Thu.Feb 07, 2019

Stress Test: Police Visit Webstresser Stresser/Booter Users

Data Breach Today

Seized Customer Data Appears to Be Powering Ongoing Dutch and UK Probes Hundreds of suspected customers of Webstresser, a DDoS stresser/booter site that was disrupted last year, are being visited by law enforcement agents and may see jail time.

Data 201

Expert publicly disclosed the existence of 0day flaw in macOS Mojave

Security Affairs

A zero-day vulnerability in macOS Mojave can be exploited by malware to steal plaintext passwords from the Keychain. The security expert Linus Henze has disclosed the existence of a zero-day vulnerability in macOS Mojave that can be exploited by malware to steal plaintext passwords from the Keychain.

German Antitrust Office Restricts Facebook Data Processing

Data Breach Today

Data 196

Ursnif: Long Live the Steganography and AtomBombing!

Security Affairs

Yoroi ZLab – Cybaze uncovered a new wave of Ursnif attacks using a variant that implements an exotic process injection technique called AtomBombing. Another wave of Ursnif attacks hits Italy. Ursnif is one of the most active banking trojans.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

EHR Vendor Greenway Gets Hefty Fine for False Claims

Data Breach Today

Concerns Raised About Potential Impact on Patient Safety For the second time, the Department of Justice has imposed a substantial fine on an electronic health records software vendor in a case that involves data accuracy and integrity issues that could affect patient safety

Data 193

More Trending

Analyst’s view: OpenText named a leader

OpenText Information Management

OpenText™ is thrilled to be recognized by Gartner as a Leader in the 2018 Magic Quadrant for Web Content Management. In its annual review, Gartner evaluated 18 web content management vendors on objective criteria supported by customer references.

How to succeed as a high-demand data scientist

Information Management Resources

Advancing in this field requires a combination of technical and intrapersonal expertise. Understanding your value as a data scientist and extending that ingenuity to various enterprises is the key. Data Scientist Career advancement Data science

Four Use Cases Proving the Benefits of Metadata-Driven Automation


Organization’s cannot hope to make the most out of a data-driven strategy, without at least some degree of metadata-driven automation. The volume and variety of data has snowballed, and so has its velocity.

A third of companies are largely unprepared for cybersecurity attacks: eSecurity Planet Survey

eSecurity Planet

A third of companies are unprepared for some of the most damaging cyber attacks, such as APTs, insider threats, ransomware and DDoS attacks

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Google’s GDPR fine reinforces need for intentional data governance

Information Management Resources

We all knew a big enforcement was coming, and that the early, large fines would be against a social media or tech giant. But what does this mean to organizations on a broader scale? Data governance Data privacy GDPR

Alaris to Showcase Information Capture Solutions for Healthcare at HIMSS19

Document Imaging Report

ROCHESTER, N.Y., February 7, 2019 – Alaris, a Kodak Alaris business, will showcase its award-winning solutions for automating document-based business processes at HIMSS19.

Digital investments on the rise as firms seeks to save and to make money

Information Management Resources

A large majority of businesses will increase their investments in digital technology over the coming year, and many expect IT modernization to fuel future transformation efforts that lead to cost savings and greater profitability. Data strategy Data management Data mining

Boards Now Face ‘the Encryption Question’

Thales eSecurity

Tina Stewart, VP of Market Strategy. “So, So, what are we doing about encryption?”. That’s a question you can expect to be tossed around in plenty of boardrooms, in the coming months.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Senators Grill Facebook, Google, and Apple Over Invasive Apps

WIRED Threat Level

Lawmakers want more information about Facebook’s Project Atlas program, which collected data from teens and sidestepped device makers’ privacy policies. Security

China's AI Strategy and its Security Implications

Schneier on Security

Gregory C. Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China's AI strategy, commercial, government, and military. There are numerous security -- and national security -- implications

Facebook suffers German antitrust attack on business model

Information Management Resources

Facebook Inc.’s s advertising model came under attack in a landmark ruling from German antitrust regulators who ordered the social network to halt how it currently tracks its users’ internet browsing and smartphone apps. Customer data Data privacy Facebook

