Trending Articles

First American Financial Corp. Leaked Hundreds of Millions of Title Insurance Records

Krebs on Security

The Web site for Fortune 500 real estate title insurance giant First American Financial Corp. NYSE:FAF ] leaked hundreds of millions of documents related to mortgage deals going back to 2003, until notified this week by KrebsOnSecurity.

Security at the Speed of the Cloud

Data Breach Today

McKinsey CISO Dan Fitzgerald on DevSecOps and the Future of Cloud Security Migrating from on-premises data security to the cloud and then embedding security in the application development process are common challenges for enterprises. Dan Fitzgerald, a CISO at the consultancy McKinsey & Co.,

Cloud 208

Google Stored Unhashed G Suite Passwords for Years

Data Breach Today

Passwords Remained Encrypted for Enterprise Users Google is notifying administrators and users of its business-oriented G Suite product that the company had been storing unhashed passwords for years because of a flaw in the platform.

GUEST ESSAY: Dear America, Facebook is an addictive digital drug of little productive value

The Last Watchdog

Social media consumers are getting wise to the joke that when the product is free, they’re the ones being sold. But despite the growing threat of consumer exploitation, Washington still shrinks from confronting our social media giants.

Blog 190

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Germany Talking about Banning End-to-End Encryption

Schneier on Security

Der Spiegel is reporting that the German Ministry for Internal Affairs is planning to require all Internet message services to provide plaintext messages on demand, basically outlawing strong end-to-end encryption. Anyone not complying will be blocked, although the article doesn't say how.

More Trending

Legal Threats Make Powerful Phishing Lures

Krebs on Security

Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the recipient that he/she is being sued, and instruct them to review the attached file and respond within a few days — or else.

Database May Have Exposed Instagram Data for 49 Million

Data Breach Today

Email Addresses, Phone Numbers Potentially Exposed There's been a potential leak of personally identifiable information from Instagram, but it's not clear yet whether the data on 49 million users came directly from the social media company.

MY TAKE: Android users beware: Google says ‘potentially harmful apps’ on the rise

The Last Watchdog

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital Our smartphones. Where would we be without them? Related Q&A: Diligence required of Android users If you’re anything like me, making a phone call is the fifth or sixth reason to reach for your Android or iPhone.

Tips 121

Hackers target MySQL databases to deliver the GandCrab ransomware

Security Affairs

Security experts at Sophos have detected a wave of attacks targeting Windows servers that are running MySQL databases with the intent of delivering the GandCrab ransomware.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

PayPal's Beautiful Demonstration of Extended Validation FUD

Troy Hunt

Sometimes the discussion around extended validation certificates (EV) feels a little like flogging a dead horse. In fact, it was only September that I proposed EV certificates are already dead for all sorts of good reasons that have only been reinforced since that time.

Fingerprinting iPhones

Schneier on Security

This clever attack allows someone to uniquely identify a phone when you visit a website, based on data from the accelerometer, gyroscope, and magnetometer sensors. We have developed a new type of fingerprinting attack, the calibration fingerprinting attack.

Paper 106

DHS Reportedly Warns of Chinese-Made Drones Stealing Data

Data Breach Today

Drones May Be Sending Data Back to China, According to News Reports The Department of Homeland Security is warning that Chinese-made drones could be sending sensitive data back to their manufacturers, where it can be accessed by the government, according to news reports

How to Spring Clean Your Digital Clutter to Protect Yourself

WIRED Threat Level

You don't have to get your hands dirty to do the most important spring cleaning of the year. Security Security / Security Advice

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Snapchat staff used internal tools to spy on users

Security Affairs

Snapchat internal staff has allegedly abused their role in the company to spy on Snapchat users using and internal tools and steal data.

Tools 96

Weekly Update 140

Troy Hunt

I'm a day and a half behind with this week's update again - sorry! Thursday and Friday were solid with training in Melbourne so I recorded Saturday and am pushing this out in the early hours of Sunday before going wakeboarding - is that work / life balance?

Thangrycat: A Serious Cisco Vulnerability

Schneier on Security

Summary : Thangrycat is caused by a series of hardware design flaws within Cisco's Trust Anchor module.

Facial Recognition Has Already Reached Its Breaking Point

WIRED Threat Level

Facial recognition technology has proliferated unchecked in the US so far. Congress finally seems ready to do something about it. Security Security / Privacy

IT 91

PoC Exploits for CVE-2019-0708 wormable Windows flaw released online

Security Affairs

Several security experts have developed PoC exploits for wormable Windows RDS flaw tracked as CVE-2019-0708 and dubbed BlueKeep.

Thales Wins Cybersecurity Excellence Awards for Encryption and Identity and Access Management Solutions

Thales eSecurity

Thales’s SafeNet Data Protection on Demand and SafeNet Trusted Access solutions have won the gold award in the Encryption and Identity and Access Management categories of the 2019 Cybersecurity Excellence Awards.

Open the Gates for Next-Gen Loyalty

Reltio

Ankur Gupta, Sr. Product Marketing Manager, Reltio. I was in Boston last week. Coincidently, Martha had dropped a mail and wanted to talk. So I decided to take the opportunity and meet her.

Is Healthcare Sector Better Prepared for Ransomware Attacks?

Data Breach Today

Snapchat Employees Reportedly Spied on Private Snaps

WIRED Threat Level

Baltimore ransomware, a Trump golf hack, and more of the week's top security news. Security Security / Security News

Chronicle’s study reveals CAs that issued most certificates to sign malware samples on VirusTotal

Security Affairs

Most of the digital certificates used to sign malware samples found on VirusTotal have been issued by the Certificate Authority (CA) Comodo CA.

Study 92

A guide to understanding how deep learning works

Information Management Resources

In deep learning, model predictions are computed based on complex, non-linear combinations of the input which allows the model to make predictions for tasks that are difficult to do even by humans. Deep learning Artificial intelligence Machine learning

Building the Bridge Between Strategy and Governance Aboard the IT Enterprise – An Interview with Kevin Gray, CIO for the City of Burbank

Information Governance Perspectives

Building a Bridge Between Strategy and Governance Aboard the IT Enterprise – An Interview with Kevin Gray, CIO of the City of Burbank Eleventh in a series of in-depth interviews with innovators and leaders in the fields of Risk, Compliance and Information Governance across the globe.

Multilayered Security Gets Personal

Data Breach Today

First Data's Tim Horton on Why Encryption Is Not Enough to Secure PII When large-scale data breaches started to proliferate more than a decade ago, security leaders called for end-to-end data encryption.

We Are Tenants on Our Own Devices

WIRED Threat Level

It's time to assert our sovereignty over our own stuff. Security Security / Privacy

IT 92

Chronicle experts spotted a Linux variant of the Winnti backdoor

Security Affairs

Security researchers from Chronicle, Alphabet’s cyber-security division, have spotted a Linux variant of the Winnti backdoor. Security experts from Chronicle, the Alphabet’s cyber-security division, have discovered a Linux variant of the Winnti backdoor.

How Technology and Politics Are Changing Spycraft

Schneier on Security

Interesting article about how traditional nation-based spycraft is changing.

A Considerable Insight into your Data | Capture, Organize, Store and Deliver rich media assets with everteam.iNSight

Everteam

In the age of Big Data , capturing , organizing and analyzing all your data is nearly impossible if you are counting on traditional methods.

Database May Have Exposed Instagram Personal Data

Data Breach Today

Email Addresses, Phone Numbers for 49 Million People Potentially Exposed There's been a potential leak of personally identifiable information from Instagram, but it's not clear yet whether the data on 49 million users came directly from the social media company.