Uber has suffered many breaches over the years, so this podcast has focused just on breaches that involved external parties and not internal employee abuse of privileges. There is much to learn from Uber’s misfortune and in this episode we cover 5 distinct hacks and a couple of third-party breaches impacting Uber customers and drivers.
The Uber data breach cover-up: A timeline of events
Uber Pays $148 Million Over Yearlong Cover-Up Of Data Breach
Uber driver info stolen yet again: This time from law firm
Uber accidentally leaks personal data for hundreds of drivers
Teen on Musk’s DOGE Team Graduated from ‘The Com’
Uber Breaches (2014 & 2016)
Teqtivity Breach Notification Statement
Uber Investigating Breach of Its Computer Systems
Federal Trade Commission Gives Final Approval to Settlement with Uber
Uber Paid Hackers to Delete Stolen Data on 57 Million People
FTC: Uber Failed To Protect 100,000 Drivers In 2014 Hack
Uber Data Breaches: Full Timeline Through 2023
Uber was breached to its core, purportedly by an 18-year-old. Here’s what’s known
The Uber Hack’s Devastation Is Just Starting to Reveal Itself
Uber Breach 2022 – Everything You Need to Know
Case Study: The Uber Hack
Chester Wisniewski is an old hat to information security having practiced the art professionally for more than 25 years. Starting out with a 300 baud modem in the 80s he became obsessed with exploring the world’s phone networks (phreaking?) which inevitably led to bulletin boards and early internet access in the mid-80s. The trust inherent in the system seemed absurd and this inspired Chester to pursue how we might build systems less prone to abuse. The rest is history.
Ben has been in Information Technology for two decades starting at the age of 14. Recently described by a senor executive as an “Adult Dennis the Menace”, Ben’s always up for a bit of cyber mayhem. Having worked across, Managed Services Providers, two of Australia’s largest Enterprises and an almost decade at a Security Vendor. Ben’s experience spans Wintel System Administration, Network Administration, Penetration Testing, and Software Development.