We focus on the latest news surrounding data breaches, leaks and hacks plus daily internet security articles.
A cyber criminal from the Ukraine admitted on twitter to stealing 105,000 documents from the Central Ohio Urology Group. The documents included patient names, diagnosis information, addresses, and dates of birth. The Urology group is meant to be the second biggest health system in the state with 24 locations.
A screenshot was posted on twitter by the alleged cyber criminal listing stolen information with claims that some 156GB of data had been uploaded to a Google Drive.
No comment has been made by the Central Ohio Urology Group, but one thing is for sure: this is a serious breach.
read more
Wolverhampton council are reportedly at the centre of a huge data leak when almost 10,000 peoples private information was mistakenly emailed to the wrong person.
In November 2015, Wolverhampton council sought a report from its payroll department. Due to an error, 9,858 people’s personal data was sent to an external third party by accident.
Those affected by the mistake included 73 education establishments, although it is not clear if the data released was about Wolverhampton city’s schools and teachers. The data leaked was on a spreadsheet containing personal information, and it has not been said if those who have had their privacy rights breached have been informed.
read more
The annual Crime Survey for England and Wales has been published by the Office of National Statistics. Worryingly, the figures show that 5.8 million incidents that are classed as cyber crime impact 1 in 10 adults.
The internet offers us a lot of convenience and most people fully embrace it. It is the level of trust that we have in the online world that can open us up to cyber crime though. Crime is changing, and as more and more of our personal details end up online, criminals are taking full advantage of any possible vulnerabilities.
This can lead to fraud, hacking, and other cyber crimes – problems which are on the rise.
read more
The Information Commissioner Office is the UK’s independent body that upholds information rights (https://ico.org.uk/about-the-ico/who-we-are/). They cover different legislation and handle tens of thousands of enquires, complaints, and concerns that are made each year. They take action and investigate how organisations handle data.
Where bodies fail to meet requirements of legislation, the ICO can do different things which include; prosecute those who commit criminal offences under the Act; report to Parliament on issues of concerns; or conduct investigations to assess and check if organisations are complying with the Act.
As Data Leak Lawyers we can occasionally work with them, but our role is to help properly compensate victims of data leaks, breaches, and hacks. A lot of the work they cover is relevant for what we do though.
read more
O2 customer data was found for sale on the dark web from a hack that reportedly took place several years ago. The data was supposedly obtained from gaming website XSplit.
Log-in details were stolen from XSplit, and were then matched with a number of O2 accounts, allowing the hackers access to customer’s personal information. This is known as credential stuffing.
As so many people are online and reuse the same usernames and passwords, even though we are told not to, this hack has made people vulnerable to further problems. The hacker’s accessed customer’s personal information such as phone numbers, emails, and their date of birth. You can read more on this story here.
Today, we’ll be looking at the industry’s reaction to the hack.
read more
Data security provider WinMagic conducted a study that found one in four IT managers attempt to stop a data breach every single day and that almost half of all employees believed that IT security was solely the responsibility of the IT department. Only 37% believe they play a role in IT security – two very alarming statistics.
The study found that a quarter of IT managers believe that, whilst hackers are the biggest security risk to organisations, the next biggest security risk was in fact employees. This is further enforced by the report that found a third of IT managers only want certain employees that have been given clearance to use personal devices.
This is not surprising when 17% of employees admit that they would open an attachment from an unknown sender.
The Defence Advanced Research Projects Agency (DARPA), an investor in breakthrough technologies, looks set on its next great Cyber Grand Challenge of developing software that is able to spot and protect vulnerabilities in programmes before hackers are even aware they are there.
Due to the complexity of modern software, and given there is a need for quick fixes as more and more devices are connected to the internet become available, all of these devices will be used in vast quantities will not be able to have a sufficient defences against threats. This is the Cyber Grand Challenge that DARPA is taking on – to stop hackers in their tracks before vulnerabilities even come to light!
read more
For those of us who have invested in a wireless keyboard, this blog, might be a bit concerning as recent reports have suggested that they could be vulnerable to hackers who are able to see every word typed from hundreds of feet away.
First some good news : Bluetooth Wireless keyboards are generally encrypted, so anyone trying to intercept what was being transmitted from the keyboard to the computer would be unable to decipher it.
Now, the not-so-good news : However, in an investigation that was carried out by cyber security company Bastille, they found that hackers could clearly intercept everything that was being typed on certain low-cost wireless keyboards.
You really don’t need me to let you know that unencrypted wireless keyboards may allow hackers access to passwords, bank details, and anything else typed.
read more
SwiftKey is a device for both IOS and Android systems such like smart phones and tablets. It has a database that stores commonly used words and phrases used by the owner. When the user is typing, SwiftKey can offer suggestions on what words to use. This can include things like email addresses, names, and phone numbers commonly used.
Last week it was reported that users of SwiftKey had been experiencing problems when using the keyboard. Users of the keyboard reported that they were receiving other people’s suggestions, which also included personal information like email addresses, phone numbers, and names. There were also reports of word suggestions in different languages that users had not used before.
read more
Ransomware is software that blocks users having access to their computer system until a sum of money is paid. Ransomware helps to facilitate the evolution of cybercrime as it often funds more advanced types of cyber-crime software that can also be sold on to other cyber-criminals… Allowing for more cyber-attacks to happen.
The advice has been and still remains “do not pay the ransom”, if you do fall victim to hackers – by people paying the ransom they continue to fuel a vicious cybercrime circle. Even though people do pay, there is also no guarantee that people will regain access to their computer system.
read more
EasyJet admits data of nine million hacked
British Airways data breach: How to claim up to £6,000 compensation
Are you owed £5,000 for the Virgin Media data breach?
Virgin Media faces £4.5 BILLION in compensation payouts
BA customers given final deadline to claim compensation for data breach
Shoppers slam Morrisons after loyalty points stolen
Half a million customers can sue BA over huge data breach
Lawyers accuse BA of 'swerving responsibility' for data breach
The biggest data breaches of 2020
Fill out our quick call back form below and we'll contact you when you're ready to talk to us.