SlideShare a Scribd company logo
@StoretecHull

www.storetec.net

Facebook.com/storetec
Storetec Services Limited

Tree Incident Shows Value of Remote Working
When it was launched, Snapchat seemed to be a great idea: This was
a form of social media that, like Facebook, Bebo and many others,
could carry photos. However, instead of access to view images
being fixed according to privacy settings, the site worked simply
through the sender delivering a picture to the recipient that would
only be visible for a few seconds.
After this, the picture would vanish, ensuring the image could not be reused. It would mean people could, for example, send 'selfies' of a kind
that might cause embarrassment were they to become public, without
any risk that this would actually happen.
However, just such a possibility now faces many users and it could
provide lessons for business security as well. A new app called
Snaphack has been created, which enables the recipient to reopen the
image without the sender knowing. Once in possession of it, such an
image may be used maliciously.
Speaking to the BBC, Snaphack's creator, UK-based developer Darren
Jones, was unrepentant. He said: "Snapchat has not been in touch and
I imagine it's only a matter of time until they request that my app is
removed. But my app just proves and informs people that these apps
exist and people need to be careful."
He added: "For months people have been sending private images
without knowing it has been possible to do this kind of thing with them
with other apps. The ideal response from Snapchat will be to put a
system in place to stop people being able to save images in this way or
any other."
The use of the app is a breach of Snapchat's terms of use, but not the
law – it can be bought from Apple – and the fact that anyone could
deploy an app that circumvents the system and abuses the purpose of
the site is of greater significance. After all, cyber criminals by definition
are not people who play by the rules, so they will go a lot further in the
deployment of data-breaching devices than Snaphack.
.
This raises questions over data storage that companies must ask
themselves, if they are to keep their information secure. In the past,
when paper records were kept, staying safe meant locking the filing
cabinet, and eliminating sensitive information to prevent it falling into
the wrong hands meant loading it into the shredder. Leaking this data
could be achieved through photocopying and then either spiriting the
duplicates out of the office in a briefcase or by faxing
However, with electronic data the key is to ensure that it can either be
destroyed entirely or stored in a way that is so secure no third party can
access it. As Snaphack shows, software loaded onto a system that can
track data may cause it to reach third parties. Spyware, trojans and
key-loggers (which can track what is being typed) are examples of the
viral threats out there. Some of these were contained in the Blackhole
and Cool malware kits sold by a cyber criminal calling himself Paunch,
who authorities in Russia reportedly believed they had arrested earlier
this month.
The use of Snapchat has been associated with the rise of sexting,
where individuals send others particularly intimate pictures for the
purpose of furthering their aims to start a relationship. This carries the
risk that, were such images to fall into the wrong hands, the individual
who sent them could be the subject of blackmail or simply the malicious
use of the pictures, not least if the person who obtains the images
knows the sender.
For companies, the consequences could be even worse, with the theft
of data meaning rivals could get an early warning of a company's
plans, while blackmailing or the theft of account details could be used
for ill-gotten financial gain.
The Snapchat issue is just one of many in which Britons could be
falling short on data security.
Last month, research published by Sainsbury's Bank indicated that two
billion pieces of digital content had been lost by Britons in the
preceding 24 months, worth more than £1 billion. As well as losing
things of personal value and favourite songs, it can also mean work
data is also at risk of ending up in the wrong hands.
Storetec News/Blogs."http://www.storetec.net/news-blog/tree-incidentshows-value-of-remote-working/". Tree Incident Shows Value of
Remote Working. Oct 16. Storetec.
Storetec News/Blogs."http://www.storetec.net/news-blog/tree-incidentshows-value-of-remote-working/". Tree Incident Shows Value of
Remote Working. Oct 16. Storetec.

