Review: Infinity Loops The Geometric Prepster Apple Watch Band

Posted in Products with tags on August 16, 2023 by itnerd

Last week I reviewed a titanium watch band for the Apple Watch Ultra from Infinity Loops. If you missed that review, you can read it here. Today I am reviewing another one of their bands. The band in question is The Geometric Prepster. An interesting name for an interesting looking band:

While I do have an interest in Apple Watch bands, I don’t recall ever seeing a band that looks like this. And I’m not talking just about the design of the band which is unique and has a bit of a retro vibe being a woven band with a very interesting pattern. Now if this pattern doesn’t work for you, there are 9 others to chose from. The other side of the band is made of leather which is stiff when you get it, but will loosen up over time. That should make the band very comfortable to wear.

All the lugs and the other metal hardware is not only top shelf in terms of quality, but they don’t have any play in them. And all the stitching is well done with no loose threads or anything like that. There’s nothing at all to complain about when it comes to the quality of the band. My only complaint has nothing to do with the band as such. My wife has tiny wrists, and as a result even with the band on the very last hole that the band offers, this band is too loose for her. The reason why that is an issue for her is loose fitting Apple Watches deliver inaccurate health data such as heart rate tracking. I provided this feedback to Infinity Loops and they will “update the description so the size is immediately available.” Given that my wife is a bit of an “edge case” it’s great that Infinity Loops is willing to do that.

The Geometric Prepster goes for $48 CAD and I’d recommend to all but those with wrists like my wife’s. It’s a quality band that has a unique look from my perspective. Which means that it will attract positive attention wherever you go.

Ransomware Is At A Record High

Posted in Commentary with tags on August 16, 2023 by itnerd

According to research provided by The Record, the number of ransomware attacks posted on extortion websites in July reached a record high, with ransomware groups publicly claiming over 15 attacks per day on average.

Recorded Future’s data reveals a total of 484 ransomware attacks in July, up from 408 the previous month. The surge was largely driven by the Russia-based Clop ransomware group, which exploited a vulnerability in the MOVEit file transfer tool to breach global computer networks.

Those attacks accounted for 35% of all publicly reported victims in July, including Shell, Siemens Energy, and a major U.S. public pension fund, with the education sector being particularly impacted. However, there were a total of 484 attacks spread across 38 different groups in July 2023, compared to 214 attacks across 24 groups in July 2022.

Emily Phelps, Director, Cyware had this to say:  

“With ransomware, cybercriminals don’t need to be sophisticated hackers to execute sophisticated attacks. Ransomware has a low barrier for entry, and with the emergence of Ransomware-as-a-Service, it requires virtually no technical skills to execute a successful attack. It’s profitable and harder to trace, with many adversaries dealing in cryptocurrencies.  

“Preventing successful ransomware attacks requires organizations to take multiple actions, which include keeping software and systems patched and updated; regularly maintaining and isolating backups; conducting regular security awareness training; and investing in threat intelligence and detection systems that enable security teams to proactively defend against these types of attacks.”

Carol Volk, EVP, BullWall follows with this: 

“Ransomware attacks continue to rise and the battle continues. We must learn from every event, improving our security posture, as the fallout from such attacks can be devastating to a business in terms of lost revenue, business disruption and long-term reputational damage.  

“While the hope of a magical AI silver bullet to protect us is still just a dream, we have to own our own protection and apply the best defense available within the resources available to us. There are good defensive options, from on-prem teams to Security as a Service (SECaaS) that can provide the full range for a good defense, including detection, backup and containment solutions. Stay current!”

Ransomware is not going away. Organizations need to wrap their heads around this and do whatever is required to make sure that they are not going to be the next victim of a ransomware attack.

Websites Being Targeted By Threat Actors To Set Up Phishing Pages

Posted in Commentary with tags on August 16, 2023 by itnerd

There’s new research that is out detailing hackers targeting smaller websites to take them over and set up phishing pages:

Abandoned websites end up captured by cybercriminals fairly often. A lack of maintenance and security patches means they are easy to compromise using a known exploit. Besides, on a long-neglected site, phishing pages can stay up for long periods of time, as no one monitors what gets published, which is exactly what scammers look for.

