Trending Articles

Texas Pummeled by Coordinated Ransomware Attack

Data Breach Today

Cybercrime Campaign Counts 23 Victims - Mostly Local Government Entities State officials in Texas say that at least 23 local government entities have fallen victim to a coordinated ransomware attack unleashed on Friday morning.

The Rise of “Bulletproof” Residential Networks

Krebs on Security

Cybercrooks increasingly are anonymizing their malicious traffic by routing it through residential broadband and wireless data connections. Traditionally, those connections have been mainly hacked computers, mobile phones, or home routers.

Retail 218

Cloud migration a longer, harder journey than most organizations expect

Information Management Resources

Accenture's Siki Giunta discusses the results of a new study on cloud migration efforts, and why so many organizations say they are disappointed with the results

Study 157

MY TAKE: Can embedding security deep inside mobile apps point the way to securing IoT?

The Last Watchdog

The full blossoming of the Internet of Things is on the near horizon – or is it? Enterprises across the planet are revving up their IoT business models, and yet there is a sense of foreboding about a rising wave of IoT-related security exposures.

IoT 166

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Capital One hacker suspected to have breached other 30 companies

Security Affairs

Federal prosecutors revealed that Paige Thompson, who was arrested after the Capital One data breach, may have hacked more than 30 other organizations. In July, Capital One, one of the largest U.S.

More Trending

Meet Bluetana, the Scourge of Pump Skimmers

Krebs on Security

“ Bluetana ,” a new mobile app that looks for Bluetooth-based payment card skimmers hidden inside gas pumps, is helping police and state employees more rapidly and accurately locate compromised fuel stations across the nation, a study released this week suggests.

6 ways to put your data to practical use now

Information Management Resources

Countless articles advise today's business leaders to use the data they have, and you've probably read some of them. However, many people intend to start examining data but stop short of doing it

MY TAKE: A primer on how ransomware arose to the become an enduring scourge

The Last Watchdog

“All we know is MONEY! Hurry up! Tik Tak, Tik Tak, Tik Tak!” This is an excerpt from a chilling ransom note Baltimore IT officials received from hackers who managed to lock up most of the city’s servers in May. The attackers demanded $76,000, paid in Bitcoin, for a decryption key.

USBSamurai — A Remotely Controlled Malicious USB HID Injecting Cable for less than 10$

Security Affairs

USBSamurai — A Remotely Controlled Malicious USB HID Injecting Cable for less than 10$. than 10$. The Video is self-explanatory. Wanna know how to make it? Read the article below.) . All started with this Tweet last April, when I wanted a damn cheap USB implant capable of injecting keystrokes.

Video 108

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

European Central Bank Closes a Website Following Hack

Data Breach Today

Malware Found; Personal Data Apparently Exposed The European Central Bank has closed one of its websites after its IT staff found that a hacker compromised some personal information on the site and also planted malware

IT 202

SEC Investigating Data Leak at First American Financial Corp.

Krebs on Security

The U.S. Securities and Exchange Commissio n (SEC) is investigating a security failure on the Web site of real estate title insurance giant First American Financial Corp.

Data 210

5 trends that are driving cloud computing investments

Information Management Resources

The cloud has a rich history of continual improvements, and 2019 marks a time of some fairly significant ones that enhance capabilities, simplify operations and reduce costs

Trends 141

Software Vulnerabilities in the Boeing 787

Schneier on Security

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

5 Common Phishing Attacks and How to Avoid Them?

Security Affairs

Phishing is one of the oldest methods of cyberattacks. It uses deceptive and manipulated emails as a tool for gathering personal and organizational data. The emails are designed in a way that it appears to be authentic or belonging from a real business or authoritative source.

The State of API Security

Data Breach Today

Jacques Declas of 42Crunch on the Need for Frequent Security Updates The lifecycle of security needs to match the lifecycle of APIs, which get replaced very frequently, says Jacques Declas of 42Crunch

Patch Tuesday, August 2019 Edition

Krebs on Security

Most Microsoft Windows (ab)users probably welcome the monthly ritual of applying security updates about as much as they look forward to going to the dentist: It always seems like you were there just yesterday, and you never quite know how it’s all going to turn out.

Tips 175

How to architect your software delivery value stream around flow

Information Management Resources

Leading firms are focused on addressing impediments to flow so that they can successfully reduce the time to value of their software products

How To 100

Extended Validation Certificates are (Really, Really) Dead

Troy Hunt

Almost one year ago now, I declared extended validation certificates dead.

Flaws in 4G Routers of various vendors put millions of users at risk

Security Affairs

Security expert discovered multiple flaws in 4G routers manufactured by several companies, some of them could allow attackers to take over the devices. G Richter, a security researcher at Pen Test Partners discovered multiple vulnerabilities 4G routers manufactured by different vendors.

Risk 111

Using AI to Proactively Address Third-Party Risk

Data Breach Today

Microsoft's Abbas Kudrati Shares Recommendations Third-party risk assessments need to be ongoing, and artificial intelligence can play an important role, says Microsoft's Abbas Kudrati

Influence Operations Kill Chain

Schneier on Security

Influence operations are elusive to define. The Rand Corp.'s s definition is as good as any: "the collection of tactical information about an adversary as well as the dissemination of propaganda in pursuit of a competitive advantage over an opponent."

Video 86

Firms lack faith in information security operations centers

Information Management Resources

The top barrier to success is a lack of visibility into IT security infrastructure effectiveness, according to Ponemon survey

Texas Government Agencies Hit by Ransomware

Adam Levin

The local governments and agencies from twenty-three Texas towns were hit by a coordinated ransomware campaign last week. .

76

Google hacker discloses 20-year-old Windows flaw still unpatched

Security Affairs

Tavis Ormandy, white hat hacker at Google’s Project Zero Team, disclosed technical details of a 20-year-old Windows vulnerability that is still unpatched.

FBI Arrests Nigerian Suspect in $11 Million BEC Scheme

Data Breach Today

Scam Targeted UK Affiliate of US Heavy Equipment Firm Caterpillar, Prosecutors Allege The FBI has arrested a Nigerian businessman for allegedly carrying out an $11 million business email compromise scheme that targeted a U.K. affiliate of U.S. heavy equipment manufacturer Caterpillar

Exploiting GDPR to Get Private Information

Schneier on Security

A researcher abused the GDPR to get information on his fiancee: It is one of the first tests of its kind to exploit the EU's General Data Protection Regulation (GDPR) , which came into force in May 2018.

GDPR 100

AI augmentation will fuel $2.9 trillion of business value in 2021

Information Management Resources

Decision support and AI augmentation will surpass all other types of AI initiatives, says research firm Gartner

113
113

Kostya and Me: How Sam Patten Got Ensnared in Mueller’s Probe

WIRED Threat Level

A political consultant crosses paths with Konstantin Kilimnik, Paul Manafort, and Cambridge Analytica, then becomes part of the Russia investigation. Backchannel Security

Bluetana App allows detecting Bluetooth card skimmers in just 3 seconds

Security Affairs

Bluetana App allows detecting Bluetooth card skimmers installed at the gas pumps to steal customers’ credit and debit card information in just 3 seconds on average.

Paper 92

GAO: Army's New Cyber Units Understaffed and Underequipped

Data Breach Today

Audits Finds Army Rushed New Units Into Service To better prepare for cyberthreats posed by Russia and China, the U.S. Army has been building cyber and electronic warfare units.

Payments and Security: Putting security where your money is

Thales eSecurity

Originally published in Payments Journal on July 31, 2019.