Both Skype and Snapchat left humiliated over hackers

Both Skype and Snapchat left humiliated over hackers

posted in Product ● 2 Jan 2014

Both Snapchat and Skype were embarrassed over the festive period as hackers exposed vulnerabilities in their software.  Hackers published over 4.6 million Snapchat user names plus their corresponding phone numbers online; although the website has now been deactivated no-one can be sure how many copies of the data were made. Snapchat had been made aware of the security weakness in August 2013 by another firm, Gibson Security, yet had not made suitable attempts to patch the software until too late.

In a press statement, the hackers stated “it is understandable that tech startups have limited resources but security and privacy should not be a secondary goal. Security matters as much as user experience does.” Additionally, the Syrian Electronic Army took over Skype’s blog, Facebook and Twitter accounts posting messages such as “Stop spying on people!” and “Don’t use Microsoft emails” etc, with these messages being retweeted over 8000 times. This comes after Skype was exposed for allegedly cooperating in the Prism program, exposed by Snowden in 2013. Although no user information was compromised in this case it highlights the ease at which hackers can take over should appropriate security measures fail to be implemented.

All too often there are news stories of data breaches and exposed weaknesses in software. Failure to appropriately store data compromises customer security, rendering them vulnerable to vicious attacks, as well as risking long term damage to reputation, revenue and heavy fines.

Conforming to proper security measures need not be a burden, through using Redstor’s range of secure cloud services, organisations can take advantage of our pedigree to guarantee data protection for themselves and their customers. Already protecting over 10,000 organisations; what will it take before you leave the security to us?

Security and data protection are at the forefront of Redstor’s offerings and we promise full compliance with the Data Protection Act. Redstor’s range of secure, encrypted services for the public and private sectors ensure that the burden of maintaining compliance with the Data Protection Act is made easier and can be achieved more cost-effectively. Our Offsite Backup service ensures data is safely backed up offsite in an encrypted format. Our cloud sync and share service, Centrastor, enables organisations to store and share files securely online from any device with an Internet connection and our CentraStage service enables support providers to guarantee that devices they support are regularly audited, patched and safely up-to-date for effective centralised device management. Our Virtual Disaster Recovery service guarantees to have your systems up and running within minutes following a disaster. To find out more about our services and how we can help you comply with data protection laws and prevent data leakage, please contact us either by giving us a ring on 01189 515 200 or emailing [email protected].

See the future of data management. Now

Watch our product demos to find out more about our solution.

Benefits of Outsourced Data Backup

What are the advantages of outsourced data backup?

There are many reasons that businesses and their IT teams may weigh up the option to backup and protect data with an inhouse solutions versus outsourcing data backup.

Continue reading
Cyber-Criminals Targeting Schools

What can schools do about being soft targets for cyber-criminals?

Cyber-criminals are increasingly viewing education institutions as easy prey. No surprise then that the UK’s National Cyber Security Centre (NCSC) recently warned of a spike in the targeting of schools, universities and colleges.

Continue reading
Data Protection for Google Outages

Google outage is a data protection wake-up call for businesses

The majority of Google services went down yesterday, leading to widespread disruption all around the world. Users were left waiting for almost an hour before hearing they could regain access. 

Continue reading