Wed.Mar 13, 2019

Ursnif Banking Trojan Variant Steals More Than Financial Data

Data Breach Today

Researchers Say Latest Version Evades Detection A variant of the long-running Ursnif banking Trojan is able to better evade security protection and has the ability to steal not only financial information but also email user accounts, the content of inboxes and digital wallets, researchers report

Data 238

Ad Network Sizmek Probes Account Breach

Krebs on Security

Online advertising firm Sizmek Inc. [ NASDAQ: SZMK ] says it is investigating a security incident in which a hacker was reselling access to a user account with the ability to modify ads and analytics for a number of big-name advertisers.

Ransomware Attack on Vendor Affects 600,000

Data Breach Today

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

There are certain things we as consumers have come to do intuitively: brushing our teeth in the morning; looking both ways before crossing a city street; buckling up when we get into a car. Related: What needs to happen to enable driverless transportation — safely. In the not too distant future, each one of us will need to give pause, on a daily basis, to duly consider how we purchase and use Internet of Things devices and services. This is coming.

IoT 152

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Hackers Love to Strike on Saturday

Data Breach Today

Analysis of Pre-GDPR Breach Reports in UK Reveals Attack Trends If you had to guess what day of the week a hacker will hit your organization, the answer might seem obvious: Hackers prefer to strike on Saturday. And a review by Redscan of cybersecurity incidents reported to Britain's privacy regulator before GDPR took effect confirms it

GDPR 195

More Trending

Microsoft Patches Fresh Flaws Hit by Hackers

Data Breach Today

Slew of Critical Security Updates From Microsoft and Adobe Patch or perish, March edition: Microsoft releases fixes for 65 new vulnerabilities, including two that are being exploited in the wild.

CVE-2019-0797 Windows Zero-Day exploited by FruityArmor and SandCat APT Groups

Security Affairs

One of the zero-day flaws ( CVE-2019-0797 ) patched this week by Microsoft has been exploited in targeted attacks by several threats groups, including FruityArmor and SandCat APT groups.

Groups 102

Art Coviello on the 2019 State of Security

Data Breach Today

Ex-RSA Chair Weighs In on Threats, Technologies and Opportunities Retired RSA Chairman Art Coviello is optimistic about the rise of privacy and the progression in how enterprises secure their critical, expanded networks. But he also has significant concerns

NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

The Last Watchdog

It’s hard to believe this month marks the 20th anniversary of the release of the devastating Melissa email virus which spread around the globe in March 1999. Related: The ‘Golden Age’ of cyber espionage is upon us. Melissa was hidden in a weaponized Word document that arrived as an email attachment.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Using Machine Learning for Fraud Prevention

Data Breach Today

Machine learning can play an important role in fraud prevention at financial institutions, says Marc Trepanier of ACI Worldwide, who addresses the challenges involved


Average cost of cyber crime is now $13 million

IT Governance

The digital landscape is changing quickly, and cyber crime is on the rise. Last year there were 2.3 billion data breaches, compared to 826 million in 2017. With attacks becoming increasingly sophisticated and hard to defend against, they can cost organisations a lot of money each year.

Russia attempts to prevent Russian citizens from using ProtonMail

Security Affairs

ProtonMail back after the Russian government has been attempting to prevent Russian citizens from sending messages to ProtonMail.

Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage

Thales eSecurity

At the 2019 RSA Conference, Pure Storage and Thales introduced Vormetric Transparent Encryption for Efficient Storage – the IT and security industries’ first end-to-end data encryption framework that realizes storage array data reduction.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Judging Facebook's Privacy Shift

Schneier on Security

Facebook is making a new and stronger commitment to privacy. Last month, the company hired three of its most vociferous critics and installed them in senior technical positions.

Modular Cryptojacking malware uses worm abilities to spread

Security Affairs

Security experts at 360 Total Security have discovered a new modular cryptocurrency malware that implements worm capabilities to spread.

Hybrid IT tactics and techniques

DXC Technology

As companies embrace hybrid IT, they must address both technology and the human side of change. There are several key actions to take: Staff and train differently: As applications move from traditional platforms to the cloud, current IT staff needs to be trained and re-skilled. Companies should recruit developers adept in Agile methodologies. Siloes should […]. Cloud DevOps Digital Transformation Platform AI automation cloud cloudops governance hybrid IT shadow IT talent

IT 74

Two New Proposed Rules Would Increase Interoperability of Health Information


Interoperability takes center stage in the world of healthcare once again as both the Centers for Medicare & Medicaid Services (CMS) and the Office of the National Coordinator for Health Information Technology (ONC) propose new rules to increase patient and provider access to health records.

CMS 70

Say "Hello" to Microsoft Kaizala!


Tools 67

IoT Cybersecurity Bill Proposed to Congress

Adam Levin

Congress proposed a bill to improve the security of internet-enabled devices called the Internet of Things (IoT) Cybersecurity Improvement Act of 2019.

IoT 66

What’s the difference between data mining and text mining?

OpenText Information Management

Even though data mining and text mining are often seen as complementary analytic processes that solve business problems through data analysis, they differ on the type of data they handle.

When Facebook Goes Down, Don't Blame Hackers

WIRED Threat Level

Facebook, Instagram, and WhatsApp spent several hours offline in many parts of the world today. Just don't call it a DDoS attack. Security

IT 62

Fix what ain’t broken to keep your expensive equipment running seamlessly

OpenText Information Management

“Don’t fix what ain’t broken,” the cliché runs. But anyone with expensive assets to maintain – from precision tooling machines to a fleet of jets – knows that you don’t fix only the things that are broken.

Tools 65

DevSecOps: How to Build Security into Apps

eSecurity Planet

We define DevSecOps, how it relates to DevOps, and how security can be built into the application development process with minimal disruption

Gambling trade bodies are creating a powerful lobbying group amid strengthening regulations

IT Governance

3 suggerimenti da considerare quando si automatizza l’esperienza del cliente

DXC Technology

Ho partecipato alla Customer Contact Week di quest’anno a Las Vegas e ho avuto un’impressione diversa da quella prevista. Attraverso più gruppi di discussione e conversazioni con i partecipanti è chiaro che i professionisti della customer experience credono che “l’automatizzazione è già qui” Molti partecipanti hanno espresso l’urgenza di andare avanti. Tuttavia, questa eccitazione va […]. Uncategorized automatizzazione esperienza del cliente

7 emerging data security and risk management trends

Information Management Resources

Risk appetite statements, governance frameworks and password-less authentication are among the growing trends that will impact security, privacy and risk leaders, says Gartner. Data security Cyber security Cyber attacks Malware

Questions to ask a document imaging provider – Part 2

TAB OnRecord

Last week we explored some initial questions to ask a prospective document imaging provider. As we pointed out, you need to get some up-front clarity on the quote; find out who will be working on the project; and enquire about their methodologies for planning, document access and security.

Threat Groups SandCat, FruityArmor Exploiting Microsoft Win32k Flaw


Newly patched CVE-2019-0797 is being actively exploited by two APTs, FruityArmor and SandCat. Vulnerabilities Web Security apt CVE-2019-0797 Exploit FruityArmor in the wild Microsoft patch tuesday SandCat zero day

How to Reduce Your Carbon Footprint With Document Scanning

Record Nations

Despite recent growth in technology paper consumption also continues to grow, however with document scanning digital files not only make your records management more sustainable, but also cheaper and more efficient.

Book Review: Information Governance for Healthcare Professionals: A Practical Approach

IG Guru

Robert Smallwood’s latest book on Information Governance is part of the HIMSS book series. The book is titled: Information Governance for Healthcare Professionals: A Practical Approach. Some of the highlights of the book are: A lot of Sedona Conference references.

Intel Windows 10 Graphics Drivers Riddled With Flaws


Intel has patched several high-severity vulnerabilities in its graphics drivers for Windows 10, which could lead to code execution. Vulnerabilities cpu flaw Intel intel graphics driver Intel Vulnerability Microsoft patch Windows 10

IT 74