247 Detectives

Please Call NOW 0845 520 4121 / 07017 411 007

Please Call NOW 0845 520 4121 / 07017 411 007

Content Area 1

1st Call Detectives Blog

Get the latest information & news from the industry...

Archive +

Tags

Archive by Date

What we can learn from high profile hacking cases

by Josef Kafka

It is important to securely encrypt all your devices. Hacking can affect anyone, as seen in the number of high profile security breach cases. Cyber criminals have targeted a number of industries and succeeded in obtaining confidential data. It is useful for all cyber users to analyse these cases in order to understand how they happened and learn how similar attacks can be prevented in the future.

In 2014 Apple’s iCloud service suffered a large-scale security breach. The private data of users was obtained by the hackers and released into the public on online messaging boards. The most high profile data stolen and leaked was that of nude pictures of celebrities, in what was known as ‘The Fappening’.

It is believed hackers took advantage of iCloud’s API, which gave them unlimited attempts to guess user’s passwords. The leak drew attention to the privacy and security concerns of cloud-based data storage. This method of storage is utilised worldwide for both private and commercial use. It is of particular concern to businesses that their confidential data may not be fully secured when stored on a third party database.

The 2014 leaks were due to both brute force attacks and phishing scams. It is believed that some hackers posed as Apple security employees and emailed users in order for them to pass over private security information. The high profile images were sold by the hackers in exchange for Bitcoin, making tracing by authorities more difficult. 

This leak could be seen as not being of concern to average cloud users. After all, it was targeted specifically at celebrities and the hacker had little interest in accessing the average user’s data. However, this leak shows just how vulnerable cloud-based storage can be when the user does not take the necessary security precautions. 

Because of Apple’s information integration system, hackers also had access to their victims’ address books, phone logs, calendars and any other backed up data. This shows us that one security breach can potentially give hackers access to a plethora of personal information. Having such sensitive, intimate data stolen and released is a violation that all cloud users should learn from.

It is believed by some security analysts that a more secure two-factor authentication system could have prevented the breach. Since 2014 Apple has done just that and their security protocols are more advanced. However, all those who store data on cloud computing should still be wary of phishing scams and seek advice from security tech specialists on how to properly encrypt their private data.

2014 was also the year of the Sony Pictures hack. Confidential data from the film studio was accessed and leaked. This included personal information such as the salaries and addresses of employees. The hackers used a malware worm tool to destroy the company’s security system. The hackers, a political group called the Guardians of Peace, have stated that they had access to Sony’s system for a year before the hack became public. 

The attack was targeted and perhaps even state-sponsored. Again, the average computer user may feel that this data breach should not be of concern to them. The hackers targeted a large corporate business. However, it should be recognised that, if such an attack can occur on a large infrastructure, then it is even easier to breach a smaller privately owned company. It is more important than ever to take the necessary security precautions to keep all devices encrypted.

The Sony hack may have only directly affected those who worked there, but a similar attack had a negative impact on the health of an entire nation. In 2017, the NHS was hacked, causing widespread disruption. Staff computers were locked and it became clear that ransomware was involved. The malicious software infected computers with messages stating that they would remain locked until money was paid. The ransomware also infected the Russian Interior Ministry and numerous companies, making it one of the biggest virus outbreaks in history. 

NHS patients became concerned that their medical records may not be secure. The ransomware first infects a computer when someone clicks onto a dangerous link or downloads an image file. The ransomware can then copy itself on to all the computers on the same network. This is what happened to many computers used by medical practitioners and it crippled numerous NHS trusts. Without access to medical records, doctors could not adequately treat patients.

It was later revealed that it was already noted by some before the attack that the NHS was vulnerable. Their cybersecurity systems were severely outdated and there were numerous vulnerabilities. This attack is a lesson for all business and private computer users. The best defence against cyber criminals and hackers is that first and foremost all security software and systems must be up to date. Hackers prey on vulnerabilities and the best way to stop them is to be one step ahead when it comes to encryption.

1stCallDetectives value customer privacy, security and discretion. For this reason, we have an encryption certificate on our site to keep all visitors safe.

Leave a comment
Areas & Postcodes We Cover
  • NW7, NW9, NW4, NW11, NW2, NW10, NW6, NW3, NW8, NW5, NW1, N20, N12, N3, N2, N10, N6, N8, N19, N7, N1, N5, N4, N16, N15, N17, N18, N11, N14, N21, N9, N13, N22 
  • E4, E17, E18, E5, E10, E11, E8, E9, E2, E1, E14, E3, E16, E6, E13, E15, E7, E12, SW6, SW10, SW5, SW7, SW3, SW1, SW14, SW13, SW15, SW20, SW19, SW18, SW17, SW16, SW12, SW2, SW9, SW8, SW11, SW4
  • EC4, EC1, EC2, EC3, SE1, SE11, SE17, SE16, SE5, SE15, SE14, SE8, SE24, SE22, SE4, SE21, SE23, SE26, SE20, SE25, SE19, SE6, SE12, SE9, SE18, SE2, SE28, SE7, SE10, SE3, SE13 
  • W1P W1M W1N W1R W1S W1T W1U W1V W1W W1X W1Y W1K W1J W1H W1A W1B W1C W1D W1F W1G W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
     
  • © All rights reserved 2014 '1st Call Detectives'
  • /
  • Website designed & devloped by evokeu