Legal help for data breach compensation claims

Cyber Crime affects 1 in 10 UK Adults, reports say

Posted by Editor on August 05, 2016 in the following categories: Latest and tagged with

The annual Crime Survey for England and Wales has been published by the Office of National Statistics. Worryingly, the figures show that 5.8 million incidents that are classed as cyber crime impact 1 in 10 adults.

The internet offers us a lot of convenience and most people fully embrace it. It is the level of trust that we have in the online world that can open us up to cyber crime though. Crime is changing, and as more and more of our personal details end up online, criminals are taking full advantage of any possible vulnerabilities.

This can lead to fraud, hacking, and other cyber crimes – problems which are on the rise.
Read More


Information Commissioner Office (ICO) recent reports in to public sector data breaches

Posted by Editor on August 04, 2016 in the following categories: Latest and tagged with

The Information Commissioner Office is the UK’s independent body that upholds information rights (https://ico.org.uk/about-the-ico/who-we-are/). They cover different legislation and handle tens of thousands of enquires, complaints, and concerns that are made each year. They take action and investigate how organisations handle data.

Where bodies fail to meet requirements of legislation, the ICO can do different things which include; prosecute those who commit criminal offences under the Act; report to Parliament on issues of concerns; or conduct investigations to assess and check if organisations are complying with the Act.

As Data Leak Lawyers we can occasionally work with them, but our role is to help properly compensate victims of data leaks, breaches, and hacks. A lot of the work they cover is relevant for what we do though.
Read More


Industry Reaction to O2 Data Hack

Posted by Editor on August 04, 2016 in the following categories: Latest and tagged with

O2 customer data was found for sale on the dark web from a hack that reportedly took place several years ago. The data was supposedly obtained from gaming website XSplit.

Log-in details were stolen from XSplit, and were then matched with a number of O2 accounts, allowing the hackers access to customer’s personal information. This is known as credential stuffing.

As so many people are online and reuse the same usernames and passwords, even though we are told not to, this hack has made people vulnerable to further problems. The hacker’s accessed customer’s personal information such as phone numbers, emails, and their date of birth. You can read more on this story here.

Today, we’ll be looking at the industry’s reaction to the hack.
Read More


Thwarting data breaches is an everyday mission for IT Managers

Posted by Editor on August 04, 2016 in the following categories: Latest

data breach compensation expert guide

Data security provider WinMagic conducted a study that found one in four IT managers attempt to stop a data breach every single day and that almost half of all employees believed that IT security was solely the responsibility of the IT department. Only 37% believe they play a role in IT security – two very alarming statistics.

The study found that a quarter of IT managers believe that, whilst hackers are the biggest security risk to organisations, the next biggest security risk was in fact employees. This is further enforced by the report that found a third of IT managers only want certain employees that have been given clearance to use personal devices.

This is not surprising when 17% of employees admit that they would open an attachment from an unknown sender.

Read More


DARPA launches Cyber Grand Challenge for next generation software

Posted by Editor on August 03, 2016 in the following categories: Latest and tagged with

cyber grand challenge

The Defence Advanced Research Projects Agency (DARPA), an investor in breakthrough technologies, looks set on its next great Cyber Grand Challenge of developing software that is able to spot and protect vulnerabilities in programmes before hackers are even aware they are there.

Due to the complexity of modern software, and given there is a need for quick fixes as more and more devices are connected to the internet become available, all of these devices will be used in vast quantities will not be able to have a sufficient defences against threats. This is the Cyber Grand Challenge that DARPA is taking on – to stop hackers in their tracks before vulnerabilities even come to light!
Read More


Wireless keyboards – are they safe from hackers?

Posted by Editor on August 03, 2016 in the following categories: Latest and tagged with

For those of us who have invested in a wireless keyboard, this blog, might be a bit concerning as recent reports have suggested that they could be vulnerable to hackers who are able to see every word typed from hundreds of feet away.

First some good news : Bluetooth Wireless keyboards are generally encrypted, so anyone trying to intercept what was being transmitted from the keyboard to the computer would be unable to decipher it.

Now, the not-so-good news : However, in an investigation that was carried out by cyber security company Bastille, they found that hackers could clearly intercept everything that was being typed on certain low-cost wireless keyboards.

You really don’t need me to let you know that unencrypted wireless keyboards may allow hackers access to passwords, bank details, and anything else typed.
Read More


SwiftKey ‘glitch’ a potential data leak?

Posted by Editor on August 03, 2016 in the following categories: Latest and tagged with

SwiftKey is a device for both IOS and Android systems such like smart phones and tablets. It has a database that stores commonly used words and phrases used by the owner. When the user is typing, SwiftKey can offer suggestions on what words to use. This can include things like email addresses, names, and phone numbers commonly used.

Last week it was reported that users of SwiftKey had been experiencing problems when using the keyboard. Users of the keyboard reported that they were receiving other people’s suggestions, which also included personal information like email addresses, phone numbers, and names. There were also reports of word suggestions in different languages that users had not used before.
Read More


New online portal offers help against ransomware attacks

Posted by Editor on August 02, 2016 in the following categories: Latest and tagged with | |

experts give catastrophic data breach warning

Ransomware is software that blocks users having access to their computer system until a sum of money is paid. Ransomware helps to facilitate the evolution of cybercrime as it often funds more advanced types of cyber-crime software that can also be sold on to other cyber-criminals… Allowing for more cyber-attacks to happen.

The advice has been and still remains “do not pay the ransom”, if you do fall victim to hackers – by people paying the ransom they continue to fuel a vicious cybercrime circle. Even though people do pay, there is also no guarantee that people will regain access to their computer system.
Read More


Local Government data leaks – a common problem

Posted by Editor on August 02, 2016 in the following categories: Latest and tagged with

police data breach

Our local governments hold a wealth of information about us.

Due to how much information they have on us, data breaches from local government organisations can be a major concern. One of the most frustrating things about local government data leaks is that we are required to share so much of our personal information with them that it makes even small vulnerabilities a huge problem.

Unlike businesses, where we arguably have more of an option when it comes to how much of our personal information we chose to share with them,  when it comes to sharing information with our government, it is often a necessity, and can be some of our most personal information indeed.

As we hand over more and more personal data, we expect it to be kept secure – but this is not always the case.
Read More


Lightify app vulnerability puts users at risk of being hacked?

Posted by Editor on August 02, 2016 in the following categories: Latest

It has been discovered that internet connected light bulbs, produced by the company Osram, have multiple flaws that could allow hackers to access home Wi-Fi networks and not only potentially operate lights without permission, but give the hackers access to other devices that use the Wi-Fi network such as game consoles or Smart TV’s etc.
Read More