Wed.Jul 10, 2019

Researchers Disclose Vulnerability in Siemens' ICS Software

Data Breach Today

Patch Issued in Light of Concerns Over Stuxnet-Like Attack Against Industrial Systems Researchers at the security firm Tenable uncovered a vulnerability in a Siemens software platform used to manage industrial control systems, and Siemens has issued a patch.

Kali Linux is now available for Raspberry Pi 4

Security Affairs

The popular operating system Kali Linux is finally available for Raspberry Pi 4, this is great news for hackers and passionate. Offensive Security has announced the availability of the popular operating system Kali Linux for Raspberry Pi 4, this is great news for hackers and security experts.

IT 109

Malware on the High Seas: US Coast Guard Issues Alert

Data Breach Today

Phishing Attack Against International Vessel Triggers Maritime Warnings The U.S. Coast Guard has issued an alert about an increase in malware attacks targeting the networks of commercial vessels. It's warning ship owners to take more cybersecurity precautions

Parents’ Guide for Safe YouTube and Internet Streaming for Kids

Security Affairs

You work hard to keep your kids safe from so many different dangers, but every day they are exposed to countless threats online. . Predators, disturbing content, identity theft attempts, and other things you wouldn’t let them experience in real life are all waiting for them. Shockingly, 1 in 5 U.S.

Video 101

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Zoom Reverses Course, Removes Local Web Server

Data Breach Today

Controversial Design Decision Could Allow for an Ambush Video Call Video conferencing vendor Zoom has opted to make major changes to its Mac application after a security researcher found several weaknesses in it.

Course 187

More Trending

Certain Anesthesia Devices Have Vulnerabilities: Researchers

Data Breach Today

GE Healthcare Disputes Some of the Findings; Security Experts Weigh In Authentication vulnerabilities in certain GE Healthcare anesthesia devices could potentially allow remote attackers to meddle with the devices, researchers say. GE disputes some of the findings.

Introducing the largest coordinated release in OpenText history

OpenText Information Management

Today’s market-disrupting technologies are driving new and exciting opportunities to transform the way we live our personal lives, the way we do business, and the way we run our governments. The capacity for organizations to generate and collect information is greater than ever.

Dear BA and Marriott: Your GDPR Fines Are Important to Us

Data Breach Today

Privacy Regulator's Clear Security Message: Act Now to Avoid 'Disappointment' The data protection gloves have finally come off in Europe after GDPR enforcement began last May - the U.K.'s s privacy watchdog has proposed large post-breach sanctions against British Airways and Marriott. Consider the tables now turned on firms that fail to properly safeguard personal data

GDPR 176

The Window to Rein In Facial Recognition Is Closing

WIRED Threat Level

As Congress continues to punt on facial recognition, advocacy groups have redoubled their efforts. Security Security / Privacy

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Fieldwork Software Database Exposed Customer Data: Report

Data Breach Today

Researchers Say Company Promptly Fixed Leak Sensitive information, including credit card and phone numbers, was left exposed to the internet on an unsecured database belonging to Fieldwork Software, which provides cloud-based services to small businesses, researchers note in a new report

Cloud 164

The Compliance Mandate is Real as GDPR Enforcement Accelerates

Everteam

Since its implementation in May of 2018, GDPR has been the subject of much discussion but little concrete action by many companies on both sides of the Atlantic.

Put Those Cloud Security Objections to Rest

Data Breach Today

In the wake of digital transformation, there remain some organizations that - for security reasons - resist the temptation to move to the cloud. What are their objections? Zscaler's Bil Harmer addresses these, as well as the critical questions security leaders should ask of cloud service providers

Cloud 130

Agent Smith Malware Infects 25M Android Phones to Push Rogue Ads

Threatpost

Researchers say malware infects phones in order to sneak ads on devices for profit. Malware Mobile Security Vulnerabilities 9App Adware Agent Smith Android Google Update Google Updater Janus mobile malware rogue ads

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

The New Threat Intelligence

Data Breach Today

Threat intelligence programs have evolved greatly over the past decade. But Mario Vuksan, CEO of ReversingLabs, says too many organizations are overlooking the value of local intelligence embedded in their own networks. Vuksan talks about maximizing TI resources

118
118

Details of the Cloud Hopper Attacks

Schneier on Security

Reuters has a long article on the Chinese government APT attack called Cloud Hopper. It was much bigger than originally reported. The hacking campaign, known as "Cloud Hopper," was the subject of a U.S. indictment in December that accused two Chinese nationals of identity theft and fraud.

Cloud 76

ROMANIA: Romanian Data Protection Authority issues fine for inappropriate TOMs

DLA Piper Privacy Matters

Just days after proudly announcing its first fine under the GDPR, the Romanian Data Protection Authority has done it again: World Trade Center Bucharest S.A. must pay 15,000 euro for breaching the provisions of Art. 32 para. (4) 4) GDPR corroborated with Art. 32 paras. (1) 1) and (2) GDPR.

GDPR 75

4 Reasons Why SOC Superstars Quit

Dark Reading

Security analysts know they are a hot commodity in the enviable position of writing their own ticket. Here's how to keep them engaged, challenged, and happy

How To 105

Acceptability = Mobility

Perficient Data & Analytics

Out of Touch? I was at a doctor’s office a few weeks back. I thought it was strange that he brought in a laptop and was pulling up patient information from it. It may not be strange to most, but it was for me.

10 Ways to Keep a Rogue RasPi From Wrecking Your Network

Dark Reading

A Raspberry Pi attached to the network at NASA JPL became the doorway for a massive intrusion and subsequent data loss. Here's how to keep the same thing from happening to your network

How To 104

Adobe Patch Tuesday updates for July 2019 address only 5 minor flaws

Security Affairs

Adobe Patch Tuesday updates for July 2019 address minor vulnerabilities in the Bridge CC, Experience Manager and Dreamweaver products. Good news for Adobe users, Adobe Patch Tuesday updates for July 2019 address only minor flaws in the Bridge CC, Experience Manager, and Dreamweaver products.

Enterprise World 2019—EP6 unlocks the Information Advantage

OpenText Information Management

In my keynote at Enterprise World 2019, I discussed how the latest release of OpenText’s first-class Enterprise Information Management (EIM) platform empowers organizations to unlock the Information Advantage.

GDPR 70

Why You Need a Global View of IT Assets

Dark Reading

It may seem obvious, but many companies lose sight of the fact that they can't protect what they don't know they even have

IT 99

5 Advantages of Datorama for Marketers

Perficient Data & Analytics

We all know the importance of measuring ROI and making data-driven decisions. The concept is simple. The execution, on the other hand, is easier said than done. The challenge isn’t a shortage of data. As a marketer, you’re likely sitting on a pile of it.

Industry Insight: Checking Up on Healthcare Security

Dark Reading

Modern threats putting healthcare organization at risk, how they're improving their security posture, and where many fall short

Announcing Extended ECM Documentum for SAP Solutions

OpenText Information Management

The majority of processes that take place inside SAP rely on content to some extent. With OpenText™ Extended ECM Documentum for SAP® Solutions, we make it easier to work with that content by allowing customers to view content stored in OpenText™ Documentum™ inside the SAP user interface.

ECM 67

Latest FinSpy Modules Lift Data from Secure Messaging Apps

Threatpost

The espionage tool is capable of eavesdropping on calls and messages sent via Signal, Telegram, WhatsApp and more.

Tools 94

Announcing OpenText Discovery Release 16 EP6

OpenText Information Management

In 2016, OpenText™ acquired Recommind, a pioneer in predictive coding; a year later OpenText acquired Guidance Software, the leader in forensic data collection and developers of EnCase. The recent acquisition of Catalyst Repository Systems extends and deepens the Discovery Suite portfolio.

Blog 67

Acceptability Equals Mobility

Perficient Data & Analytics

Out of Touch? I was at a doctor’s office a few weeks back. I thought it was strange that he brought in a laptop and was pulling up patient information from it. It may not be strange to most, but it was for me.

What’s new in OpenText for Legal

OpenText Information Management

Today’s corporate law department is expected to operate like any other high-performing business unit: on budget, with measurable results. Yet many still reinvent the wheel for litigation, investigations and compliance matters, sending documents to multiple law firms and vendors.

Bug in Anesthesia Respirators Allows Cyber-Tampering

Threatpost

GE Healthcare said an attacker could modify gas composition parameters within the devices' respirator function. Critical Infrastructure IoT Vulnerabilities Aespire Aestiva anesthesia devices gas composition GE Healthcare iot bugs medical devices patient danger respirator function vulnerability

IoT 93

AI, advanced analytics and biometrics becoming central to anti-fraud efforts

Information Management Resources

13 percent of organizations now use AI and machine learning to detect and deter fraud, but another 25 percent plan to adopt such technologies in the next year or two. Fraud detection Fraud prevention Artificial intelligence Analytics Biometrics