Welcome To The Data Leak Lawyers Blog

We focus on the latest news surrounding data breaches, leaks and hacks plus daily internet security articles.

Category: Latest

August 10, 2016

Ukrainian hacker reportedly steals wealth of medical documents

A cyber criminal from the Ukraine admitted on twitter to stealing 105,000 documents from the Central Ohio Urology Group. The documents included patient names, diagnosis information, addresses, and dates of birth. The Urology group is meant to be the second biggest health system in the state with 24 locations.

A screenshot was posted on twitter by the alleged cyber criminal listing stolen information with claims that some 156GB of data had been uploaded to a Google Drive.

No comment has been made by the Central Ohio Urology Group, but one thing is for sure: this is a serious breach.
read more

By Author
August 05, 2016

Wolverhampton Council suffers huge data leak

Wolverhampton council are reportedly at the centre of a huge data leak when almost 10,000 peoples private information was mistakenly emailed to the wrong person.

In November 2015, Wolverhampton council sought a report from its payroll department. Due to an error, 9,858 people’s personal data was sent to an external third party by accident.

Those affected by the mistake included 73 education establishments, although it is not clear if the data released was about Wolverhampton city’s schools and teachers. The data leaked was on a spreadsheet containing personal information, and it has not been said if those who have had their privacy rights breached have been informed.
read more

By Author
ignoring cyberattacks
August 05, 2016

Cyber Crime affects 1 in 10 UK Adults, reports say

The annual Crime Survey for England and Wales has been published by the Office of National Statistics. Worryingly, the figures show that 5.8 million incidents that are classed as cyber crime impact 1 in 10 adults.

The internet offers us a lot of convenience and most people fully embrace it. It is the level of trust that we have in the online world that can open us up to cyber crime though. Crime is changing, and as more and more of our personal details end up online, criminals are taking full advantage of any possible vulnerabilities.

This can lead to fraud, hacking, and other cyber crimes – problems which are on the rise.
read more

By Author
August 04, 2016

Information Commissioner Office (ICO) recent reports in to public sector data breaches

The Information Commissioner Office is the UK’s independent body that upholds information rights (https://ico.org.uk/about-the-ico/who-we-are/). They cover different legislation and handle tens of thousands of enquires, complaints, and concerns that are made each year. They take action and investigate how organisations handle data.

Where bodies fail to meet requirements of legislation, the ICO can do different things which include; prosecute those who commit criminal offences under the Act; report to Parliament on issues of concerns; or conduct investigations to assess and check if organisations are complying with the Act.

As Data Leak Lawyers we can occasionally work with them, but our role is to help properly compensate victims of data leaks, breaches, and hacks. A lot of the work they cover is relevant for what we do though.
read more

By Author
August 04, 2016

Industry Reaction to O2 Data Hack

O2 customer data was found for sale on the dark web from a hack that reportedly took place several years ago. The data was supposedly obtained from gaming website XSplit.

Log-in details were stolen from XSplit, and were then matched with a number of O2 accounts, allowing the hackers access to customer’s personal information. This is known as credential stuffing.

As so many people are online and reuse the same usernames and passwords, even though we are told not to, this hack has made people vulnerable to further problems. The hacker’s accessed customer’s personal information such as phone numbers, emails, and their date of birth. You can read more on this story here.

Today, we’ll be looking at the industry’s reaction to the hack.
read more

By Author
data breach compensation expert guide
August 04, 2016

Thwarting data breaches is an everyday mission for IT Managers

Data security provider WinMagic conducted a study that found one in four IT managers attempt to stop a data breach every single day and that almost half of all employees believed that IT security was solely the responsibility of the IT department. Only 37% believe they play a role in IT security – two very alarming statistics.

The study found that a quarter of IT managers believe that, whilst hackers are the biggest security risk to organisations, the next biggest security risk was in fact employees. This is further enforced by the report that found a third of IT managers only want certain employees that have been given clearance to use personal devices.

This is not surprising when 17% of employees admit that they would open an attachment from an unknown sender.

read more

By Author
August 03, 2016

DARPA launches Cyber Grand Challenge for next generation software

The Defence Advanced Research Projects Agency (DARPA), an investor in breakthrough technologies, looks set on its next great Cyber Grand Challenge of developing software that is able to spot and protect vulnerabilities in programmes before hackers are even aware they are there.

Due to the complexity of modern software, and given there is a need for quick fixes as more and more devices are connected to the internet become available, all of these devices will be used in vast quantities will not be able to have a sufficient defences against threats. This is the Cyber Grand Challenge that DARPA is taking on – to stop hackers in their tracks before vulnerabilities even come to light!
read more

By Author
August 03, 2016

Wireless keyboards – are they safe from hackers?

For those of us who have invested in a wireless keyboard, this blog, might be a bit concerning as recent reports have suggested that they could be vulnerable to hackers who are able to see every word typed from hundreds of feet away.

First some good news : Bluetooth Wireless keyboards are generally encrypted, so anyone trying to intercept what was being transmitted from the keyboard to the computer would be unable to decipher it.

Now, the not-so-good news : However, in an investigation that was carried out by cyber security company Bastille, they found that hackers could clearly intercept everything that was being typed on certain low-cost wireless keyboards.

You really don’t need me to let you know that unencrypted wireless keyboards may allow hackers access to passwords, bank details, and anything else typed.
read more

By Author
August 03, 2016

SwiftKey ‘glitch’ a potential data leak?

SwiftKey is a device for both IOS and Android systems such like smart phones and tablets. It has a database that stores commonly used words and phrases used by the owner. When the user is typing, SwiftKey can offer suggestions on what words to use. This can include things like email addresses, names, and phone numbers commonly used.

Last week it was reported that users of SwiftKey had been experiencing problems when using the keyboard. Users of the keyboard reported that they were receiving other people’s suggestions, which also included personal information like email addresses, phone numbers, and names. There were also reports of word suggestions in different languages that users had not used before.
read more

By Author
Have I Been Pwned
August 02, 2016

New online portal offers help against ransomware attacks

Ransomware is software that blocks users having access to their computer system until a sum of money is paid. Ransomware helps to facilitate the evolution of cybercrime as it often funds more advanced types of cyber-crime software that can also be sold on to other cyber-criminals… Allowing for more cyber-attacks to happen.

The advice has been and still remains “do not pay the ransom”, if you do fall victim to hackers – by people paying the ransom they continue to fuel a vicious cybercrime circle. Even though people do pay, there is also no guarantee that people will regain access to their computer system.
read more

By Author

We offer genuine No Win, No Fee agreements for our clients. Why we do this is simple:

Leading Data Breach Lawyers
Our experience speaks for itself.
We will fight for your right to compensation.
Access to Justice
As a victim of a data breach or hack, you deserve your chance to get access to justice.
Risks Assessment
We carefully risk assess your case and take it on if we think we have a good chance of winning the claim.

Request A Callback From Our Team

Fill out our quick call back form below and we'll contact you when you're ready to talk to us.

Your privacy is extremely important to us. Information on how we handle your data is in our Privacy Policy

solicitors regulation authority

SRA
Contact
www.dataleaklawyers.co.uk is © of Your Lawyers Limited - we are 'Authorised and Regulated by the Solicitors Regulation Authority (SRA number 508768)'
arrow-up icon