More Related Content

PDF
Cyber Security : An attempt to assimilate and technically understand it
PDF
Developer’s silence raises concern about surespot encrypted messenger
PDF
A Brief History of Facebook Controversies
DOCX
Developer’s silence raises concern about surespot encrypted messenger
PPT
Stage II Critical Reading
PPTX
A Guide to Mixpanel
PDF
Facebook
PDF
Tracked and hacked
Cyber Security : An attempt to assimilate and technically understand it
Developer’s silence raises concern about surespot encrypted messenger
A Brief History of Facebook Controversies
Developer’s silence raises concern about surespot encrypted messenger
Stage II Critical Reading
A Guide to Mixpanel
Facebook
Tracked and hacked

What's hot (8)

PPTX
Facebook's privacy breach
PDF
Pentest trends 2017
PDF
B intelligence report-08-2013.en-us
PPTX
Guestlecture Online & social media data, for masterstudents Business Administ...
PDF
Fake News, Electronic Information and Transaction Law, and Civil Society Init...
ODP
Community of Practice Innovatie
PPTX
Open Source Intelligence
PDF
News Bytes by Jaskaran Narula - Null Meet Bhopal
Facebook's privacy breach
Pentest trends 2017
B intelligence report-08-2013.en-us
Guestlecture Online & social media data, for masterstudents Business Administ...
Fake News, Electronic Information and Transaction Law, and Civil Society Init...
Community of Practice Innovatie
Open Source Intelligence
News Bytes by Jaskaran Narula - Null Meet Bhopal
Ad

Viewers also liked (16)

PDF
(Artigo) lousada, eliane g. a abordagem do interacionismo socio discursivo pa...
PDF
Message from Dr McFall
PPTX
Ejercicio en niños
PDF
7th math c2 -l32
PPTX
herramientasWeb emig
DOCX
Locations recce
PPTX
Comunicación digital M716
PPTX
INTERNET
PDF
О состоянии и перспективах развития системы дошкольного образования в Респу...
PPTX
TIK Kelas IX bab 3
PPTX
Administración de medicamentos_sonia_rodríguez
PDF
Gridle_tour
PPTX
Brendel Group Presentation: 17 Oct 2013
PPTX
Kerala - The Land of Coconuts
(Artigo) lousada, eliane g. a abordagem do interacionismo socio discursivo pa...
Message from Dr McFall
Ejercicio en niños
7th math c2 -l32
herramientasWeb emig
Locations recce
Comunicación digital M716
INTERNET
О состоянии и перспективах развития системы дошкольного образования в Респу...
TIK Kelas IX bab 3
Administración de medicamentos_sonia_rodríguez
Gridle_tour
Brendel Group Presentation: 17 Oct 2013
Kerala - The Land of Coconuts
Ad

Similar to Tree incident shows value of remote working (20)

PDF
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
PDF
L017146571
PDF
Image Intelligence: Making Visual Content Predictive
PDF
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
PDF
The Deception of Privacy, The Truth About a Plugged in Life
PDF
Your money or your files
PPTX
W3W WEEK #24
PDF
Snapchat Hacking Services Exploring the Domain of Professional Snapchat Hacke...
PDF
Opfu to I’ll t u eh bc I’m gm I’m ref sf t as you DM
PPTX
Designing for Privacy NY Studio—10/04/21
PDF
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
PDF
Spyware
PDF
Social Network Crime on Rise
DOCX
(300-400 words)1- Watch anyone of the following documentarymovi.docx
PDF
Comparison Analysis and Data Retrieval to identify the associated people of ...
DOCX
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
PPTX
Designing for Privacy in an Increasingly Public World
PDF
Symantec Intelligence Report August 2013
PDF
Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?
PPSX
PRIVI WEB - REDEFINING PRIVACY
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
L017146571
Image Intelligence: Making Visual Content Predictive
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
The Deception of Privacy, The Truth About a Plugged in Life
Your money or your files
W3W WEEK #24
Snapchat Hacking Services Exploring the Domain of Professional Snapchat Hacke...
Opfu to I’ll t u eh bc I’m gm I’m ref sf t as you DM
Designing for Privacy NY Studio—10/04/21
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
Spyware
Social Network Crime on Rise
(300-400 words)1- Watch anyone of the following documentarymovi.docx
Comparison Analysis and Data Retrieval to identify the associated people of ...
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Designing for Privacy in an Increasingly Public World
Symantec Intelligence Report August 2013
Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?
PRIVI WEB - REDEFINING PRIVACY

More from John Davis (20)

