{"id":2113,"date":"2021-01-06T11:30:50","date_gmt":"2021-01-06T11:30:50","guid":{"rendered":"https:\/\/thenextweb.com\/?p=1333164"},"modified":"2021-01-06T11:30:50","modified_gmt":"2021-01-06T11:30:50","slug":"dont-dox-yourself-by-tweeting-about-data-breaches","status":"publish","type":"post","link":"https:\/\/www.londonchiropracter.com\/?p=2113","title":{"rendered":"Don\u2019t dox yourself by tweeting about data breaches"},"content":{"rendered":"\n<p>This year, NetGalley, the website that provides advanced e-copies of books to reviewers, sent its season\u2019s greetings in a different tone. In an email to its users before Christmas Eve, the company declared: \u201cIt is with great regret that we inform you that on Monday, December 21, 2020 NetGalley was the victim of a data security incident.\u201d<\/p>\n<p>According to the<span>&nbsp;<\/span><a href=\"https:\/\/netgalley.zendesk.com\/hc\/en-us\/articles\/360060979293-Notification-of-Data-Security-Incident-December-23-2020\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">company\u2019s advisory<\/a>, \u201cWhat initially seemed like a simple defacement of our homepage has, with further investigation, resulted in the unauthorized and unlawful access to a backup file of the NetGalley database.\u201d<\/p>\n<p>The database in question included sensitive user information, including usernames and passwords, names, email addresses, mailing addresses, birthdays, company names, and Kindle email addresses.<\/p>\n<p>Unfortunately, many users took to social media and started discussing the incident without thinking about what they are putting up for everyone to see. And in their haste to be the first to tweet about the breach, many users made awful mistakes, which could further compromise their security.<\/p>\n<p>The following is perhaps the worst way to tweet about the incident. The user admits using his NetGalley password for several other accounts.<\/p>\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.png?ssl=1\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-9138 jetpack-lazy-image jetpack-lazy-image--handled lazy\" src=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.png?resize=696%2C150&amp;ssl=1\" sizes=\"(max-width: 696px) 100vw, 696px\" alt=\"NetGalley data breach tweet\" width=\"696\" height=\"150\" data-attachment-id=\"9138\" data-permalink=\"https:\/\/bdtechtalks.com\/2020\/12\/29\/netgalley-data-breach-tweets\/netgalley-data-breach-tweet\/\" data-orig-file=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.png?fit=1198%2C258&amp;ssl=1\" data-orig-size=\"1198,258\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"NetGalley data breach tweet\" data-image-description data-medium-file=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.png?fit=300%2C65&amp;ssl=1\" data-large-file=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.png?fit=696%2C150&amp;ssl=1\" data-recalc-dims=\"1\" data-lazy-loaded=\"1\" data-lazy=\"true\" data-srcset=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.png?resize=1024%2C221&amp;ssl=1 1024w, https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.png?resize=300%2C65&amp;ssl=1 300w, https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.png?resize=768%2C165&amp;ssl=1 768w, https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.png?resize=696%2C150&amp;ssl=1 696w, https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.png?resize=1068%2C230&amp;ssl=1 1068w, https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.png?w=1198&amp;ssl=1 1198w\"><\/a><\/figure>\n<p>While that tweet might have been a joke, this next one certainly isn\u2019t. The user posted an image of the NetGalley advisory email that contained her full name (covered in image). Since the Twitter account name is pseudonymous, the user just revealed the full name of the person behind it.<\/p>\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?ssl=1\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-9139 jetpack-lazy-image jetpack-lazy-image--handled lazy\" src=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?resize=696%2C446&amp;ssl=1\" sizes=\"(max-width: 696px) 100vw, 696px\" alt=\"NetGalley data breach tweet\" width=\"696\" height=\"446\" data-attachment-id=\"9139\" data-permalink=\"https:\/\/bdtechtalks.com\/2020\/12\/29\/netgalley-data-breach-tweets\/netgalley-data-breach-tweet-2\/\" data-orig-file=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?fit=1202%2C770&amp;ssl=1\" data-orig-size=\"1202,770\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"NetGalley data breach tweet\" data-image-description data-medium-file=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?fit=300%2C192&amp;ssl=1\" data-large-file=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?fit=696%2C446&amp;ssl=1\" data-recalc-dims=\"1\" data-lazy-loaded=\"1\" data-lazy=\"true\" data-srcset=\"https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?resize=1024%2C656&amp;ssl=1 1024w, https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?resize=300%2C192&amp;ssl=1 300w, https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?resize=768%2C492&amp;ssl=1 768w, https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?resize=696%2C446&amp;ssl=1 696w, https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?resize=1068%2C684&amp;ssl=1 1068w, https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?resize=656%2C420&amp;ssl=1 656w, https:\/\/i2.