Posted by Matthew on January 17, 2019 in the following categories: Claims Council Cybersecurity Mobile Data Security Smartphones Technology and tagged with apps | council | council data breaches | cybersecurity | online security | personal data
The York Council app that was hacked late last year has reportedly been shut down as a result of the data breach incident.
It’s understood that the public-facing aspect of the app is no longer available. Residents had been able to access it and use it as part of waste-reduction plans and for the improvement of their environmental performance.
After it was discovered that the app lacked the proper security to keep users’ data safe, the app has now been reportedly shut down and is no longer publicly-available.
Posted by Matthew on December 27, 2018 in the following categories: Cybersecurity Latest Mobile Data Smartphones Technology and tagged with email leaks | online security | personal data | phishing scams
Without even knowing it, your emails may be being read by companies, and you may feel that this is a Gmail data breach.
The recent admission by Google that they’ve been allowing companies to scan emails is a worrying one. App developers are reportedly able to access data in Gmail mailboxes to use it for marketing purposes. Even employees were manually reading mailboxes in order to train AI software to then do it for them.
If this applies to you, whether this can be classed as a Gmail data breach or not is apparently open for debate.
Posted by Matthew on December 18, 2018 in the following categories: Cybersecurity Data GDPR Mobile Data Security Smartphones Social Networking and tagged with apps | cybersecurity | data leak | database security | facebook | online security | personal data
There’s been another Facebook data leak, and yet again, millions of users are said to have been affected.
The fines that Facebook could now face in accordance with GDPR are mounting. This is one of many data leaks that have been revealed recently. The previous one, affecting some 29m users, was only discovered a couple of months ago.
In this latest Facebook data leak, a software bug has led to users’ photos being uploaded to websites without permission.
Posted by Matthew on November 28, 2018 in the following categories: Cybersecurity Latest Mobile Data Smartphones Social Networking Technology and tagged with cybersecurity | LinkedIn | online security | personal data | smart technology | Social Media
The most famous LinkedIn data breach stems from the 2012 hack that took years to come to light. But since then, there has reportedly been others.
There has reportedly been several other data breaches with connections to the Microsoft-owned networking site for professionals. But this latest LinkedIn data breach arises from the way some 18 million people’s email addresses have reportedly been used for targeted Facebook ads.
According to recent investigations, this is yet another data breach involving LinkedIn.
Former GP Dr Thair Altaii was found guilty of voyeurism at Newcastle Crown Court earlier this year. Over 19,000 images of women were found in his possession.
The 55-year-old former “trusted family doctor” was caught with the images and video footage after a patient raised concerns about being recorded. During her appointment, she’d noticed two mobile phones propped up; one facing a chair, and the other facing the examination table. Police were informed, and after Dr Altaii initially denied having any such material in his possession after arrest, a shocking discovery was later found when his laptop was seized.
Here, we’ll look at this in terms of legal advice for a data protection claim.
Posted by Matthew on August 01, 2018 in the following categories: Cybersecurity Data Mobile Data Security Smartphones Technology and tagged with apps | cybersecurity | database security | employee breaches | mobile malware | personal data
There are suggestions that mobile phone data protection is lagging behind as a result of security immaturity and attitudes toward mobile safety.
The smartphone industry in particular has grown exponentially in recent years, and with more than half of the internet’s traffic thought to be on mobile devices, and with mobile apps springing up all the time, some experts are concerned at the lack of maturity mobile phone data protection has when compared to desktop protection.
Does security and attitudes need to change?
The recent Booking.com WhatsApp and text fraud operation showed precisely what criminals can do with enough data at their disposal.
According to the media reports in the aftermath of the Booking.com WhatsApp and text issue, criminals were looking to reap hundreds of thousands of pounds in ill-gotten gains by duping people into thinking they were Booking.com by using personalised messages that were said to have looked genuine, and included personal data.
Some people reportedly fell for the scam and lost money as a result, and we understand that Booking.com has committed to compensating victims.
Posted by Editor on February 02, 2018 in the following categories: Latest Smartphones and tagged with cyber attack | cyber crime | cyber snooping | cybersecurity | online security | smartphone technology
The British government have struck a £210 million deal with South Korean technology giant, Samsung, to arm its emergency services with custom toughened smartphones.
Britain’s police, paramedics and fire crews will be supplied with Samsung smartphones to carry out their jobs more easily and efficiently. For £210 million, Samsung will provide the services with 250,000 smartphones on a three-year deal. These devices are said to be water-resistant and will be connected to 4G internet.
Many people forget the associated risks that portable digital devices come with. Many may have a false sense of security that computers are the main source of data breaches, but some may be quick to disregard mobile phones as a huge danger for leaking data.
Security researchers note the increased dangers of data leaks as more employees bring their own devices to work. If employees bring their own devices to the workplace, you can count this as an additional avenue for a breach to happen. Mobile devices are easily connected and employees are often allowed to connect mobile devices to their work servers to assist when working in or outside of the office.
You can see it either as another door for a data breach to happen or an opportunity to get inside as the door has been left open or is now weak enough to break in to…
Laptops, phones and tablets are more and more common inside the workplace and out, allowing employees to present information easily, or work outside of the workplace. Company directors are also aware that it’s very common for employees to use such devices for other things like watching videos, reading news, entertainment purposes and accessing social media.
Whether these devices are used for professional or personal use, one thing remains the same: “an enterprise’s security is only as strong as its weakest link”.
These devices can often be the weakest link…