Blog
Share This Post
[ad_1]

Indiana-based genetic DNA testing and facial recognition service provider ChoiceDNA had nearly 8,000 files with sensitive biometric details of thousands of individuals, including newborns, exposed due to a WordPress folder that lacked any password protection, Hackread reports.
Included in the records stored in the unsecured WordPress folder named “Facial Recognition Uploads” were names, biometric images, phone numbers, racial or ethnic identities, email addresses, and reasons for facial DNA analysis, a report by cybersecurity researcher Jeremy Fowler published on vpnMentor showed. While ChoiceDNA immediately secured the exposed WordPress folder upon notification, threat actors could leverage the leaked biometric and personally identifiable information to conduct social engineering and phishing attacks. Individuals who have sought the services of ChoiceDNA have been urged to promptly replace their passwords with robust ones and leverage two-factor authentication, as well as be more vigilant of possible phishing attempts.
[ad_2]
Source link
Subscribe To Our Newsletter
Get updates and learn from the best
More To Explore
US Charges Five People Over North Korean IT Worker Scheme
[ad_1] The US has announced charges against five individuals involved in a fake IT workers scheme to funnel funds to
In Other News: VPN Supply Chain Attack, PayPal $2M Settlement, RAT Builder Hacks Script Kiddies
[ad_1] Noteworthy stories that might have slipped under the radar: Korean VPN supply chain attack, PayPal settles with New York