Dixons Carphone hit by major hack

      Comments Off on Dixons Carphone hit by major hack

Embattled telecom and electrical retailer Dixons Carphone has been hit by a massive data breach – one of Britain’s biggest to date. The breach first began in July 2017, but the company has only now admitted to it publicly. The hack exposed over one million personal data records and nearly… Read more »

Share

Cryptocurrency exchange takes cyber hit

      Comments Off on Cryptocurrency exchange takes cyber hit

Conrail, a South Korean cryptocurrency exchange, has suffered a £28m hack – about 30% of its turnover; sending the value of bitcoin and other virtual currencies spiraling downwards. Volatile at the best of times, this latest breach has again shone a spotlight on the lack of regulation and lax security… Read more »

Share

Diner’s customers hit by offensive tweets

      Comments Off on Diner’s customers hit by offensive tweets

Hackers recently hijacked the Twitter account of US diner and sports bar operator Buffalo Wild Wings and used it to post insulting tweets. The restaurant’s 700,000 followers were bombarded with racist and scatological tweets over a twenty-minute period before the company spotted the incursion and took them down. The chicken… Read more »

Share

Dashcam evidence lost in Atlanta ransomware attack

      Comments Off on Dashcam evidence lost in Atlanta ransomware attack

Hackers have launched a SamSam ransomware attack on Atlanta’s IT department, affecting nearly a third of the state’s software. The attack closed Atlanta’s courts for several weeks. The damage includes years of police records, including the irretrievable loss of a large amount of dashcam video footage. The state declined to… Read more »

Share

Introducing CFC’s Cyber Case Study Series

      Comments Off on Introducing CFC’s Cyber Case Study Series

Although cyber insurance is simple at its core – where property insurance protects against the theft, loss or damage of tangible assets, cyber insurance does the same for intangible assets – claims often develop in unexpected ways. That’s why we’re launching a Cyber Case Study Series, which will take a… Read more »

Share

Do health wearables pose a security risk?

      Comments Off on Do health wearables pose a security risk?

On one level, wearable healthcare could be the answer to many of the problems faced by patients, hospitals and medical practitioners – by providing better monitoring, freeing up beds and saving money. On the other hand, they could add another cybersecurity risk to the already hard-pressed healthcare industry. While clinical… Read more »

Share

UK attorney general talks tough on cyberattacks

      Comments Off on UK attorney general talks tough on cyberattacks

In a recent speech at Chatham House, Britain’s Attorney General has declared that state sponsored cyberattacks should be viewed as acts of war and punished accordingly. Singling out Russia and North Korea, Jeffrey Wright QC called for sanctions against any country that tries to interfere with democratic elections or disrupt critical… Read more »

Share

Chinese exploit cyber-arms dealer to spread malware

      Comments Off on Chinese exploit cyber-arms dealer to spread malware

HackingTeam is an Italian IT company that sells offensive intrusion and surveillance capabilities to governments, corporations and law enforcement agencies – but their technology is also being used by less scrupulous users. It now appears that Chinese cybercriminals are exploiting a breach suffered by HackingTeam in 2015 to infect thousands… Read more »

Share

IoT tool vulnerable to downgrade attack

      Comments Off on IoT tool vulnerable to downgrade attack

Z-Wave protocol is a radio frequency-based communications technology created to facilitate the management of Internet of Things appliances. Unfortunately, despite its sophisticated encryption system, Z-Wave is vulnerable to a downgrade attack – a protocol that forces computers to abandon their high-quality mode of operation in favour of a less effective… Read more »

Share