapping project is to help make the internet safer for all users.

As ethical hackers,were obliged to inform a company when we discover flaws in their online security.

Our ethical security research team has discovered and disclosed some of the most impactful data leaks in recent years.

Article image

[Publication date: 14.03.2020]

like, comment on how to improve this article.

Article image

Article image

Article image

Article image

Article image

Article image