This does not mean malicious actors do not attack actively maintained sites, though. Smaller websites attracting little traffic are among those exposed to the hacking threat. Their owners may not be able to afford to spend enough money on information security or hiring a security professional, they may be unfamiliar with security settings, or they may be confident that their website is too small to be of any interest to hackers. However, to a phisher, the possibility of hacking the website is more important than its popularity, as links to scam pages are likely to be emailed or sent via instant messaging platforms. Therefore, even smaller websites are an attractive target for scammers.

According to W3Techs, 43.1% of all websites on the internet are powered by the WordPress content management system. There is a huge number of third-party plugins designed for extending the functionality of this popular platform. New vulnerabilities exploited by hackers are discovered both in plugins and in WordPress itself on a regular basis. The rest of this article will deal with phishing pages on hacked websites that are powered by WordPress.

Jack Nicholsen, CISO, Inversion6 had this to say:

Everyone should be concerned about the growing threat of phishing attacks on WordPress sites. These attacks can have a significant impact on businesses, both financially and reputationally. Hackers are increasingly targeting WordPress sites because they are a popular content management system (CMS) that is used by millions of websites. WordPress sites are also often less secure than other websites, as they may not be properly maintained or updated. Kaspersky found that hackers are using a variety of techniques to target WordPress sites, including: 

  • Exploiting vulnerabilities in outdated software and plugins. WordPress plugins are a common way for hackers to gain access to a website. It is important to keep all plugins up to date and to only install plugins from trusted sources. 
  • Phishing emails and social engineering attacks. Hackers will often send phishing emails that appear to be from a legitimate source, such as a bank or credit card company. The emails will often contain a link that, when clicked, takes the victim to a fake website that looks like the real website. Once the victim enters their personal information on the fake website, the attacker can steal it.
  • Brute-force attacks. Hackers will often use brute-force attacks to try to guess the passwords for WordPress accounts. It is important to use strong passwords and to enable two-factor authentication.

 Security teams can take a number of steps to protect their WordPress sites from these attacks, including:

  • Keeping their websites up to date with the latest security patches. WordPress releases security patches regularly, and it is important to install these patches as soon as possible. 
  • Using strong passwords and two-factor authentication. Strong passwords should be at least eight characters long and include a mix of letters (uppercase and lowercase), numbers, and symbols. Two-factor authentication adds an extra layer of security by requiring users to enter a code from their phone in addition to their password.
  • Installing a security plugin for WordPress. There are a number of security plugins available for WordPress that can help to protect your site from attacks.
  • Monitoring their websites for suspicious activity. Security teams should monitor their websites for suspicious activity, such as unusual login attempts or changes to the website’s code. 
  • Training employees on how to identify and avoid phishing emails. Employees should be trained on how to identify and avoid phishing emails. They should be taught to never click on links in emails from unknown senders and to never enter their personal information into websites that they do not trust.

My advice would be that if you have a website that isn’t being maintained, take it down. And for everyone else, you should do everything possible to secure those websites so that they don’t get leveraged by threat actors for evil.

The MOVEit Flaw Has Claimed More Victims

Posted in Commentary with tags on August 16, 2023 by itnerd

MOVEit Seems to be the gift that keeps on giving for hackers as two more organizations have been added to the list of victims. Let’s start with The Colorado Department of Health Care Policy & Financing (HCPF)  who was pwned by hackers who targeted IBM according to this notice. And according to this, over 4 million people have been affected.

Ani Chaudhuri, CEO, Dasera had this comment on this massive breach:

Indeed, the MOVEit software breach incident at IBM that led to Colorado HCPF’s data exposure is just the tip of the iceberg in what appears to be a larger vulnerability affecting several organizations. While the specific details about every breached entity might not always be public, it is imperative to understand that the software’s widespread usage makes it an attractive target. The recent disclosure by Colorado State University, which was similarly breached due to the vulnerability in the MOVEit Transfer software, affecting thousands of students and staff, underscores the urgency. If MOVEit’s vulnerability can affect educational institutions of such magnitude, it stands to reason that healthcare providers with a similar reliance on the software could be at equal, if not greater, risk, given the value of health data in the dark market.

