• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Damages Awarded in Phone-Hacking Case Against the Mirror Publishing Group

October 3, 2017 by Matt Roberts Leave a Comment

http://www.bbc.com/news/uk-41481307

This story concerns something that happened several years ago, but was just recently resolved and I think is still very much relevant. Back in 2011, it was revealed that MPG (Mirror Publishing Group), a group of daily British newspapers, had been hacking into the phones of celebrities and prominent figures to gain personal information for stories. The original case was a broad investigation known as the Leveson Inquiry, which was closed in 2012. In October 2016, comedian Steve Coogan, among many others, brought a case of his own against the company, citing personal attacks on him by newspapers following his testimony in the Leveson case. Coogan has recently settled the case for an unspecified six-figure sum after MPG admitted to running stories on him using personal information illegally obtained by hacking into his mobile voicemail accounts. While this is not a strictly technical article, it does highlight the growing needs and concerns about mobile device security. As more and more aspects of our lives are run from our phones and mobile devices, it has become painfully clear that strong, layered protections are needed to secure our personal information, as even the smallest gap or vulnerability can be exploited.

 

Filed Under: Uncategorized Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in