How to Maximize Opportunities from the 23andMe Data Leak Hack


Fourteen million people have shared their genetic information with 23andMe in hopes of learning more about their heritage. After a hack that appeared to target people with Jewish ancestry, some might be wondering how to cut ties with the company.

The apparent hacker posted in an online forum last week offering to sell the names, locations, and ethnicities of what could be millions of 23andMe users, specifically calling out Jewish people. 23andMe confirmed to The Washington Post that the leaked data was real and stated that the hack seemed to be the result of credential stuffing, a method where attackers use leaked username-password combinations from other sites to gain access to 23andMe accounts.

This is not the first time 23andMe has faced concerns about data privacy and security. Following the use of a DNA database by local police in 2018 to apprehend a suspected serial killer, genetic-testing companies, including 23andMe, promised to disclose law enforcement requests and obtain customers’ explicit consent before sharing genetic information with external parties, including insurance agencies.

The information collected by genetic-testing companies like 23andMe is not currently protected by the Health Insurance Portability and Accountability Act (HIPAA), the national health privacy law. Moreover, 23andMe still allows for third-party data sharing, as stated in its privacy policy.

According to a blog post by 23andMe, the hackers likely gained access to individual accounts and used the site’s “DNA Relatives” feature to compile lists of people. Upon discovering the incident, 23andMe collaborated with digital forensics experts and law enforcement. As a precautionary measure, 23andMe is mandating all users to reset their passwords.

If you are concerned about the leak, there are several steps you can take to protect yourself.

Create unique and strong passwords

All 23andMe users should immediately reset their passwords to something they have never used on other websites. Enabling two-factor authentication is also recommended.

According to cybersecurity expert Boyd Clewis, if you can easily remember your password, it is not strong enough. Choose a unique and complex password that

Reference

Denial of responsibility! Vigour Times is an automatic aggregator of Global media. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, and all materials to their authors. For any complaint, please reach us at – [email protected]. We will take necessary action within 24 hours.
Denial of responsibility! Vigour Times is an automatic aggregator of Global media. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, and all materials to their authors. For any complaint, please reach us at – [email protected]. We will take necessary action within 24 hours.
DMCA compliant image

Leave a Comment