A pair or friends from Tamworth who got involved in the massive 2015 TalkTalk data hack have been jailed.
The TalkTalk data hack is a legal action we’re involved in as we fight for the rights of victims affected by the incident.
23-year-old Matthew Hanley was jailed for 12 months having admitted to hacking the website between 18th October and 22nd October 2015. He reportedly handed data over for hacking to another person, and handed financial information to 21-year-old Connor Allsopp. Allsopp was jailed for eight months and admitted to supplying stolen customer data to another person for fraud.
The recent East Lindsey Council data breach was another example of a totally avoidable incident that resulted in sensitive information being exposed.
Our lawyers are often representing victims for council data breach cases. This includes for claims against local authority agencies and outsourced third-parties as well.
Public sector breaches can be common, and council data breaches are amongst the most frequent we see. As is the case with the East Lindsey Council data breach, many of the incidents are totally avoidable. Many stem from simple errors that can have costly consequences.
You may be entitled to claim compensation as a victim of a council email breach, and our Data Leak Lawyers are here to help you.
A number of council email breaches have taken place over the years, and they can often happen by human error or software problems. Whatever the cause, they are often seen as systemic issues that can be easily resolvable, meaning the breaches should never have happened in the first place. For this reason, depending on the data breached, victims can be entitled to claim for data breach compensation.
The recent Ticketmaster cyber attack we’ve launched an action for may just be the beginning as hackers are reportedly ready to attack again.
The Ticketmaster cyber attack was successful because the hackers were able to install malicious code into third-party software that Ticketmaster were using as part of their payment process. Inbenta, the authors of the code, say they didn’t know Ticketmaster were using their code for this purpose, and had they have known, they say they would have recommended against it on the grounds of security issues.
The growing trend of hackers looking to attack third-party code means the huge Ticketmaster cyber attack may well be just the beginning.
There has been some recent controversary over the government’s use of the ‘my voice is my password’ system.
Privacy campaigners have reportedly called for HRMC to delete the millions of recordings they hold for people who use the ‘my voice is my password’ system because they’ve failed to gain clear and proper consent from users of the system. The government say that the system is secure, and they have relied on implied consent; but privacy watchdogs are concerned over consent, security and storage.
Eyebrows have certainly been raised…
The massive Ticketmaster UK data breach from June appears to be just the tip of the iceberg as part of a wider cyberattack campaign.
According to security researchers, the software that was hacked that led to the Ticketmaster data breach was one of many targeted and successfully hacked as part of a wider campaign to access the payment information for tens of thousands of people at a time across the world. This does not fill anyone who uses online payment platforms with a great deal of confidence, and given the scale of the online industry, how can we know for sure that we’re ever safe?
We’re representing a number of victims of the Ticketmaster UK data breach who are claiming compensation having had their information compromised.
According to some recent and rather worrying research, the question as to who is responsible for data protection is that it’s a HR problem, some executives say.
According to a spread of UK executives who were asked about where the responsibilities are in terms of compromised credentials, like stolen or misused passwords, it’s a HR training issue.
It’s understood that one-fifth of respondents placed the responsibility in the hands of HR departments, with close to a thousand executives questioned. Some respondents also considered compromised credentials and weak passwords as very little risk to the business as well.
Ransomware attacks are still on the rise, and we all have every reason to be very worried about the increasing trends we’re seeing.
According to at least one piece of recent research, 2018 has already seen double the rate of ransomware attacks so far, but what’s equally as concerning is that the attacks are changing tact to go for bigger targets to demand higher ransoms, and the hackers are enjoying success.
It’s a sign of the times, and we all need to be very careful to make sure we protect ourselves from the growing risks of ransomware attacks.
There are suggestions that mobile phone data protection is lagging behind as a result of security immaturity and attitudes toward mobile safety.
The smartphone industry in particular has grown exponentially in recent years, and with more than half of the internet’s traffic thought to be on mobile devices, and with mobile apps springing up all the time, some experts are concerned at the lack of maturity mobile phone data protection has when compared to desktop protection.
Does security and attitudes need to change?
Recent study findings suggest that healthcare cybersecurity is still a cause for concern, with the healthcare industry itself a prime target for cybercriminals.
Underfunding and a lack of understanding by bosses means there are still huge gaps and vulnerabilities when it comes to healthcare cybersecurity, putting countless people’s private and sensitive medical data at risk of leaks and hacks.
It’s a simple case of pace: the healthcare industry doesn’t appear to be able to keep up to speed with the pace of the cybercriminals who are targeting them.