قالب وردپرس درنا توس
Home / Tips and Tricks / Houzz of Augmented Reality App Maker Unveils Data Delay «Mobile AR News :: Next Reality

Houzz of Augmented Reality App Maker Unveils Data Delay «Mobile AR News :: Next Reality



In the field of cybersecurity, it is becoming increasingly clear that augmented reality is not mutilated against the increasing data breaches caused by growing data waves.

On Friday, furniture retailer Houzz, an early user of ARKit, revealed details of a data breach. This happened in December 2018.

During the investigation of the breach, Houzz learned that profile information, internal identifiers with "no identifiable meaning for persons outside of Houzz, "internal account information and publicly available account information expired

Information under attack includes users' names and locations, current and past user IDs, Facebook IDs, IP addresses, and single-sided encrypted passwords. However, the amount of information displayed to each user depends on whether the user has posted their profile information or logged in via Facebook.

Houzz / YouTube image [19659007] "Houzz has recently learned that a file containing some of our user data was obtained from an unauthorized third party," he said the company in a statement.

"The security of user data is a priority for us, we immediately started an investigation and we also notified law enforcement agencies."

According to the company, sensitive financial information such as social security numbers, credit card numbers and bank accounts are present numbers or other financial data were not recorded during the infringement. Nevertheless, Houzz has informed the affected users about the incident. So if you're a user of the Houzz app, check your email to see if you need to change your password.

Although the Houzz app's augmented reality features – in particular the ability for customers to view virtual furniture, paintings, and other home decor in their homes – are not responsible for the privacy breach. The event recalls that mobile AR continues to run on the same backend infrastructure as other apps, all of which tend to hack in one way or another.


Source link