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet.jpg?w=1202&amp;ssl=1 1202w\"><\/a><\/figure>\n<p>There were other milder tweets, in which users admitted that their NetGalley account wasn\u2019t under their real name. Less dangerous tweets were by users who admitted they had a NetGalley account, and they had just learned of the hack and had either changed their password or deleted their accounts.<\/p>\n<p>At first glance, many of these tweets might look harmless because NetGalley doesn\u2019t store very sensitive information such as bank account and credit card data. But the NetGalley breach was already bad, to begin with.<\/p>\n<p>When revealing security breaches, most companies explicitly state the measures they have taken to protect users\u2019 data. For instance, many organizations quickly point out that leaked passwords were<span>&nbsp;<\/span><a href=\"https:\/\/bdtechtalks.com\/2017\/03\/30\/what-is-end-to-end-encryption-cryptography\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">encrypted or hashed<\/a>, which makes it hard (but not impossible) for the attackers to access the accounts. There is no mention of encryption in neither the original advisory nor the updated version published on NetGalley\u2019s website on Sunday, which suggests the hacked database stored user passwords and other information in plain text.<\/p>\n<p><em>[Read:&nbsp;<a class=\"c-link c-message_attachment__title_link\" href=\"https:\/\/thenextweb.com\/dutch-disruptors\/2020\/12\/15\/meet-the-4-scale-ups-using-data-to-save-the-planet\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-qa=\"message_attachment_title_link\"><span dir=\"auto\">Meet the 4 scale-ups using data to save the planet<\/span><\/a>]<\/em><\/p>\n<p>On December 23, when NetGalley sent the first advisory, the company invalidated all login credentials and notified users that they will have to reset their passwords the next time they try to log in. But by then, the damage had already been done. The hackers defaced the website on December 21, as users had pointed out on Twitter and the company confirmed in the advisory. And there\u2019s nothing to prove they didn\u2019t have access to the data much sooner.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<div class=\"twitter-tweet twitter-tweet-rendered\"><a href=\"https:\/\/twitter.com\/vynexathings\/status\/1341061995928432648?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1341061995928432648%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fbdtechtalks.com%2F2020%2F12%2F29%2Fnetgalley-data-breach-tweets%2F\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><\/p>\n<figure class=\"post-image post-mediaBleed alignnone\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-1333168 lazy\" src=\"https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.16.45.png\" alt width=\"596\" height=\"670\" sizes=\"(max-width: 596px) 100vw, 596px\" data-lazy=\"true\" data-srcset=\"https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.16.45.png 1016w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.16.45-187x210.png 187w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.16.45-240x270.png 240w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.16.45-120x135.png 120w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.16.45-796x895.png 796w\"><\/figure>\n<p><\/a><\/div>\n<\/div>\n<\/figure>\n<p>Even if the company had invalidated passwords before the attackers had the chance to use them, the data would still be valuable to them. As the first tweet I shared suggested, users often<span>&nbsp;<\/span><a href=\"https:\/\/bdtechtalks.com\/2016\/02\/12\/the-many-ways-your-password-can-be-stolen-or-bypassed\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">reuse their passwords across many accounts<\/a>. After the NetGalley hack, the attackers have access to a fresh list of emails and passwords. They can use this information in credential stuffing attacks, where they enter the login information obtained from a data breach on other services and possibly gain access to other, more sensitive accounts. Cross-service account hijacking is something<span>&nbsp;<\/span><a href=\"https:\/\/techcrunch.com\/2016\/06\/08\/twitter-hack\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">that happens often<\/a><span>&nbsp;<\/span>and can even include high-profile tech executives.