In light of these breaches, healthcare providers must take a multi-pronged approach to damage containment:

  • Immediate Assessment: Conduct a rapid and comprehensive assessment to ascertain the extent of the breach. This involves understanding the nature of accessed data, the duration of unauthorized access, and potential secondary access points that the threat actors might have established.
  • Notify Affected Parties: Transparency is essential. Informing affected individuals meets regulatory obligations and allows them to take personal protective measures, such as monitoring for suspicious activities.
  • Enhanced Monitoring: Deploy advanced monitoring solutions to identify suspicious activities or data access patterns. This will help detect any malicious activities from the breach in real-time.
  • Rethink Data Storage and Access: Minimize the exposure of sensitive data by implementing robust data governance principles. This means limiting access based on necessity, employing end-to-end encryption, and frequently auditing data access logs.
  • Software Patching and Updates: Ensure all systems and software are updated with the latest patches. Regularly liaise with software vendors for updates on vulnerabilities and corresponding patches.
  • Employee Training: Often, the success of ransomware campaigns, like the one that exploited the MOVEit vulnerability, hinges on human error. Regular training of staff on the latest cybersecurity threats and maintaining a culture of vigilance can act as the first line of defense.
  • Collaborate and Share Information: Collaborate with other organizations, regulatory bodies, and cybersecurity entities to share knowledge about threats and best practices. This collaborative approach will not only bolster individual defenses but also strengthen the broader healthcare community’s resilience against cyber threats.
  • Cyber Insurance and Legal Counsel: Ensure that cyber liability insurance is in place. A legal team well-versed in cybersecurity issues can also guide on regulatory obligations and potential legal ramifications post-breach.

While the current scenario paints a grim picture, it’s also an opportunity. An opportunity for healthcare providers to reevaluate, reinvent, and fortify their data protection mechanisms, ensuring the sanctity of patient data now and in the future.

Now let’s move on to New York Life who was exposed to the MOVEit Transfer attack via a third-party vendor Pension Benefit Information (PBI):

According to PBI’s letter to the Maine Attorney General, the attack exposed 25,685 NYLIC-related individuals. The breach notification indicates that threat actors accessed individuals’ Social Security numbers (SSNs).

Losing SSNs poses significant risks, as impersonators can use stolen data in tandem with names and driver’s license numbers for identity theft.

Again, Ani Chaudhuri, CEO, Dasera has a comment on this:

The current digital landscape’s complexities have led us into an era where even the most reputable companies are vulnerable to sophisticated cyber-attacks. It’s terrible to see global giants like New York Life Insurance Company (NYLIC), Prudential Insurance, and many others fall prey to the MOVEit Transfer attacks. It underscores the fundamental challenge many corporations face: it’s not just about securing your environment but ensuring that every part of your digital supply chain is equally fortified.

First and foremost, our sympathies should lie with the companies and the millions of individuals impacted by these breaches. Having one’s personal and sensitive information exposed is a severe violation of trust and can have long-lasting repercussions. However, it’s important to remember that in many of these cases, the breached entities themselves were not the primary weak link. Instead, third-party vulnerabilities became the gateway for malicious actors to access data.

In this instance, the trend of targeting third-party vendors and systems, such as PBI, has become increasingly prevalent. It’s a cunning tactic from cybercriminals: why attack the fortress directly when you can exploit a lesser-protected entry point? Herein lies the crux of the issue: in a globally interconnected digital ecosystem, your security posture is only as strong as the weakest link in your chain.

Furthermore, this is not merely an IT or a “tech” problem—it’s a holistic business challenge. Given the increasing interdependence on third-party vendors and platforms for various services, it’s more crucial than ever for organizations to embed data governance and security into their core strategy deeply. As we’ve seen, merely patching software vulnerabilities is a reactive measure; we need proactive, comprehensive approaches that account for the entire data lifecycle and all its touchpoints.

So, what can we take away from this calamity?

  • Third-party Audits: Regularly evaluate and audit the security posture of third-party vendors, especially those with access to sensitive data. Mere assurances or past reputations are no longer sufficient.
  • Comprehensive Data Governance: Implement robust data governance frameworks that provide clear visibility into where and how data is stored, processed, and transmitted—even when outside the direct purview of the company.
  • Shared Responsibility and Collaboration: In the face of such adversities, the business community must come together, share insights, and collectively elevate our defenses against cyber threats. Finger-pointing or laying blame post-facto is counterproductive.

Every organization and individual to empathize with the affected companies and end-users. In today’s intricate digital web, any entity, regardless of size or reputation, can find itself under siege. Instead of distancing ourselves from those affected, we should draw closer, share knowledge, and fortify our collective defense. Cybersecurity isn’t a competitive advantage; it’s a shared responsibility.

In both of these cases, organizations were pwned because some other organization was exposed to MOVEit. Thus you have to wonder how many other organizations are exposed to this threat which right now seems completely out of control.

