UK: the real risk of cyber attack
By Stewart James Patrick Van Eecke
New revelations of the cyber threat to government and business identify the risk of attack even when stopping for a cup of coffee. The solution is not to restrict the use of mobile computing devices but to enable access in a safe, controlled and informed manner.
Earlier this year, a government department hosted a conference in a central London hotel on cyber security. It is probably not surprising, therefore, that this event, which was attended by government ministers, senior government security officials and a range of cybersecurity experts, vendors, media and other professionals, came under cyber attack itself. The attack was perpetrated through the use of the hotel’s free-to-use WiFi internet access and involved the use of a technique known as ARP poisoning to intercept and, in some cases, modify communications over that network.
The event’s organisers have investigated this attack and have advised delegates who used the WiFi network that their login details, and consequently their communications, may have been compromised by the incident…
If you are registered and logged in to the site, click on the link below to read the DLA Piper briefing. If not, please register or sign in with your details below.
News from DLA Piper
News from The Lawyer
Briefings from DLA Piper
Employers have a much greater opportunity to collect and retain vast amounts of information. This information is useful to have on file — but what are the risks?
The anonymous nature of Bitcoin payments has caught the attention of tax authorities and other regulators, both in Australia and overseas.
Analysis from The Lawyer
The fragile refinance market is back in rude health and US-style alternative lenders are stepping up with innovative structures to sustain the recovery
The Lawyer’s latest Top 50 litigation firms list shows that business for dispute specialists is roaring along while new in-depth detail reveals the winning strategies