Trending Articles

4 Key Considerations for Employee Password Hardening & Compromised Password Monitoring

Data Breach Today

Traditional Methods to Thwart Successful Attacks are Becoming Less Effective The new method of weak and compromised continuous password monitoring can reduce user frustration and IT burden

Ransomware Bites 400 Veterinary Hospitals

Krebs on Security

BEST PRACTICES: Resurgence of encrypted thumb drives shows value of offline backups — in the field

The Last Watchdog

Encrypted flash drives, essentially secure storage on a stick, are a proven technology that has been readily available for at least 15 years. A few years back, it seemed like they would fade into obsolescence, swept aside by the wave of streaming services and cloud storage. Related: Can Europe’s GDPR restore data privacy? And yet today there is a resurgence in demand for encrypted flash drives.

CVE-2019-2234 flaws in Android Camera Apps exposed millions of users surveillance

Security Affairs

Experts found multiple flaws (CVE-2019-2234) in the Android camera apps provided by Google and Samsung that could allow attackers to spy on users.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Suit against Estée Lauder spotlights 401k Distribution Fraud

The Security Ledger

A former Estée Lauder employee is suing the company after $99,000 in retirement savings disappeared from her account. Experts say the case raises troubling questions about the security of $5.7 trillion stored in 401k retirement plans.

More Trending

Why Were the Russians So Set Against This Hacker Being Extradited?

Krebs on Security

The Russian government has for the past four years been fighting to keep 29-year-old alleged cybercriminal Alexei Burkov from being extradited by Israel to the United States.

SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

The Last Watchdog

There’s little doubt that the shift to quantum computing will open new horizons of digital commerce. But it’s also plain as day that the mainstreaming of quantum processing power will profoundly exacerbate cybersecurity exposures. Related: The ‘post quantum crytpo’ race is on This isn’t coming as any surprise to IT department heads.

Kofax Launches TotalAgility Cloud, a SaaS Version of its Market-Leading Capture and Automation Solution

Document Imaging Report

Multiple Deployment Options Now Provide Customers with More Flexibility. Irvine, CA – Nov.

Alleged Magecart hackers planted a software skimmer into Macy’s Website

Security Affairs

Macy’s has started notifying some of its customers that crooks used a software skimmer to steal their personal and financial information.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Bill Aims to Fill Consumer Health Device Data Privacy 'Gap'

Data Breach Today

Also, House Committee Scrutinizes Google/Ascension Patient Data Sharing Deal In the wake of Google's plan to buy Fitbit, two U.S. senators have introduced legislation that aims to protect the privacy of consumer health data collected on wearable devices.

Orcus RAT Author Charged in Malware Scheme

Krebs on Security

In July 2016, KrebsOnSecurity published a story identifying a Toronto man as the author of the Orcus RAT , a software product that’s been marketed on underground forums and used in countless malware attacks since its creation in 2015.

California Company Settles FTC Allegations that it Falsely Claimed Participation in EU-U.S. Privacy Shield

Information Governance Perspectives

California Company Settles FTC Allegations that it Falsely Claimed Participation in EU-U.S. Privacy Shield A California company has agreed to settle Federal Trade Commission allegations that it falsely claimed participation in the EU-U.S.

DuckDuckGo Will Automatically Encrypt More Sites You Visit

WIRED Threat Level

If a site offers HTTPS, DuckDuckGo's Smarter Encryption will take you there. Security Security / Security News

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Adobe announces end of support for Acrobat 2015 and Adobe Reader 2015

Security Affairs

Adobe announces the end of support for Acrobat 2015 and Reader 2015. It’s official, Adobe announces the end of support for Adobe Acrobat and Reader 2015.

IT 52

Macy's E-Commerce Site Hacked

Data Breach Today

Payment Card Data Stolen by JavaScript Added to Checkout and 'My Account' Pages Macy's says hackers successfully infiltrated its e-commerce website and planted rogue JavaScript, enabling them to steal customer data, including payment card information.

IT 130

[Infographic] 10 Things You Need to Know About Automating Information Governance from AIIM

IG Guru

Visit this site to download the infographic. The post [Infographic] 10 Things You Need to Know About Automating Information Governance from AIIM appeared first on IG GURU.

Post-GDPR Developments on Data Protection and Privacy Regulations Around the World

Thales eSecurity

In the modern era of a global information economy, every single day, enormous amounts of information are transmitted, stored and collected worldwide.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Opinion: Websites Ask for Permissions And Attack Forgiveness

WIRED Threat Level

Web pages are increasingly powerful—asking for notifications, webcam access, or location—but this great power comes with great vulnerabilities. Security Security / Privacy

Alleged Magecart hackers planted a software skimmer into Macy’s Website

Security Affairs

Macy’s has started notifying some of its customers that crooks used a software skimmer to steal their personal and financial information.

Watchdog Agencies Report on VA Privacy, Security Woes

Data Breach Today

Privacy of 'Millions' Potentially at Risk; Security Weaknesses Cited Two recent reports issued by separate watchdog agencies spotlight data privacy and security challenges at the Department of Veterans Affairs. What were the critical concerns

Episode 168: Application Security Debt is growing. Also: Web App Security in the Age of IoT

The Security Ledger

In this week’s episode of the podcast (#168), sponsored by Signal Sciences, Chris Eng of Veracode joins us to talk about the 10th annual State of Software Security Report and the problem of application security debt.

When Bank Communication is Indistinguishable from Phishing Attacks

Troy Hunt

You know how banks really, really want to avoid their customers falling victim to phishing scams? And how they put a heap of effort into education to warn folks about the hallmarks of phishing scams?

Google pushes out important updates about the California Consumer Privacy Act (CCPA)

Information Governance Perspectives

On Monday, November 18th, Google AdSense pushed out the following updates regarding the California Consumer Privacy Act: from Google: The California Consumer Privacy Act (CCPA) is a new data privacy law that applies to certain businesses which collect personal information from California residents.

Ransomware infected systems at state government of Louisiana

Security Affairs

Another ransomware attack made the headlines, the victim is the state government of Louisiana, numerous services have been impacted.

This Time, Election Protection Bill Gets Bipartisan Support

Data Breach Today

Latest Proposal Calls for Research on Safeguarding Voting Equipment A bill passed by a committee last week and sent to the U.S. House floor would empower two federal agencies to investigate vulnerabilities in voting equipment and propose new ways to better protect it from attack

IT 130

Episode 168: Application Security Debt is growing and Securing Web Apps in the Age of IoT

The Security Ledger

In this week’s episode of the podcast (#168), sponsored by Signal Sciences, Chris Eng of Veracode joins us to talk about the 10th annual State of Software Security Report and the problem of application security debt.

Security Vulnerabilities in Android Firmware

Schneier on Security

Researchers have discovered and revealed 146 vulnerabilities in various incarnations of Android smartphone firmware. The vulnerabilities were found by scanning the phones of 29 different Android makers, and each is unique to a particular phone or maker.