Does Apple Have A BatteryGate 2.0 Situation With The iPhone 14?

Posted in Commentary with tags on August 15, 2023 by itnerd

You might recall that Apple got into a lot of trouble with the original BatteryGate situation a few years ago. To summarize that situation, Apple got into deep trouble when it was discovered that the performance of iPhones would nosedive when the batteries inside them degraded to the point where they couldn’t sustain the performance levels that users were used to. And Apple did not tell anyone this was the case. Apple since has done a lot to make this clear to users, and they not only allowed users to get their batteries replaced cheaply for a limited time, but they also allowed users to see the health of their battery and offered free replacements if you had AppleCare and the battery health dropped below 80% in the first two years. But, by the time that Apple did all that, it cost them hundreds of millions of dollars and a lot of scrutiny from governments around the world. Which of course wasn’t good for Apple.

History may be repeating itself as there are now reports that the battery health in the iPhone 14 models is dropping faster than previous iPhone models. Here’s a few posts from some prominent creators who are seeing this:

This is now starting to hit the media with media outlets such as The Verge and The Wall Street Journal running stories on this topic. Several iPhone 14 series owners have taken to other places like Reddit to report deteriorating battery capacity on their handsets. 

For giggles I checked the battery health on my iPhone 14 Pro. you can do the same thing by going to Settings –> Battery –> Battery Health & Charging. In my case I got this:

To me that doesn’t seem so bad. But I am missing some context here. Apple doesn’t tell you how many charge cycles that your phone has. By that I mean how many times the battery in my phone has been discharged and charged. I decided to use a utility called Coconut Battery to get that information:

The figure I was looking for was the cycle count. In my case the phone has been discharged and charged 273 times as I type this. And I tend to use wireless charging most of the time which introduces heat to the equation. And heat is the number one enemy of lithium ion batteries when it comes to their longevity. So having 94% battery health (or 95.3% according to Coconut Battery) seems somewhat reasonable to me after just under a year of usage. And to add further context to this, my previous iPhone 12 Pro was at 89% battery health by the time it was a year old. So the iPhone 14 Pro is an improvement for me. But clearly others are having a different experience with their iPhone 14’s.

So is this BatteryGate 2.0? Or put another way, is there an issue with the batteries inside the iPhone 14 models? Perhaps there’s a software issue with iOS 16? I think it’s too early to tell what the issue is and where it lies to be honest. I am sure that when these reports started to surface, Apple started to look at the data that it has access to to figure out if there’s an issue as I am sure that they don’t want a BatteryGate 2.0 situation. Whether we get an answer from Apple directly is an open question as they are not the most communicative company around.

In the meantime, Apple has some tips on how to keep your battery health in the best possible place. That might be worth looking at, along with this document which details how batteries work in relation to iDevices. But let me throw this out there in terms of what I would do if I were you. I would keep an eye on your battery health, but you should not obsess over it. If you have AppleCare, and the battery drops below 80% within two years, Apple will replace the battery for free. (By the way, that’s a great incentive to get AppleCare as it makes this situation a non-issue.)

In the meantime, there needs to be better understanding as to why iPhone 14 models seem to have batteries that degrade faster than previous models in some cases. Having that understanding will help to put this issue to bed. Thus I call on Apple to be as open as it can when it comes to this issue. If they have information on this, they should be as transparent as possible and share it. Otherwise users of iPhone 14’s will just assume that Apple has something to hide and do what they did the last time BatteryGate was a thing. Which is get angry, and sue. And governments will once again assume that Apple has something to hide, investigate, and take corrective action against Apple.

For the rest of us, maybe we should relax and see what comes of this. Maybe there’s something here. Maybe this is a nothing burger. Who knows? But let’s get some facts first to figure out what side of the fence this falls on.

Zoho report finds 63% of Canadian SMBs have not experienced cash flow problems despite the uncertain economy

Posted in Commentary with tags on August 15, 2023 by itnerd

The recently released Cash Flow Report by Zoho, a leading global technology company, reveals that despite the uncertain economy, SMBs are showing a positive business outlook, with 39.7% of respondents indicating that their business is growing and 39.9% stating it’s stable. The majority (63.1%) of financial teams at Canadian small and medium-sized businesses have not experienced cash flow problems.

