Trending Articles

8 Takeaways: Black Hat Europe's Closing 'Locknote' Panel

Data Breach Today

Cloud 130

Ransomware at Colorado IT Provider Affects 100+ Dental Offices

Krebs on Security

A Colorado company that specializes in providing IT services to dental offices suffered a ransomware attack this week that is disrupting operations for more than 100 dentistry practices, KrebsOnSecurity has learned. Multiple sources affected say their IT provider, Englewood, Colo.

Mixcloud Breach Affects 21 Million Accounts

Data Breach Today

Hashed Passwords Were Leaked; No Financial Data Exposed Digital streaming platform Mixcloud says it is the victim of a data breach after an attacker shared personal data for registered users with several media outlets, including Vice and ZDNet.

Sales 186

GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

The Last Watchdog

In 2019, we’ve seen a surge in domain name service (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.’s s Cybersecurity Centre, ICANN, and other notable security experts.

Risk 130

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Clop Ransomware attempts to disable Windows Defender and Malwarebytes

Security Affairs

Experts discovered a new malware dubbed Clop ransomware that attempts to remove Malwarebytes and other security products.

More Trending

To Survive a Data Breach, Create a Response Playbook

Data Breach Today

Experts Detail Essential Systems and Procedures Every Organization Needs Now Surviving a data breach requires having a plan, and experts say such plans must be continually tested, practiced and refined. Experts detail seven essential components for building an effective data breach response playboo

Apple Explains Mysterious iPhone 11 Location Requests

Krebs on Security

Cameras that Automatically Detect Mobile Phone Use

Schneier on Security

New South Wales is implementing a camera system that automatically detects when a driver is using a mobile phone. australia cameras cars phones


Google warned 12K+ users targeted by state-sponsored hackers

Security Affairs

Google revealed that over 12,000 of its users were targeted by state-sponsored hackers in the third quarter of this year.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Data Protection in the Digital Transformation Era

Thales eSecurity

With more and more organizations embracing digital transformation and accelerating their pace to digitize every piece of information, they become increasingly vulnerable to sophisticated cyber-attacks and data breaches.

The iPhone 11 Pro’s Location Data Puzzler

Krebs on Security

One of the more curious behaviors of Apple’s new iPhone 11 Pro is that it intermittently seeks the user’s location information even when all applications and system services on the phone are individually set to never request this data.

I Ditched Google for DuckDuckGo. Here's Why You Should Too

WIRED Threat Level

Once you realize most things you search for online are boring and obvious, you realize you don't really need Google in your life. . Security Security / Security Advice

Twitter account of Huawei Mobile Brazil hacked

Security Affairs

The official Twitter account of Huawei Mobile Brazil has been hacked and attackers have sent offensive messages to the rival Apple. The official Twitter account of Huawei Mobile Brazil has been hacked, attackers have sent offensive messages to provoke the rival Apple.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Empirical Evaluation of Secure Development Processes

Adam Shostack

Earlier this year, I helped to organize a workshop at Schloss Dagstuhl on Empirical Evaluation of Secure Development Processes.

Don't forget the basics: KYE means KYC

Data Breach Today

Know your enemy: How banks can identify and beat the evolving threat of financial crime "We can see criminals are moving up the financial value chain from attacking lots of targets with smaller rewards to smaller numbers of targets with higher rewards," says Ho


Friday Squid Blogging: Squidfall Safety

Schneier on Security

Watchmen supporting material. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid television

Why the iPhone 11 Tracks Your Location Even When You Tell It Not To

WIRED Threat Level

Russian disinformation, a VC hack, vulnerable VPNs, and more are in the week’s top security news. Security Security / Security News

IT 52

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Europol seized 30,506 Internet domain names for IP Infringement

Security Affairs

Europol announced another success in the fight against cybercrime, the agency shut down 30,506 Internet domain names for distributing counterfeit and pirated items.

FTC Issues Opinion and Order Against Cambridge Analytica For Deceiving Consumers About the Collection of Facebook Data, Compliance with EU-U.S. Privacy Shield

Information Governance Perspectives

The Federal Trade Commission issued an Opinion finding that the data analytics and consulting company Cambridge Analytica, LLC engaged in deceptive practices to harvest personal information from tens of millions of Facebook users for voter profiling and targeting.

How to Make a Security Transformation

Data Breach Today

RSA's Ganesh Prasad on Understanding Risk Exposure in a Digital Transformation A successful digital transformation journey must include a security transformation journey that includes a careful examination of risks, says Ganesh Prasad of RSA

Andy Ellis on Risk Assessment

Schneier on Security

Andy Ellis, the CSO of Akamai, gave a great talk about the psychology of risk at the Business of Software conference this year. I've written about this before.

Risk 52

Millions of text messages at TrueDialog allegedly exposed by vpnMentor researches via USA Today

IG Guru

It appears TrueDialog removed the database from public view, but did not respond to to researchers. Read here. Photo by Rebecca Harris on Unsplash. The post Millions of text messages at TrueDialog allegedly exposed by vpnMentor researches via USA Today appeared first on IG GURU.

IT 52

TrueDialog database leaked online tens of millions of SMS text messages

Security Affairs

Millions of SMS messages have been leaked by a database run by TrueDialog, a business SMS provider for businesses and higher education providers. Security experts at vpnMentor discovered a database belonging to the US communications company, TrueDialog that was leaking millions of SMS messages.

Data Governance 2.0: The CIO’s Guide to Collaborative Data Governance


In the data-driven era, CIO’s need a solid understanding of data governance 2.0 … Data governance (DG) is no longer about just compliance or relegated to the confines of IT. Today, data governance needs to be a ubiquitous part of your organization’s culture.

Balancing Digital Transformation and Security

Data Breach Today

Kaspersky's Claire Hatcher Describes a Layered Approach As companies go through a digital transformation, they should keep security top of mind, says Claire Hatcher of Kaspersky, who describes a layered approach

The Mainframe – but not as you know it.

Micro Focus

The mainframe matters more than ever. A 2019 Forrester study said 64 percent of enterprises will run more than half their business-critical applications on the mainframe, up from 57 percent in 2018.

IT 52

Top 5 big marketing trends in 2020

OpenText Information Management

As our attention starts to focus on the new year, it’s good to take stock. It’s time to dust off the crystal ball. The role of marketing is undergoing fundamental change, never before has it been so linked to the overall valuation of a company.