<\/p>\n<p>The attacks can also combine the data from the NetGalley breach with the billions of user account records leaked in other data breaches to create more complete profiles of their targets.<\/p>\n<p>So, alone, the NetGalley data breach might not look like a big deal. But when viewed in the context of other security incidents and the growing sophistication of cyberthreats, every piece of information that falls into the hands of malicious actors can become instrumental to a larger attack.<\/p>\n<p>Some users have dismissed the hack as harmless. As one user said, \u201cWhat\u2019s the worse [sic] that can happen, somebody gonna write a review posing as me?\u201d<\/p>\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?ssl=1\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-9140 jetpack-lazy-image jetpack-lazy-image--handled lazy\" src=\"https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?resize=696%2C447&amp;ssl=1\" sizes=\"(max-width: 696px) 100vw, 696px\" alt=\"NetGalley data breach tweet\" width=\"696\" height=\"447\" data-attachment-id=\"9140\" data-permalink=\"https:\/\/bdtechtalks.com\/2020\/12\/29\/netgalley-data-breach-tweets\/netgalley-data-breach-tweet-3\/\" data-orig-file=\"https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?fit=1204%2C772&amp;ssl=1\" data-orig-size=\"1204,772\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"NetGalley data breach tweet\" data-image-description data-medium-file=\"https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?fit=300%2C192&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?fit=696%2C447&amp;ssl=1\" data-recalc-dims=\"1\" data-lazy-loaded=\"1\" data-lazy=\"true\" data-srcset=\"https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?resize=1024%2C657&amp;ssl=1 1024w, https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?resize=300%2C192&amp;ssl=1 300w, https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?resize=768%2C492&amp;ssl=1 768w, https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?resize=696%2C446&amp;ssl=1 696w, https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?resize=1068%2C685&amp;ssl=1 1068w, https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?resize=655%2C420&amp;ssl=1 655w, https:\/\/i0.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/NetGalley-data-breach-tweet-1.png?w=1204&amp;ssl=1 1204w\"><\/a><\/figure>\n<p>The real answer is, \u201cNo, the<span>&nbsp;<\/span><em>worst<\/em><span>&nbsp;<\/span>that can happen is that some threat actor can use your data and all the other public information they can gather about you, and use them to attack you from another, more sensitive spot.\u201d<\/p>\n<p>To be clear, this doesn\u2019t mean you shouldn\u2019t tweet about data breaches. In fact, I found plenty of good information about the data breach on Twitter, like this user who first raised concern about the leaked data possibly being unencrypted\u2026<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<div class=\"twitter-tweet twitter-tweet-rendered\">\n<figure class=\"post-image post-mediaBleed alignnone\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-1333171 lazy\" src=\"https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.22.png\" alt width=\"749\" height=\"361\" sizes=\"(max-width: 749px) 100vw, 749px\" data-lazy=\"true\" data-srcset=\"https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.22.png 1016w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.22-280x135.png 280w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.22-540x260.png 540w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.22-270x130.png 270w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.22-796x384.png 796w\"><\/figure>\n<\/div>\n<\/div>\n<\/figure>\n<p>\u2026 and this other tweet that shared some decent tips.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<div class=\"twitter-tweet twitter-tweet-rendered\"><a href=\"https:\/\/twitter.com\/shutupshealea\/status\/1341938032983732224?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1341938032983732224%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fbdtechtalks.com%2F2020%2F12%2F29%2Fnetgalley-data-breach-tweets%2F\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><\/p>\n<figure class=\"post-image post-mediaBleed alignnone\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-1333172 lazy\" src=\"https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.42.png\" alt width=\"762\" height=\"482\" sizes=\"(max-width: 762px) 100vw, 762px\" data-lazy=\"true\" data-srcset=\"https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.42.png 1020w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.42-280x177.png 280w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.42-426x270.png 426w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.42-213x135.png 213w, https:\/\/cdn0.tnwcdn.com\/wp-content\/blogs.dir\/1\/files\/2021\/01\/Screenshot-2021-01-06-at-10.18.42-796x504.png 796w\"><\/figure>\n<p><\/a><\/div>\n<\/div>\n<\/figure>\n<p>It\u2019s also fine to criticize the way the company handled the breach, though I would advise against spreading conspiracy theories that would only add to the confusion.