Surveying 1,219 Canadian financial professionals in June about business performance, cash flow, the economy, and tech usage, Zoho’s Cash Flow Report also reveals that 45% of respondents using accounting software and accountants report business growth, followed by 41.4% saying their business is stable.

On the other hand, 66.3% of SMBs are yet to unlock their business potential with the help of resources like accounting software and accountants, despite clear evidence that respondents who utilize them earn 16.2% more revenue than those who don’t.

Key Survey Findings:

Benefits of Synergy between Accounting Software and Accountants

66% of businesses that use accounting software also utilize services of professional accountants. Of these businesses, 54.7% reported no cash flow problems, demonstrating the effectiveness of professional accounting tools and services.

45% of businesses that use accounting software and accountant services are experiencing growth and 41% are experiencing stability.

The survey also reveals a 16.2% increase in revenue for respondents who employ accounting software and accountants compared to those who do not use these resources.

Economic Downturn Impact

Only 13.8% of respondents attribute cash flow problems to the economic downturn, echoing the optimism reflected in the Zoho Canada SMB Outlook Report where 73.4% of respondents anticipated growth between 1-20+%.

Optimal Cash Flow Management

Over 95% of respondents improved cash flow by optimizing payment terms and providing a variety of payment options, instead of relying solely on loans or credit lines. Respondents are not using debt to improve cash flow.

Advocacy for Accountants

Not surprisingly, 87.9% of respondents highly recommend working with accountants to fellow small business owners, acknowledging the value of professional financial guidance.

Report Methodology

Conducted in June, 2023, using Zoho Survey and Zoho Analytics, this study contacted 1,219 individuals across Canada. Participants in the study included a range of financial team members at small and large enterprises.

Report Dashboard

Click here to access the survey insights.

Ransomware Attack Shuts Down MLS Nationwide 

Posted in Commentary with tags on August 15, 2023 by itnerd

Thousands of Realtor Multiple Listing Services (MLS) across the country were shut down last Wednesday, when their MLS provider, California-based Rapattoni, was hit by a ransomeware attack. “We went from super low inventory to no inventory” said Peter Chabris, CEO of The Chabris Group in Cincinnati. Real estate agents nationwide were unable to search or update any listings.

Coldwell Banker agent Peg King of Petaluma told the therealdeal.com “It’s paralyzed the real estate industry. We can’t add listings. We can’t make price changes. We have no idea how to show properties unless we try to figure out who has something listed.”

Rapattoni provides MLS software and data services nationwide to over 100,000 members. They sent out a memo on Thursday, saying it had been targeted. The service remained down Friday preventing brokers from accessing listings or open house information for the weekend showings.

As of yesterday Rapattoni MLS is still not fully restored for brokers. Some services have been restored, but others are still unavailable. The company say they are working around the clock to restore service and that they hope to have everything back up and running by the end of the week. However, it is possible that the restoration process could take longer.

Carol Volk, EVP, BullWall has this comment:

   “This is a perfect example of how wide the ransomware attack surface has become. This mirrors the increase in attacks we’re seeing on public infrastructure. There’s just no aspect of our lives not impacted by digital transformation which has the unfortunate side effect of making it all vulnerable.  

“Every one of us is a provider of services to others in our social supply chain and we are responsible to those we serve, both locally and across the “chain,” to maintain the highest level of cyber security to both protect our data and our ability to provide service. It has been shown time and again that the follow-on damages of a cyber attack can be much greater than just the loss of data with regards to the direct and imputed costs.”

Emily Phelps, Director, Cyware follows up with this:  

“When an organization serves 100,000+ members, a ransomware attack has far-reaching consequences, for the organization, its members, and their clients. Nothing happens in a vacuum so we must break down the silos that negatively impact cybersecurity.  

“Organizations can shore up their defenses by leveraging automation tools that enable collaboration and threat intel integration so that lean security teams can more efficiently address threats. They should conduct regular security awareness training so employees are armed to recognize and avoid common threat tactics such as phishing attacks; mandate security controls like strong passwords or passphrases and multi-factor authentication; regularly patch and update systems and software; and they should consider third party security partnerships that can act as an extension of their teams, gaining expertise that is more difficult to resource and retain internally.”

Supply chain attacks like these really hurt. Thus you not only need to make sure that you’re secure. But everything that you depend on is also secure. Otherwise, this can happen to you through no fault of your own.

Fisker Adopts NACS Charging Standard

Posted in Commentary with tags on August 15, 2023 by itnerd

Fisker Inc. has announced that they will provide customers with access to Tesla’s Supercharger network.  