PPT
Norfolk County Council Announces Cloud-based Storage Network
PPT
Data protection rules could cost firms £75k a year
PPT
App Developers Urged to Take Greater Care in Accessing Data
PPT
Uk banks targeted in cyber attacks
PPT
Glasgow tragedy shows need for disaster recovery
PPT
Burglary figures may highlight byod data risk
PPT
Uk risks falling behind others in cloud adoption due to data security concerns
PPT
New microsoft application security problem
PPT
Choose Your Own Device ‘To Replace Bring Your Own Device’
PPT
Improve your security, minister tells major firms
PPT
Paperless self assessment ‘a step closer’
PPT
Bitcoin data loss set to cost over £4 million
PPT
Tesco data centre consolidation ‘nearing completion’
PPT
Colonial files ‘burned to keep secrets’
PPT
Data security breach may embarrass fa
PPT
Companies warned over new nsa malware allegations
PDF
Banks ‘falling s short on data protection’
PPT
Data centres getting greener, say experts
PPT
Data protection may be sidelined as eu and us talk trade
PPT
Microsoft warns of potential attacks
Norfolk County Council Announces Cloud-based Storage Network
Data protection rules could cost firms £75k a year
App Developers Urged to Take Greater Care in Accessing Data
Uk banks targeted in cyber attacks
Glasgow tragedy shows need for disaster recovery
Burglary figures may highlight byod data risk
Uk risks falling behind others in cloud adoption due to data security concerns
New microsoft application security problem
Choose Your Own Device ‘To Replace Bring Your Own Device’
Improve your security, minister tells major firms
Paperless self assessment ‘a step closer’
Bitcoin data loss set to cost over £4 million
Tesco data centre consolidation ‘nearing completion’
Colonial files ‘burned to keep secrets’
Data security breach may embarrass fa
Companies warned over new nsa malware allegations
Banks ‘falling s short on data protection’
Data centres getting greener, say experts
Data protection may be sidelined as eu and us talk trade
Microsoft warns of potential attacks

Recently uploaded (20)

PPTX
India’s Response to the Rohingya Refugee Crisis: Balancing National Security,...
PDF
Human Appeal in Gaza – Emergency Aid, Healthcare & Hope for Families.pdf
PDF
Best 5 Sites for Verified Cash App Accounts – BTC & Instant Delivery.pdf
PPTX
7th-president-Ramon-Magsaysay-Presentation.pptx
DOCX
End Of The Age TV Program: Depicting the Actual Truth in a World of Lies
PDF
Jim Stone Freelance Voterig August 13, 2025.pdf
DOC
BU毕业证学历认证,阿什兰大学毕业证文凭证书
PDF
Naya Bharat Vision 2047_ Key Takeaways from This Year’s Independence Day Them...
PDF
4th-president-of-the-Philippines-_20250 812_103637_0000.pdf
PPTX
Pakistan movement part 2: story about Pakistan Movement
PPTX
Rhythms of Freedom_ India Day Shines at Battery Dance Festival 2025.
PDF
History ppt on World War 2 and its consequences
PDF
9th-President-of-the-Philippines_lecture .pdf
PDF
The Blogs_ Hamas’s Deflection Playbook _ Andy Blumenthal _ The Times of Israe...
PDF
Mindanao Debate Lecture Presentation Outline 1.General Facts 2.Mindanao Histo...
PDF
Aron Govil on Why America Lacks Skilled Engineers.pdf
PDF
424926802-1987-Constitution-as-Basis-of-Environmental-Laws.pdf
PDF
Naidu Pushes for Rs 36 Crore Subsidy to Support Farmers in Need
PDF
Reviving Regional Truths: AI-Powered Journalism in Bangladesh
DOCX
Memecoin news and insights on memecoinist
India’s Response to the Rohingya Refugee Crisis: Balancing National Security,...
Human Appeal in Gaza – Emergency Aid, Healthcare & Hope for Families.pdf
Best 5 Sites for Verified Cash App Accounts – BTC & Instant Delivery.pdf
7th-president-Ramon-Magsaysay-Presentation.pptx
End Of The Age TV Program: Depicting the Actual Truth in a World of Lies
Jim Stone Freelance Voterig August 13, 2025.pdf
BU毕业证学历认证,阿什兰大学毕业证文凭证书
Naya Bharat Vision 2047_ Key Takeaways from This Year’s Independence Day Them...
4th-president-of-the-Philippines-_20250 812_103637_0000.pdf
Pakistan movement part 2: story about Pakistan Movement
Rhythms of Freedom_ India Day Shines at Battery Dance Festival 2025.
History ppt on World War 2 and its consequences
9th-President-of-the-Philippines_lecture .pdf
The Blogs_ Hamas’s Deflection Playbook _ Andy Blumenthal _ The Times of Israe...
Mindanao Debate Lecture Presentation Outline 1.General Facts 2.Mindanao Histo...
Aron Govil on Why America Lacks Skilled Engineers.pdf
424926802-1987-Constitution-as-Basis-of-Environmental-Laws.pdf
Naidu Pushes for Rs 36 Crore Subsidy to Support Farmers in Need
Reviving Regional Truths: AI-Powered Journalism in Bangladesh
Memecoin news and insights on memecoinist

Tree incident shows value of remote working

  • 1. @StoretecHull www.storetec.net Facebook.com/storetec Storetec Services Limited Tree Incident Shows Value of Remote Working When it was launched, Snapchat seemed to be a great idea: This was a form of social media that, like Facebook, Bebo and many others, could carry photos. However, instead of access to view images being fixed according to privacy settings, the site worked simply through the sender delivering a picture to the recipient that would only be visible for a few seconds.
  • 2. After this, the picture would vanish, ensuring the image could not be reused. It would mean people could, for example, send 'selfies' of a kind that might cause embarrassment were they to become public, without any risk that this would actually happen. However, just such a possibility now faces many users and it could provide lessons for business security as well. A new app called Snaphack has been created, which enables the recipient to reopen the image without the sender knowing. Once in possession of it, such an image may be used maliciously.
  • 3. Speaking to the BBC, Snaphack's creator, UK-based developer Darren Jones, was unrepentant. He said: "Snapchat has not been in touch and I imagine it's only a matter of time until they request that my app is removed. But my app just proves and informs people that these apps exist and people need to be careful." He added: "For months people have been sending private images without knowing it has been possible to do this kind of thing with them with other apps. The ideal response from Snapchat will be to put a system in place to stop people being able to save images in this way or any other."
  • 4. The use of the app is a breach of Snapchat's terms of use, but not the law – it can be bought from Apple – and the fact that anyone could deploy an app that circumvents the system and abuses the purpose of the site is of greater significance. After all, cyber criminals by definition are not people who play by the rules, so they will go a lot further in the deployment of data-breaching devices than Snaphack. .
  • 5. This raises questions over data storage that companies must ask themselves, if they are to keep their information secure. In the past, when paper records were kept, staying safe meant locking the filing cabinet, and eliminating sensitive information to prevent it falling into the wrong hands meant loading it into the shredder. Leaking this data could be achieved through photocopying and then either spiriting the duplicates out of the office in a briefcase or by faxing
  • 6. However, with electronic data the key is to ensure that it can either be destroyed entirely or stored in a way that is so secure no third party can access it. As Snaphack shows, software loaded onto a system that can track data may cause it to reach third parties. Spyware, trojans and key-loggers (which can track what is being typed) are examples of the viral threats out there. Some of these were contained in the Blackhole and Cool malware kits sold by a cyber criminal calling himself Paunch, who authorities in Russia reportedly believed they had arrested earlier this month.
  • 7. The use of Snapchat has been associated with the rise of sexting, where individuals send others particularly intimate pictures for the purpose of furthering their aims to start a relationship. This carries the risk that, were such images to fall into the wrong hands, the individual who sent them could be the subject of blackmail or simply the malicious use of the pictures, not least if the person who obtains the images knows the sender. For companies, the consequences could be even worse, with the theft of data meaning rivals could get an early warning of a company's plans, while blackmailing or the theft of account details could be used for ill-gotten financial gain.
  • 8. The Snapchat issue is just one of many in which Britons could be falling short on data security. Last month, research published by Sainsbury's Bank indicated that two billion pieces of digital content had been lost by Britons in the preceding 24 months, worth more than £1 billion. As well as losing things of personal value and favourite songs, it can also mean work data is also at risk of ending up in the wrong hands.

Editor's Notes