<\/p>\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/i1.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/netgalley-data-breach-tweet.png?ssl=1\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-9142 jetpack-lazy-image jetpack-lazy-image--handled lazy\" src=\"https:\/\/i1.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/netgalley-data-breach-tweet.png?resize=696%2C237&amp;ssl=1\" sizes=\"(max-width: 696px) 100vw, 696px\" alt=\"netgalley data breach tweet\" width=\"696\" height=\"237\" data-attachment-id=\"9142\" data-permalink=\"https:\/\/bdtechtalks.com\/2020\/12\/29\/netgalley-data-breach-tweets\/netgalley-data-breach-tweet-4\/\" data-orig-file=\"https:\/\/i1.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/netgalley-data-breach-tweet.png?fit=1184%2C404&amp;ssl=1\" data-orig-size=\"1184,404\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"netgalley data breach tweet\" data-image-description data-medium-file=\"https:\/\/i1.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/netgalley-data-breach-tweet.png?fit=300%2C102&amp;ssl=1\" data-large-file=\"https:\/\/i1.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/netgalley-data-breach-tweet.png?fit=696%2C237&amp;ssl=1\" data-recalc-dims=\"1\" data-lazy-loaded=\"1\" data-lazy=\"true\" data-srcset=\"https:\/\/i1.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/netgalley-data-breach-tweet.png?resize=1024%2C349&amp;ssl=1 1024w, https:\/\/i1.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/netgalley-data-breach-tweet.png?resize=300%2C102&amp;ssl=1 300w, https:\/\/i1.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/netgalley-data-breach-tweet.png?resize=768%2C262&amp;ssl=1 768w, https:\/\/i1.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/netgalley-data-breach-tweet.png?resize=696%2C237&amp;ssl=1 696w, https:\/\/i1.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/netgalley-data-breach-tweet.png?resize=1068%2C364&amp;ssl=1 1068w, https:\/\/i1.wp.com\/bdtechtalks.com\/wp-content\/uploads\/2020\/12\/netgalley-data-breach-tweet.png?w=1184&amp;ssl=1 1184w\"><\/a><\/figure>\n<p>But in general, you must be very careful when posting information on social media about data breaches. So, before posting about a security incident, stop and think twice. If what you\u2019re about to share reveals any personal information about you or someone else, such as services you\u2019re using, your devices, email address, location, and IP address, then resist the urge to post something witty to your followers. It\u2019s not worth it.<\/p>\n<p>The point is, the dark web is already replete with sensitive information about billions of users. Don\u2019t make things worse by revealing more information about yourself and others through careless tweets.<\/p>\n<p><i><span>This article was originally published by Ben Dickson<\/span><\/i><i><span>&nbsp;on <\/span><\/i><a href=\"https:\/\/bdtechtalks.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><i><span>TechTalks<\/span><\/i><\/a><i><span>, a publication that examines trends in technology, how they affect the way we live and do business, and the problems they solve. But we also discuss the evil side of technology, the darker implications of new tech and what we need to look out for. You can read the original article <a href=\"https:\/\/bdtechtalks.com\/2020\/12\/29\/netgalley-data-breach-tweets\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/span><\/i><\/p>\n<p> <a href=\"https:\/\/thenextweb.com\/syndication\/2021\/01\/06\/dont-dox-yourself-by-tweeting-about-data-breaches\/\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This year, NetGalley, the website that provides advanced e-copies of books to reviewers, sent its season\u2019s greetings in a different tone. In an email to its users before Christmas Eve, the company&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2114,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/2113"}],"collection":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2113"}],"version-history":[{"count":0,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/2113\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/media\/2114"}],"wp:attachment":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}