The company has announced that it has signed an agreement with Tesla to adopt the North American Charging Standard (NACS) on its first vehicles in 2025. The move will provide Fisker owners with additional charging options, taking advantage of Tesla’s 12,000 Supercharger stations in the United States and Canada.

All current and future Fisker vehicles will be covered by the agreement. Fisker customers will utilize a NACS adapter to plug in at Superchargers starting in Q1 2025. Fisker will later update vehicle engineering to include an NACS inlet. A CCS adapter will be provided so that customers can continue to charge using that standard.

Guest Post: Global VPN Adoption Trends In H1 2023

Posted in Commentary with tags on August 15, 2023 by itnerd

With International VPN Day just around the corner, Atlas VPN presents the latest VPN adoption trends across the globe. During the first half of 2023, global VPN downloads reached 130 million, but where was VPN usage most prominent? With International VPN Day just around the corner, Atlas VPN presents the latest VPN adoption trends across the globe. During the first half of 2023, global VPN downloads reached 130 million, but where was VPN usage most prominent? 

Atlas VPN research team analyzed and ranked 85 countries in terms of VPN usage from 2020 to H1 2023. The VPN penetration rate was calculated by summing up VPN downloads by country and dividing them by the country’s population. The VPN download data was extracted from Google Play and Apple App Store using Sensor Tower and AppTweak services. Download data includes the 45 biggest VPN providers.

See the full VPN Adoption dataset here

Image

In H1 2023, Singapore stood as the torchbearer of VPN adoption, with over 1.1 million downloads among its population of 5.85 million, representing a VPN adoption index of 19.32%. People in Singapore use VPNs for various reasons, includng privacy concerns, security needs, and the desire to access restricted content.

The United Arab Emirates (UAE) secured the second position with 16.94% VPN adoption in H1 2023. Qatar users also continue to be fond of VPN services, with a 15.33% adoption rate.

As expected, Saudi Arabia is among the countries with the highest VPN usage, recording an 11.02% adoption rate.

This consistently high VPN penetration in the Gulf region is caused by strict internet censorship regulations that restrict access to certain websites, social media platforms, and content deemed culturally or politically sensitive.

European landscape: growing interest

The Netherlands witnessed consistent adoption, with a 10.43% rate in H1 2023, suggesting a well-informed populace prioritizing online security. Similarly, the UK displayed a 7.23% adoption rate in H1 2023, indicating that a significant portion of its population recognizes the value of VPNs.

Luxembourg’s adoption rate of 7.09% in H1 2023 shows the country’s continued interest in VPNs. France maintains a notable adoption index of 6.92% and, like many other EU countries, experienced a growth trajectory over the years, reflecting the broader trend of Europeans embracing VPNs.

Conclusion

The journey through VPN adoption from 2020 to H1 2023 presents a fascinating narrative of global digital awareness. The data underscores the heightened awareness of digital privacy, online security, and the significance of maintaining control over one’s online identity. 

Nations like Singapore and the UAE have emerged as trailblazers in VPN adoption, while other countries have shown steady growth.

To see the full VPN Adoption campaign by Atlas VPN, please click here

The Police Service of Northern Ireland Data Leak Just Got Worse Than It Already Is

Posted in Commentary with tags on August 14, 2023 by itnerd

Last week I told you about a data leak involving The Police Service of Northern Ireland where they accidentally published the data on all their staff creating a critical incident in the process. As bad as that is, it just got worse. Here’s the details from Sky News:

The Police Service of Northern Ireland (PSNI) says it fears its officers could be targeted and intimidated after saying it believes that dissident republicans have data on staff that was accidently leaked by the force last week.

“We are now confident that the workforce dataset is in the hands of dissident republicans,” Chief Constable Simon Byrne said.

“It is therefore a planning assumption that they will use this list to generate fear and uncertainty as well as intimidating or targeting officers and staff.”

And:

Earlier, a redacted version of the leaked document that listed the names of police officers in Northern Ireland was posted on a wall facing a Sinn Fein office in Belfast.

Keep in mind that the peace in Northern Ireland is a recent thing because of the Good Friday accords. Thus this data leak doesn’t exactly help this situation which has not been in a good place for a couple of years now. This this situation illustrates that data breaches don’t just have a financial and repetitional impact, they also have a life threatening impact as is illustrated here.