Feeds

Hackers target Christian charity

Donors' details swiped

Choosing a cloud hosting partner with confidence

The Charity Commission has warned charities to protect themselves against internet risks after hackers attacked the online security systems of a Christian charity, Aid to the Church in Need, and stole details of over 2,000 online donors.

In some cases, the fraudsters have used these details to contact benefactors directly, trying to extract more money.

The charity closed its website temporarily, warned those affected and reported the breach to the police.

"We are all in a state of shock,” said Neville Kyrke-Smith, National Director at Aid to the Church in Need UK. “Apart from the obvious distress to benefactors, we're concerned that our charity identity has been stolen. However it's the beneficiaries, those who need the money the most, who will ultimately suffer. I urge all charities to regularly review their website security and make sure all software is up-to-date."

According to Andrew Hind, Chief Executive at the Commission:

"This charity already used a secure encrypted connection to transfer and store data and the organisation's website should have been safe. However it's a sad fact of modern times that charities, like businesses, have to make sure their websites are protected. All charities need to regularly review website security and make sure they stay ahead of the hackers and fraudsters."

See: Department of Trade and Industry guidance on web security

Copyright © 2005, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Beginner's guide to SSL certificates

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.