Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Location information and personal information of the exposed users of Angelsense


An assistant technology company that provides ground monitoring devices for people with disabilities, learned the open Internet and open ground information on open Internet and open ground information.

The company was warned by researchers by researchers in more than a week for more than a week than a week than a week.

Upguard, Mengelsense only shared the details of the exposition with TechCrunche after breaking down. There is upguard Since a blog post was published in the event.

New Jersey Based Angelsense, GPS Viewers and Thousands of Tracks in accordance with customers to the mobile app listand are insulated by law enforcement and police departments in the United States.

According to the labor researchers, Angelsense, leaving an internal database without a password that allows everyone to access information using only one web browser and accessing the public IP address of the database. The database has stored real-time update records from an Angelsense system, which consists of personal information of Angelsense customers, as well as technical logs about the company’s systems.

Upguard said that customers found their personal information, names, postal addresses and phone numbers in the exposed database. Researchers also said that there are more information about the people watched on the person, including related health information, which are followed by autism and dementia. Researchers also found emails, passwords and identification signs, as well as partial credit card information to access customer accounts, as well as partial credit card – all visible in the text, rose.

It is not clear how the database is exposed or how many customers are affected. According to the list of the show, the search engine of Internet facilities and systems, Angelsense’s exposed entrance base online on January 14, though it was online for a while ago.

Angelsense Chief Executive Doron Somer, Techcrunch’u confirmed that the company has introduced offline offline offline offline offline offline offline offline.

“No, there is no, called us that the issue was taken to our attention,” Somer said. “When discovered, we moved immediately to confirm and resolve the information provided.”

“Note that in addition to the above, we have no information about the accessibility of any information about the access system. No evidence or sign in the threat to abuse or abused,” Somer is sensitive personal personal personal by claiming that there is no information.

Somer did not say that there were technical means to determine if the society was entered if the non-protected server before the discovery of society.

When the company planned to be exposed to affected customers and information, Somer said he was still being investigated.

“Of course, if the warning to regulators or individuals are guaranteed, we will provide it,” Somer said.

Somer did not respond to a follow-up request with press time.

The database exposure is the result of the wrong figures that often caused more human error than harmful intentions, and it has become increasingly spread in recent years. Resulted in similar security strips of the detected database Pour sensitive US military emailsreal-time leakage of text messages contains two factor codesand History of chat from Ai Chatbots.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *