Skip to main content

News Corp. offers $4.7 million to phone hacking victims

murdoch-scandel
Image used with permission by copyright holder

Rupert Murdoch recently approved an early attempt at a settlement offer to the family of Milly Dowler, a 13-year-old girl that was murdered in 2002. This payment stems from alleged hacking of Milly Dowler’s mobile phone by representatives of the Murdoch-owned News of the World. When the public discovered the phone hacking scandal, several of the high-ranking employees at the newspaper were arrested and eventually lost their jobs after the scandal forced the News of the World to shut down after 168 years of business. In addition to the newspaper closure, parent company News Corp. was forced to withdraw from negotiations to purchase the remaining shares of the BskyB network.

milly-dowler-phone-hackingDesigned to forgo litigation, the initial settlement offer stands at 3 million pounds or $4.7 million dollars. 2 million pounds would be paid directly to the family of Milly Dowler and the remaining 1 million pounds would be awarded to charity. Rupert Murdoch is said to be personally involved with the negotiations and recently visited the Dowler family in July to apologize personally for the hacking incident at News of the World. Shareholders of News Corp. were recently told that the cost of taking the various hacking cases to trial would cost the company approximately 20 million pounds, however analysts had estimated a typical court aware to be around 120,000 pounds. 

Recommended Videos

After London’s Metropolitan Police opened a criminal case regarding the phone hacking and began to arrest staff, the police have been notifying about 4,000 potential victims that phone hacking could have occurred. This has spawned dozens of lawsuits against News Corp. based off claims that their privacy was violated. In June, News Corp. had announced a system that would allow victims to contact the company directly for a faster route to financial compensation, but the planned system has yet to process any claims of hacking.

Topics
Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more