Title Published Date System Number of Articles Actions
Cyber Attacks Disrupt New Zealand Stock Exchange Operations for Days 2020-08-26 1. Network connectivity system of the NZX exchange [103586, 103567] 2. NZX main board, NZX debt market, and Fonterra shareholders market systems [103586, 103567] 2 View Details
Algorithm Failure in Public Services: Transparency and Bias Concerns 2020-08-24 1. Algorithm used by the exam regulator Ofqual to assess A-level grades [103566] 2. Algorithm used by councils to flag claims as "high risk" for potential welfare fraud [103566] 3. Algorithm used by Sunderland council to make efficiency savings [103566] 4. Data analytics system used by Hackney council to predict children at risk of neglect and abuse [103566] 5. Risk-based verification system used by at least two councils to identify potentially fraudulent benefit claims [103566] 6. Algorithm used by the Home Office to help decide visa applications [103566] 7. Algorithms being experimented with by police forces, including those used by Surrey police, West Yorkshire police, the Met, Hampshire Constabulary, Kent police, South Wales police, and Thames Valley police [103566] 1 View Details
Facial Recognition Algorithms Experience Increased Error Rates with Face Masks 2020-08-26 1. Facial recognition algorithms designed to identify people even when wearing face masks [103647] 1 View Details
Vulnerability in Amazon's Alexa Platform Exposed User Data 2020-08-13 1. Amazon's Alexa platform's web services [103796, 103828] 2. Amazon's subdomains URLs, such as track.amazon.com [103796, 103828] 2 View Details
Cyberattack on Israeli Defense Industry by North Korean Hackers 2020-08-14 The software failure incident reported in the article involved a cyberattack on Israel's defense industry by a North Korea-linked hacking group. The systems that failed in this incident were: 1. Israeli defense industry computer systems [103804]: The North Korean hackers were able to penetrate the Israeli defense industry's computer systems, potentially stealing classified data. 2. LinkedIn and WhatsApp communication platforms [103804]: The hackers used these platforms to establish contact with employees of Israeli defense companies, posing as headhunters from prominent defense and aerospace companies. 3. Remote Access Trojan (RAT) tool [103804]: North Korea's hackers installed a remote access trojan on Israeli networks, which is a hacking tool used to gain unauthorized access and steal data. These systems and tools failed as they were compromised by the cyberattack orchestrated by the North Korean hacking group. 1 View Details
August Smart Lock Vulnerability Exposes Wi-Fi Credentials During Setup. 2020-08-10 1. August Smart Lock Pro and Connect module [103826] 1 View Details
Vulnerabilities in Qualcomm's Snapdragon Chip Expose Android Devices to Hacks 2020-08-10 1. Qualcomm's Snapdragon chip 2. Digital signal processing (DSP) component of the Snapdragon chip 1 View Details
Chinese Tecno Phones Sold in Africa Contain Malware Subscription Scam 2020-08-25 1. Tecno W2 smartphones 2. Android operating system 3. Triada malware 4. xHelper malicious code 1 View Details
Data Leak of 50,000 Driving Licences Due to Misconfigured Cloud Storage 2020-08-31 1. Amazon cloud storage service - Misconfigured S3 bucket [104182] 2. Roads and Maritime Services infrastructure - Specifically related to toll notices [104182] 1 View Details
Brain-Computer Interface Vulnerability to Hackers: Implications and Risks 2020-08-05 The software failure incident reported in the article [104429] highlights potential vulnerabilities in the brain-computer interfaces (BCIs) being developed by Neuralink. The systems that failed in this incident are: 1. Brain-computer interfaces (BCIs) developed by Neuralink, specifically the technology allowing human brains to interface with computers. 2. Security protocols within the BCIs that were not robust enough to prevent unauthorized access by hackers. 3. Lack of encryption and antivirus software within the BCIs to protect against cyber attacks and data interception. 4. Potential vulnerabilities in the design and implementation of the BCI technology, including the risk of malicious software being transmitted to the devices. These failures indicate a need for stronger security measures and a multi-layered security approach in the design and development of brain-computer interfaces to prevent unauthorized access and protect sensitive data. 1 View Details