Tue.May 21, 2019

Database May Have Exposed Instagram Data for 49 Million

Data Breach Today

Email Addresses, Phone Numbers Potentially Exposed There's been a potential leak of personally identifiable information from Instagram, but it's not clear yet whether the data on 49 million users came directly from the social media company.

PayPal's Beautiful Demonstration of Extended Validation FUD

Troy Hunt

Sometimes the discussion around extended validation certificates (EV) feels a little like flogging a dead horse. In fact, it was only September that I proposed EV certificates are already dead for all sorts of good reasons that have only been reinforced since that time.

Is Healthcare Sector Better Prepared for Ransomware Attacks?

Data Breach Today

Open the Gates for Next-Gen Loyalty


Ankur Gupta, Sr. Product Marketing Manager, Reltio. I was in Boston last week. Coincidently, Martha had dropped a mail and wanted to talk. So I decided to take the opportunity and meet her.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Database May Have Exposed Instagram Personal Data

Data Breach Today

Email Addresses, Phone Numbers for 49 Million People Potentially Exposed There's been a potential leak of personally identifiable information from Instagram, but it's not clear yet whether the data on 49 million users came directly from the social media company.

More Trending

MuddyWater APT Group Upgrades Tactics to Avoid Detection

Data Breach Today

Groups 192

The Satan Ransomware adds new exploits to its arsenal

Security Affairs

A variant of the Satan ransomware recently observed includes exploits to its arsenal and targets machines leveraging additional flaws.

Huawei Gets 90-Day Reprieve on Ban

Data Breach Today

Commerce Department Will Grant Some Temporary Exemptions to Component Ban The U.S.


Google Has Stored Some Passwords in Plaintext Since 2005

WIRED Threat Level

On the heels of embarrassing disclosures from Facebook and Twitter, Google reveals its own password bugs—one of which lasted 14 years. Security Security / Security News

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

How does API Management Complement IAM?

Data Breach Today

Flat-out, traditional IAM practices are insufficient to secure a modern enterprise that relies on such diverse endpoints and connected devices. But API management can play a strong complementary role, says Jay Thorne of CA Technologies, a Broadcom company

Emsisoft released a free Decrypter for JSWorm 2.0

Security Affairs

Good news for the victims of the JSWorm 2.0 ransomware, thanks to experts at Emsisoft they can decrypt their file for free. Experts at Emsisoft malware research team released a decrypter for a recently discovered ransomware tracked as JSWorm 2.0. JSWorm 2.0

Building the Bridge Between Strategy and Governance Aboard the IT Enterprise – An Interview with Kevin Gray, CIO for the City of Burbank

Information Governance Perspectives

Building a Bridge Between Strategy and Governance Aboard the IT Enterprise – An Interview with Kevin Gray, CIO of the City of Burbank Eleventh in a series of in-depth interviews with innovators and leaders in the fields of Risk, Compliance and Information Governance across the globe.

Avoiding cyber attacks while on the road to digital transformation

DXC Technology

No matter where your organization may be on its digital transformation journey, beware the dangers lurking along the way.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Group-IB blocked more than 180,000 links to pirated copies of Game of Thrones

Security Affairs

Since April 2019, Group-IB has successfully blocked more than 43,000 links to pirated copies of the Game of Thrones Season 8 on pirate websites, forums, and social media.

Thales Wins Cybersecurity Excellence Awards for Encryption and Identity and Access Management Solutions

Thales eSecurity

Thales’s SafeNet Data Protection on Demand and SafeNet Trusted Access solutions have won the gold award in the Encryption and Identity and Access Management categories of the 2019 Cybersecurity Excellence Awards.

After latest Microsoft Windows updates some PCs running Sophos AV not boot

Security Affairs

Sophos is warning users of potential problems with the recent Microsoft’s Patch Tuesday updates and is saying to roll back it if they want the PC to boot.

From capture to archiving, OpenText Content Services will be everywhere at Enterprise World in Toronto

OpenText Information Management

How AI and machine learning are improving customer experience

Information Management Resources

From data quality to personalization, to customer acquisition and retention, and beyond, AI and ML will shape the customer experience of the future. Customer data Customer experience Artificial intelligence Machine learning

Satan Ransomware Adds More Evil Tricks

Dark Reading

The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully

Digital assistants: The one place in banking where there aren't enough men

Information Management Resources

Finance is a male-dominated realm. But there’s one corner where women are everywhere: the virtual world of digital assistants. Digital Assistant Digital banking Fintech


Millions of Golfers Land in Privacy Hazard After Cloud Misconfig


A database with millions of data points on games played plus sensitive information was left right in the middle of the internet fairway for all to see.

Cloud 92

Facebook's robotic arms and legs are learning faster than ever

Information Management Resources

Although Facebook Inc. doesn’t sell robots, its researchers use plenty of them -- and the company said its machines are getting a lot smarter, a lot faster. Robotics Artificial intelligence Facebook

IT 101

Tres formas de impulsar una carrera IT y otras tres de hundirla

DXC Technology

Vamos a hacer el post del vaso medio vació, o medio lleno, y sugerir tres maneras de avanzar en la carrera IT, junto a otras tres formas de estrellarse. Comencemos por lo bueno; el especialista en CIOs, Paul Heltzel, ha proporcionado una lista de 15 cosas que los profesionales de IT deben hacer, para ir […]. Career Workplace IT career IT jobs

IT 63

One year old, GDPR marks a number of successes and inspirations

Information Management Resources

Since GDPR's passing, many American companies gathering data on overseas markets and customers have had to take stock of how they collect, store, and utilize the data they're pursuing. GDPR Data privacy Data security

European businesses signal ‘growing security gap’ amid mass digital transformation

Thales eSecurity

As false predictions of digital transformation fade into the past, we are hurtling into a new era of business.

First comprehensive index of the Dark Web planned for 2020 release

Information Management Resources

The project is expected to yield multiple petabytes of data that law enforcement agencies and cyber security customers can use to stop cyber crime and investigate threats. Data security Cyber security Cyber attacks Fraud prevention

Mozilla Tackles Two Critical Flaws with Firefox 67 Release


Mozilla has released a host of fixes for its browser as it rolls out its latest 67 version of Firefox, which touts better speed and privacy. Privacy Vulnerabilities Web Security Browser browser fingerprinting cryptomining Firefox Google Chrome Mozilla Mozilla Browser US-CERT

IT 88

Data Leak Exposes Instagram Influencers

Adam Levin

A leaked database has compromised the personal information of more than 49 million Instagram users, including celebrities and “influencers.”.

Cloud 61

Cisco Starts Patching Firmware Bug; Millions of Devices Still Vulnerable


A flaw in the Secure Boot trusted hardware root-of-trust affects enterprise, military and government network gear, including routers, switches and firewalls. Vulnerabilities Cisco CVE-2019-1649 networking gear patch schedule Patches Secure Boot unpatched bug

Industry Guide to Life Sciences: How to boost data visibility and regulatory compliance

OpenText Information Management

HCL Exposes Customer, Personnel Info in Wide-Ranging Data Leak


HCL domain pages exposed sensitive data - including passwords and project analysis reports - for thousands of employees and customers. Web Security customer data leak Data data leak HCL Password leak publicly exposed file Security