Tue.May 21, 2019

Database May Have Exposed Instagram Data for 49 Million

Data Breach Today

Email Addresses, Phone Numbers Potentially Exposed There's been a potential leak of personally identifiable information from Instagram, but it's not clear yet whether the data on 49 million users came directly from the social media company.

PayPal's Beautiful Demonstration of Extended Validation FUD

Troy Hunt

Sometimes the discussion around extended validation certificates (EV) feels a little like flogging a dead horse. In fact, it was only September that I proposed EV certificates are already dead for all sorts of good reasons that have only been reinforced since that time.

Is Healthcare Sector Better Prepared for Ransomware Attacks?

Data Breach Today

Open the Gates for Next-Gen Loyalty


Ankur Gupta, Sr. Product Marketing Manager, Reltio. I was in Boston last week. Coincidently, Martha had dropped a mail and wanted to talk. So I decided to take the opportunity and meet her.

Contact Center Cloud Migration Done Right

Speaker: Sheila McGee-Smith, Founder and Principal Analyst, McGee-Smith Analytics

Many companies are in the midst of migrating their contact center to the cloud. Understanding how best to execute the transition of premises to cloud is part of that process. Join contact center industry analyst and No Jitter blogger Sheila McGee-Smith as she discussed tried and true best practices for avoiding the potential pitfalls of CX migration.

Database May Have Exposed Instagram Personal Data

Data Breach Today

Email Addresses, Phone Numbers for 49 Million People Potentially Exposed There's been a potential leak of personally identifiable information from Instagram, but it's not clear yet whether the data on 49 million users came directly from the social media company.

More Trending

MuddyWater APT Group Upgrades Tactics to Avoid Detection

Data Breach Today

Groups 180

How Technology and Politics Are Changing Spycraft

Schneier on Security

Interesting article about how traditional nation-based spycraft is changing.

Huawei Gets 90-Day Reprieve on Ban

Data Breach Today

Commerce Department Will Grant Some Temporary Exemptions to Component Ban The U.S.


Google Has Stored Some Passwords in Plaintext Since 2005

WIRED Threat Level

On the heels of embarrassing disclosures from Facebook and Twitter, Google reveals its own password bugs—one of which lasted 14 years. Security Security / Security News

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

How does API Management Complement IAM?

Data Breach Today

Flat-out, traditional IAM practices are insufficient to secure a modern enterprise that relies on such diverse endpoints and connected devices. But API management can play a strong complementary role, says Jay Thorne of CA Technologies, a Broadcom company

Building the Bridge Between Strategy and Governance Aboard the IT Enterprise – An Interview with Kevin Gray, CIO for the City of Burbank

Information Governance Perspectives

Building a Bridge Between Strategy and Governance Aboard the IT Enterprise – An Interview with Kevin Gray, CIO of the City of Burbank Eleventh in a series of in-depth interviews with innovators and leaders in the fields of Risk, Compliance and Information Governance across the globe.

Thales Wins Cybersecurity Excellence Awards for Encryption and Identity and Access Management Solutions

Thales eSecurity

Thales’s SafeNet Data Protection on Demand and SafeNet Trusted Access solutions have won the gold award in the Encryption and Identity and Access Management categories of the 2019 Cybersecurity Excellence Awards.

The Satan Ransomware adds new exploits to its arsenal

Security Affairs

A variant of the Satan ransomware recently observed includes exploits to its arsenal and targets machines leveraging additional flaws.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Satan Ransomware Adds More Evil Tricks

Dark Reading

The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully

From capture to archiving, OpenText Content Services will be everywhere at Enterprise World in Toronto

OpenText Information Management

Emsisoft released a free Decrypter for JSWorm 2.0

Security Affairs

Good news for the victims of the JSWorm 2.0 ransomware, thanks to experts at Emsisoft they can decrypt their file for free. Experts at Emsisoft malware research team released a decrypter for a recently discovered ransomware tracked as JSWorm 2.0. JSWorm 2.0

Millions of Golfers Land in Privacy Hazard After Cloud Misconfig


A database with millions of data points on games played plus sensitive information was left right in the middle of the internet fairway for all to see.

Cloud 101

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

After latest Microsoft Windows updates some PCs running Sophos AV not boot

Security Affairs

Sophos is warning users of potential problems with the recent Microsoft’s Patch Tuesday updates and is saying to roll back it if they want the PC to boot.

Mozilla Tackles Two Critical Flaws with Firefox 67 Release


Mozilla has released a host of fixes for its browser as it rolls out its latest 67 version of Firefox, which touts better speed and privacy. Privacy Vulnerabilities Web Security Browser browser fingerprinting cryptomining Firefox Google Chrome Mozilla Mozilla Browser US-CERT

IT 99

Group-IB blocked more than 180,000 links to pirated copies of Game of Thrones

Security Affairs

Since April 2019, Group-IB has successfully blocked more than 43,000 links to pirated copies of the Game of Thrones Season 8 on pirate websites, forums, and social media.

Cisco Starts Patching Firmware Bug; Millions of Devices Still Vulnerable


A flaw in the Secure Boot trusted hardware root-of-trust affects enterprise, military and government network gear, including routers, switches and firewalls. Vulnerabilities Cisco CVE-2019-1649 networking gear patch schedule Patches Secure Boot unpatched bug

Top 7 characteristics of a modern data architecture

IBM Big Data Hub

A modern data architecture (MDA) must support the next generation cognitive enterprise which is characterized by the ability to fully exploit data using exponential technologies like pervasive artificial intelligence (AI) , automation, Internet of Things (IoT) and blockchain

HCL Exposes Customer, Personnel Info in Wide-Ranging Data Leak


HCL domain pages exposed sensitive data - including passwords and project analysis reports - for thousands of employees and customers. Web Security customer data leak Data data leak HCL Password leak publicly exposed file Security

Tres formas de impulsar una carrera IT y otras tres de hundirla

DXC Technology

Vamos a hacer el post del vaso medio vació, o medio lleno, y sugerir tres maneras de avanzar en la carrera IT, junto a otras tres formas de estrellarse. Comencemos por lo bueno; el especialista en CIOs, Paul Heltzel, ha proporcionado una lista de 15 cosas que los profesionales de IT deben hacer, para ir […]. Career Workplace IT career IT jobs

IT 63

Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter


Enjoy the video replay of the recent Threatpost cloud security webinar, featuring a panel of experts offering best practices and ideas for managing data in a cloudified world.

Cloud 90

European businesses signal ‘growing security gap’ amid mass digital transformation

Thales eSecurity

As false predictions of digital transformation fade into the past, we are hurtling into a new era of business.

Intel Fixes Critical, High-Severity Flaws Across Several Products


Intel has issued fixes for a slew of vulnerabilities, separate from the side-channel bugs disclosed last week. Vulnerabilities converged security and management engine critical flaw CSME CVE-2019-0153 high severity flaw Intel intel flaw Intel Patch intel products privilege escalation vulnerabilitie

Data Leak Exposes Instagram Influencers

Adam Levin

A leaked database has compromised the personal information of more than 49 million Instagram users, including celebrities and “influencers.”.

Cloud 61

Industry Guide to Life Sciences: How to boost data visibility and regulatory compliance

OpenText Information Management

Old Threats Are New Again

Dark Reading

They may look familiar to you, and that isn't a coincidence. New threats are often just small twists on old ones