Security Market Segment LS
Monday, 07 November 2011 21:15

Tasteless online breach

By

News Ltd's online food property Taste suffered a breach sometime last week exposing details of a number of members.  The breach and they way it has been handled has left a lot to be desired and the security and privacy of a lot of people in tatters.

In an email to affected members (reproduced below), "The Taste Team" advised that an old version of their database had been exposed by "illegal and unauthorised access," and some affected people have received spam email.

They later claim that "Since being notified, we have investigated the incident and we are confident this was not caused by a problem on the taste website itself."

One wonders, does this mean that the database was obtained by means other than hacking the site (if so, how?) or was it by design (and thus not a problem on the website).

Probably the only sensible thing was to observe, "Should you be using this password for any other online services we also recommend that you change those passwords."  iTWire has frequently railed against password re-use but this has always been considered a futile battle but it's at least nice to see a hacked organisation recognise the issue.

Taste claimed to have sent the email to all those affected; presumably they know which version of the database was taken and have addressed that list.  The problem of course is for those members who have heard of the attack, but did not receive an email.  Does that mean they were not included?  Perhaps the email was never delivered.

What has the user reaction been?


What would have made much more sense would have been to have sent an email to everyone with one of two messages: you were included in the lost file or you weren't.  That way there would be a very small number of genuine lost emails which could easily be addressed and everyone else would be fully informed.

Although requesting that affected users contact a provided email address (given in the breach notification email) this was of no help to those who knew of the breach but received no email.

People (for very obvious reasons) flooded the online forum with many questions.  The first was posted on Friday November 4th at 8:13am and it wasn't until the eighth message at 10:59am that an admin responded.  This was the ONLY response in the entire thread.

Worse, one very telling message (immediately prior to the admin message) asks (minor edits for clarity):

"When you join "Taste" there are a number of asterixed fields that you are required to fill in, these include name and address etc.

"Could you please let us know if that data along with D.O.B. or any other "Profile" identifiers was also compromised along with potential passwords ?

"Presumably if this was an old database, changes to passwords made subsequently to the date of that DB decommissioning aren't affected.  Could you please let us know the date up to which, or from which our passwords and data are secure."


At the time of writing, there has been no answer.

iTWire has a number of very important but as yet unanswered questions about this incident.


iTWire has confirmed that a remarkable amount of personal information (first name, last name, email address and full street address) is demanded in order to sign-up.

As a result of the breach, the site appears to have expired all affected passwords as they are insisting affected users make use of the "forgotten password" function rather than logging in and changing it via the my profile link.

So, a set of open questions to Taste:

  1. What was the date of the breach and also the datestamp of the data file taken?
  2. What data was contained in that file?
  3. What reparation are you offering to affected members?  If the loss is as bad as it might be, your users will be exposed to considerably greater problems than mere spam email; fraud and identity theft for instance.
  4. On what date did you advise both the State and Federal Privacy Commissioners?


The full email to affected members is on the next page.


The full email to affected members is as follows:

Hello friends of taste.com.au:

Yesterday we identified that information about our members was potentially exposed by illegal and unauthorised access to an old version of our database.

As a result, some users have received spam email.  We apologise for this incident.  At taste we take privacy very seriously and never give out any information about our members without permission.

Since being notified, we have investigated the incident and we are confident this was not caused by a problem on the taste website itself.

As a precaution we strongly recommend that you change the password connected to your taste.com.au email account. Should you be using this password for any other online services we also recommend that you change those passwords.

Asking you to reset your passwords may be an overreaction and we apologize for the inconvenience, but we'd rather be over-cautious when it comes to your privacy.  Our members are what have helped make taste what it is today.

We are further strengthening taste.com.au security to minimise any further risk to you.  Again, please accept our sincere apologies if you have received a spam email.  The taste.com.au team look forward to continuing to serve you the best online food experience in Australia.

If you have any concerns please email admin@taste.com.au.

The Taste Team.

 

Read 6135 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




Maximising Cloud Efficiency - LUMEN WEBINAR 23 April 2025

According to KPMG, companies typically spend 35% more on cloud than is required to deliver business objectives

The rush to the cloud has led to insufficient oversight, with many organisations struggling to balance the value of cloud agility and innovation against the need for guardrails to control costs.

Join us for an exclusive webinar on Cloud Optimisation.

In this event, the team from Lumen will explain how you can maximise cloud efficiency while reducing cost.

The session will reveal how to implement key steps for effective cloud optimisation.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
David Heath

David Heath has had a long and varied career in the IT industry having worked as a Pre-sales Network Engineer (remember Novell NetWare?), General Manager of IT&T for the TV Shopping Network, as a Technical manager in the Biometrics industry, and as a Technical Trainer and Instructional Designer in the industrial control sector. In all aspects, security has been a driving focus. Throughout his career, David has sought to inform and educate people and has done that through his writings and in more formal educational environments.

Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments