SlideShare une entreprise Scribd logo
1  sur  10
@StoretecHull

www.storetec.net

Facebook.com/storetec
Storetec Services Limited

Tree Incident Shows Value of Remote Working
When it was launched, Snapchat seemed to be a great idea: This was
a form of social media that, like Facebook, Bebo and many others,
could carry photos. However, instead of access to view images
being fixed according to privacy settings, the site worked simply
through the sender delivering a picture to the recipient that would
only be visible for a few seconds.
After this, the picture would vanish, ensuring the image could not be reused. It would mean people could, for example, send 'selfies' of a kind
that might cause embarrassment were they to become public, without
any risk that this would actually happen.
However, just such a possibility now faces many users and it could
provide lessons for business security as well. A new app called
Snaphack has been created, which enables the recipient to reopen the
image without the sender knowing. Once in possession of it, such an
image may be used maliciously.
Speaking to the BBC, Snaphack's creator, UK-based developer Darren
Jones, was unrepentant. He said: "Snapchat has not been in touch and
I imagine it's only a matter of time until they request that my app is
removed. But my app just proves and informs people that these apps
exist and people need to be careful."
He added: "For months people have been sending private images
without knowing it has been possible to do this kind of thing with them
with other apps. The ideal response from Snapchat will be to put a
system in place to stop people being able to save images in this way or
any other."
The use of the app is a breach of Snapchat's terms of use, but not the
law – it can be bought from Apple – and the fact that anyone could
deploy an app that circumvents the system and abuses the purpose of
the site is of greater significance. After all, cyber criminals by definition
are not people who play by the rules, so they will go a lot further in the
deployment of data-breaching devices than Snaphack.
.
This raises questions over data storage that companies must ask
themselves, if they are to keep their information secure. In the past,
when paper records were kept, staying safe meant locking the filing
cabinet, and eliminating sensitive information to prevent it falling into
the wrong hands meant loading it into the shredder. Leaking this data
could be achieved through photocopying and then either spiriting the
duplicates out of the office in a briefcase or by faxing
However, with electronic data the key is to ensure that it can either be
destroyed entirely or stored in a way that is so secure no third party can
access it. As Snaphack shows, software loaded onto a system that can
track data may cause it to reach third parties. Spyware, trojans and
key-loggers (which can track what is being typed) are examples of the
viral threats out there. Some of these were contained in the Blackhole
and Cool malware kits sold by a cyber criminal calling himself Paunch,
who authorities in Russia reportedly believed they had arrested earlier
this month.
The use of Snapchat has been associated with the rise of sexting,
where individuals send others particularly intimate pictures for the
purpose of furthering their aims to start a relationship. This carries the
risk that, were such images to fall into the wrong hands, the individual
who sent them could be the subject of blackmail or simply the malicious
use of the pictures, not least if the person who obtains the images
knows the sender.
For companies, the consequences could be even worse, with the theft
of data meaning rivals could get an early warning of a company's
plans, while blackmailing or the theft of account details could be used
for ill-gotten financial gain.
The Snapchat issue is just one of many in which Britons could be
falling short on data security.
Last month, research published by Sainsbury's Bank indicated that two
billion pieces of digital content had been lost by Britons in the
preceding 24 months, worth more than £1 billion. As well as losing
things of personal value and favourite songs, it can also mean work
data is also at risk of ending up in the wrong hands.
Storetec News/Blogs."http://www.storetec.net/news-blog/tree-incidentshows-value-of-remote-working/". Tree Incident Shows Value of
Remote Working. Oct 16. Storetec.
Storetec News/Blogs."http://www.storetec.net/news-blog/tree-incidentshows-value-of-remote-working/". Tree Incident Shows Value of
Remote Working. Oct 16. Storetec.

Contenu connexe

Tendances

Facebook's privacy breach
Facebook's privacy breachFacebook's privacy breach
Facebook's privacy breachManishaRani37
 
Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...Danny Oosterveer
 
Fake News, Electronic Information and Transaction Law, and Civil Society Init...
Fake News, Electronic Information and Transaction Law, and Civil Society Init...Fake News, Electronic Information and Transaction Law, and Civil Society Init...
Fake News, Electronic Information and Transaction Law, and Civil Society Init...Ismail Fahmi
 
Community of Practice Innovatie
Community of Practice InnovatieCommunity of Practice Innovatie
Community of Practice InnovatieMarga van Rijssel
 
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal Jaskaran Narula
 

Tendances (8)

Facebook's privacy breach
Facebook's privacy breachFacebook's privacy breach
Facebook's privacy breach
 
Pentest trends 2017
Pentest trends 2017Pentest trends 2017
Pentest trends 2017
 
B intelligence report-08-2013.en-us
B intelligence report-08-2013.en-usB intelligence report-08-2013.en-us
B intelligence report-08-2013.en-us
 
Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...
 
Fake News, Electronic Information and Transaction Law, and Civil Society Init...
Fake News, Electronic Information and Transaction Law, and Civil Society Init...Fake News, Electronic Information and Transaction Law, and Civil Society Init...
Fake News, Electronic Information and Transaction Law, and Civil Society Init...
 
Community of Practice Innovatie
Community of Practice InnovatieCommunity of Practice Innovatie
Community of Practice Innovatie
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
 

En vedette

(Artigo) lousada, eliane g. a abordagem do interacionismo socio discursivo pa...
(Artigo) lousada, eliane g. a abordagem do interacionismo socio discursivo pa...(Artigo) lousada, eliane g. a abordagem do interacionismo socio discursivo pa...
(Artigo) lousada, eliane g. a abordagem do interacionismo socio discursivo pa...Mayara Toledo
 
Message from Dr McFall
Message from Dr McFallMessage from Dr McFall
Message from Dr McFallMinesh Lad
 
7th math c2 -l32
7th math c2 -l327th math c2 -l32
7th math c2 -l32jdurst65
 
Locations recce
Locations recce  Locations recce
Locations recce adamfox2052
 
Comunicación digital M716
Comunicación digital M716Comunicación digital M716
Comunicación digital M716Daniela935
 
О состоянии и перспективах развития системы дошкольного образования в Респу...
О состоянии и перспективах развития системы  дошкольного образования  в Респу...О состоянии и перспективах развития системы  дошкольного образования  в Респу...
О состоянии и перспективах развития системы дошкольного образования в Респу...infoncepakz
 
TIK Kelas IX bab 3
TIK Kelas IX bab 3TIK Kelas IX bab 3
TIK Kelas IX bab 3Rifdahfara
 
Administración de medicamentos_sonia_rodríguez
Administración de medicamentos_sonia_rodríguezAdministración de medicamentos_sonia_rodríguez
Administración de medicamentos_sonia_rodríguezLiva Yobel
 
Brendel Group Presentation: 17 Oct 2013
Brendel Group Presentation: 17 Oct 2013Brendel Group Presentation: 17 Oct 2013
Brendel Group Presentation: 17 Oct 2013danielstandage
 
Kerala - The Land of Coconuts
Kerala  - The Land of CoconutsKerala  - The Land of Coconuts
Kerala - The Land of CoconutsARJUNPRATHEEP
 

En vedette (16)

(Artigo) lousada, eliane g. a abordagem do interacionismo socio discursivo pa...
(Artigo) lousada, eliane g. a abordagem do interacionismo socio discursivo pa...(Artigo) lousada, eliane g. a abordagem do interacionismo socio discursivo pa...
(Artigo) lousada, eliane g. a abordagem do interacionismo socio discursivo pa...
 
Message from Dr McFall
Message from Dr McFallMessage from Dr McFall
Message from Dr McFall
 
Ejercicio en niños
Ejercicio en niñosEjercicio en niños
Ejercicio en niños
 
7th math c2 -l32
7th math c2 -l327th math c2 -l32
7th math c2 -l32
 
Aces
Aces Aces
Aces
 
herramientasWeb emig
herramientasWeb emigherramientasWeb emig
herramientasWeb emig
 
Locations recce
Locations recce  Locations recce
Locations recce
 
Comunicación digital M716
Comunicación digital M716Comunicación digital M716
Comunicación digital M716
 
INTERNET
INTERNET INTERNET
INTERNET
 
О состоянии и перспективах развития системы дошкольного образования в Респу...
О состоянии и перспективах развития системы  дошкольного образования  в Респу...О состоянии и перспективах развития системы  дошкольного образования  в Респу...
О состоянии и перспективах развития системы дошкольного образования в Респу...
 
TIK Kelas IX bab 3
TIK Kelas IX bab 3TIK Kelas IX bab 3
TIK Kelas IX bab 3
 
Administración de medicamentos_sonia_rodríguez
Administración de medicamentos_sonia_rodríguezAdministración de medicamentos_sonia_rodríguez
Administración de medicamentos_sonia_rodríguez
 
Gridle_tour
Gridle_tourGridle_tour
Gridle_tour
 
SAIF CV1
SAIF CV1SAIF CV1
SAIF CV1
 
Brendel Group Presentation: 17 Oct 2013
Brendel Group Presentation: 17 Oct 2013Brendel Group Presentation: 17 Oct 2013
Brendel Group Presentation: 17 Oct 2013
 
Kerala - The Land of Coconuts
Kerala  - The Land of CoconutsKerala  - The Land of Coconuts
Kerala - The Land of Coconuts
 

Similaire à Snapchat Flaw Shows Need for Secure Data Storage

An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
Image Intelligence: Making Visual Content Predictive
Image Intelligence: Making Visual Content PredictiveImage Intelligence: Making Visual Content Predictive
Image Intelligence: Making Visual Content PredictiveAllan V. Braverman
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...IRJET Journal
 
The Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeThe Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeCindy Beneteau
 
Your money or your files
Your money or your filesYour money or your files
Your money or your filesRoel Palmaers
 
Snapchat Hacking Services Exploring the Domain of Professional Snapchat Hacke...
Snapchat Hacking Services Exploring the Domain of Professional Snapchat Hacke...Snapchat Hacking Services Exploring the Domain of Professional Snapchat Hacke...
Snapchat Hacking Services Exploring the Domain of Professional Snapchat Hacke...PaulDalfio
 
Opfu to I’ll t u eh bc I’m gm I’m ref sf t as you DM
Opfu to I’ll t  u eh bc I’m gm I’m ref sf t as you DMOpfu to I’ll t  u eh bc I’m gm I’m ref sf t as you DM
Opfu to I’ll t u eh bc I’m gm I’m ref sf t as you DMgsdcougar8040f
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phaseDeepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phaseaditi agarwal
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
Comparison Analysis and Data Retrieval to identify the associated people of ...
 Comparison Analysis and Data Retrieval to identify the associated people of ... Comparison Analysis and Data Retrieval to identify the associated people of ...
Comparison Analysis and Data Retrieval to identify the associated people of ...Sandul Jayakody
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 
Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013Kenn Peterson
 
PRIVI WEB - REDEFINING PRIVACY
PRIVI WEB - REDEFINING PRIVACYPRIVI WEB - REDEFINING PRIVACY
PRIVI WEB - REDEFINING PRIVACYMaurizio Comelli
 

Similaire à Snapchat Flaw Shows Need for Secure Data Storage (20)

L017146571
L017146571L017146571
L017146571
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
Image Intelligence: Making Visual Content Predictive
Image Intelligence: Making Visual Content PredictiveImage Intelligence: Making Visual Content Predictive
Image Intelligence: Making Visual Content Predictive
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
 
The Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeThe Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in Life
 
Your money or your files
Your money or your filesYour money or your files
Your money or your files
 
W3W WEEK #24
W3W WEEK #24W3W WEEK #24
W3W WEEK #24
 
Snapchat Hacking Services Exploring the Domain of Professional Snapchat Hacke...
Snapchat Hacking Services Exploring the Domain of Professional Snapchat Hacke...Snapchat Hacking Services Exploring the Domain of Professional Snapchat Hacke...
Snapchat Hacking Services Exploring the Domain of Professional Snapchat Hacke...
 
Opfu to I’ll t u eh bc I’m gm I’m ref sf t as you DM
Opfu to I’ll t  u eh bc I’m gm I’m ref sf t as you DMOpfu to I’ll t  u eh bc I’m gm I’m ref sf t as you DM
Opfu to I’ll t u eh bc I’m gm I’m ref sf t as you DM
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phaseDeepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
 
Spyware
SpywareSpyware
Spyware
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Comparison Analysis and Data Retrieval to identify the associated people of ...
 Comparison Analysis and Data Retrieval to identify the associated people of ... Comparison Analysis and Data Retrieval to identify the associated people of ...
Comparison Analysis and Data Retrieval to identify the associated people of ...
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013
 
Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?
Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?
Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?
 
PRIVI WEB - REDEFINING PRIVACY
PRIVI WEB - REDEFINING PRIVACYPRIVI WEB - REDEFINING PRIVACY
PRIVI WEB - REDEFINING PRIVACY
 

Plus de John Davis

Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network John Davis
 
Data protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearData protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearJohn Davis
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataJohn Davis
 
Uk banks targeted in cyber attacks
Uk banks targeted in cyber attacksUk banks targeted in cyber attacks
Uk banks targeted in cyber attacksJohn Davis
 
Glasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryGlasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryJohn Davis
 
Burglary figures may highlight byod data risk
Burglary figures may highlight byod data riskBurglary figures may highlight byod data risk
Burglary figures may highlight byod data riskJohn Davis
 
Uk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsUk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsJohn Davis
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problemJohn Davis
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’John Davis
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firmsJohn Davis
 
Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’John Davis
 
Bitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionBitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionJohn Davis
 
Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’John Davis
 
Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’John Davis
 
Data security breach may embarrass fa
Data security breach may embarrass faData security breach may embarrass fa
Data security breach may embarrass faJohn Davis
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsJohn Davis
 
Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’John Davis
 
Data centres getting greener, say experts
Data centres getting greener, say expertsData centres getting greener, say experts
Data centres getting greener, say expertsJohn Davis
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeJohn Davis
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacksJohn Davis
 

Plus de John Davis (20)

Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network Norfolk County Council Announces Cloud-based Storage Network
Norfolk County Council Announces Cloud-based Storage Network
 
Data protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a yearData protection rules could cost firms £75k a year
Data protection rules could cost firms £75k a year
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
Uk banks targeted in cyber attacks
Uk banks targeted in cyber attacksUk banks targeted in cyber attacks
Uk banks targeted in cyber attacks
 
Glasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recoveryGlasgow tragedy shows need for disaster recovery
Glasgow tragedy shows need for disaster recovery
 
Burglary figures may highlight byod data risk
Burglary figures may highlight byod data riskBurglary figures may highlight byod data risk
Burglary figures may highlight byod data risk
 
Uk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concernsUk risks falling behind others in cloud adoption due to data security concerns
Uk risks falling behind others in cloud adoption due to data security concerns
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problem
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’
 
Improve your security, minister tells major firms
Improve your security, minister tells major firmsImprove your security, minister tells major firms
Improve your security, minister tells major firms
 
Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’Paperless self assessment ‘a step closer’
Paperless self assessment ‘a step closer’
 
Bitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 millionBitcoin data loss set to cost over £4 million
Bitcoin data loss set to cost over £4 million
 
Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’Tesco data centre consolidation ‘nearing completion’
Tesco data centre consolidation ‘nearing completion’
 
Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’Colonial files ‘burned to keep secrets’
Colonial files ‘burned to keep secrets’
 
Data security breach may embarrass fa
Data security breach may embarrass faData security breach may embarrass fa
Data security breach may embarrass fa
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegations
 
Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’
 
Data centres getting greener, say experts
Data centres getting greener, say expertsData centres getting greener, say experts
Data centres getting greener, say experts
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk trade
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
 

Dernier

Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Developmentnarsireddynannuri1
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...narsireddynannuri1
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreiebhavenpr
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhbhavenpr
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.pptsammehtumblr
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfFahimUddin61
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkobhavenpr
 

Dernier (20)

Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdf
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 

Snapchat Flaw Shows Need for Secure Data Storage

  • 1. @StoretecHull www.storetec.net Facebook.com/storetec Storetec Services Limited Tree Incident Shows Value of Remote Working When it was launched, Snapchat seemed to be a great idea: This was a form of social media that, like Facebook, Bebo and many others, could carry photos. However, instead of access to view images being fixed according to privacy settings, the site worked simply through the sender delivering a picture to the recipient that would only be visible for a few seconds.
  • 2. After this, the picture would vanish, ensuring the image could not be reused. It would mean people could, for example, send 'selfies' of a kind that might cause embarrassment were they to become public, without any risk that this would actually happen. However, just such a possibility now faces many users and it could provide lessons for business security as well. A new app called Snaphack has been created, which enables the recipient to reopen the image without the sender knowing. Once in possession of it, such an image may be used maliciously.
  • 3. Speaking to the BBC, Snaphack's creator, UK-based developer Darren Jones, was unrepentant. He said: "Snapchat has not been in touch and I imagine it's only a matter of time until they request that my app is removed. But my app just proves and informs people that these apps exist and people need to be careful." He added: "For months people have been sending private images without knowing it has been possible to do this kind of thing with them with other apps. The ideal response from Snapchat will be to put a system in place to stop people being able to save images in this way or any other."
  • 4. The use of the app is a breach of Snapchat's terms of use, but not the law – it can be bought from Apple – and the fact that anyone could deploy an app that circumvents the system and abuses the purpose of the site is of greater significance. After all, cyber criminals by definition are not people who play by the rules, so they will go a lot further in the deployment of data-breaching devices than Snaphack. .
  • 5. This raises questions over data storage that companies must ask themselves, if they are to keep their information secure. In the past, when paper records were kept, staying safe meant locking the filing cabinet, and eliminating sensitive information to prevent it falling into the wrong hands meant loading it into the shredder. Leaking this data could be achieved through photocopying and then either spiriting the duplicates out of the office in a briefcase or by faxing
  • 6. However, with electronic data the key is to ensure that it can either be destroyed entirely or stored in a way that is so secure no third party can access it. As Snaphack shows, software loaded onto a system that can track data may cause it to reach third parties. Spyware, trojans and key-loggers (which can track what is being typed) are examples of the viral threats out there. Some of these were contained in the Blackhole and Cool malware kits sold by a cyber criminal calling himself Paunch, who authorities in Russia reportedly believed they had arrested earlier this month.
  • 7. The use of Snapchat has been associated with the rise of sexting, where individuals send others particularly intimate pictures for the purpose of furthering their aims to start a relationship. This carries the risk that, were such images to fall into the wrong hands, the individual who sent them could be the subject of blackmail or simply the malicious use of the pictures, not least if the person who obtains the images knows the sender. For companies, the consequences could be even worse, with the theft of data meaning rivals could get an early warning of a company's plans, while blackmailing or the theft of account details could be used for ill-gotten financial gain.
  • 8. The Snapchat issue is just one of many in which Britons could be falling short on data security. Last month, research published by Sainsbury's Bank indicated that two billion pieces of digital content had been lost by Britons in the preceding 24 months, worth more than £1 billion. As well as losing things of personal value and favourite songs, it can also mean work data is also at risk of ending up in the wrong hands.

Notes de l'éditeur

  1. {}