IT 63

Ransomware Attack Via MSP Locks Customers Out of Systems

Dark Reading

Vulnerable plugin for a remote management tool gave attackers a way to encrypt systems belonging to all customers of a US-based MSP

Small commercial insurers challenged to digitalize

Information Management Resources

LexisNexis survey provides ideas for carriers to be less overwhelmed by the journey ahead. Commercial lines Automation

Brexit and the UK Automotive Industry: Understanding the impact

OpenText Information Management

Uncertainty around the final Brexit deal between the UK and the EU still remains. This is particularly true for the automotive industry where OEMs such as Ford, Honda and Renault-Nissan have all publicly raised their concerns. To find out what was happening within the industry, and the trading options available to automotive companies, OpenText™ and … The post Brexit and the UK Automotive Industry: Understanding the impact appeared first on OpenText Blogs.

10 worrisome ransomware predictions for 2019

Information Management Resources

Healthcare information security leaders must guard against being lulled into a false sense of security. Ransomware Cyber attacks Cyber security Network security

Guide: Secure File Sharing for Accountants


If you’re an accountant or work for an accounting firm, your main job is to help clients get their finances straight, right? You deal with extremely important and confidential statements, tax records and personal information on a daily basis. .

2019 Buyer’s Guide

IG Guru

Each year our industry association publishes a handy directory of product and service suppliers who are trusted by your peers. For 2019 the i-SIGMA staff has done it again!

Go Update iOS Right Now To Fix That Very Bad FaceTime Bug

WIRED Threat Level

Apple has just released iOS 12.1.4, which fixes a group chat FaceTime bug that let callers eavesdrop on targets. Security

ThreatList: Latest DDoS Trends by the Numbers


Trends in DDoS attacks show a evolution beyond Mirai code and point to next-gen botnets that are better hidden and have a greater level of persistence on devices – making them "far more dangerous.". Cloud Security IoT Malware Most Recent ThreatLists Web Security big data botnet Chalubo crypto currency DDoS demonbot Distributed Denial of Service distributed denial of service attack Hadoop http flood Kaspersky Lab Mirai Torii botnet UDP Flood

Google's Making It Easier to Encrypt Even Cheap Android Phones

WIRED Threat Level

Adiantum will help millions of low-end Android smartphones receive the same encryption protections as flagships. Security

Apple Fixes Pesky FaceTime Bug in iOS 12.1.4 Update


Apple's iOS 12.1.4 fixes a FaceTime bug that made headlines last week. Vulnerabilities Web Security apple apple flaw FaceTime FaceTime bug ios

Weekly podcast: Metro Bank, Student Loans Company, GDPR breaches and seals

IT Governance

This week, we discuss the compromise of Metro Bank’s two-factor authentication system, nearly one million cyber attacks on the Student Loans Company, nearly 60,000 GDPR breaches and a surprising discovery for some marine biologists. Hello, and welcome to the IT Governance podcast for Thursday, 7 February 2019 – and thanks to Paula for stepping in last week while I was away. Here are this week’s stories.

EDPB Adopts Opinion on Interplay Between the EU Clinical Trials Regulation and the GDPR

Data Matters

On 23 January 2019, the European Data Protection Board (EDPB) adopted an opinion on the interplay between the EU Clinical Trials Regulation (CTR) and the EU General Data Protection Regulation (GDPR). The Opinion addresses the appropriate legal basis for the processing of personal data in the context of clinical trials (primary use), and the secondary use of clinical trial data. Legal basis for the processing of personal data in a clinical trial (primary use).


Moving toward an open future of data and AI

IBM Big Data Hub

A faster journey to AI for the enterprise? What’s the secret? In this interview with Dinesh Nirmal, IBM vice president of analytics development, he shares the highlights of his upcoming Think session: “Modernizing Your Data Estates for an AI and Multicloud World.” On Wednesday, 13 February, he and David Bernert from The Boeing Company will discuss advancements in data that will give enterprises the edge

Privacy Is Paramount in a Digital Workplace


For the past several years, one of the biggest challenges many organizations have faced is transitioning to a digital workplace. It’s daunting to switch from paper-based processes to cloud- and software-based processes with critical information stored on laptops and mobile devices.

2018 Data Breach Recap: Exposed PII Records Up 126 Percent


As 2019 enters its second month, financial institutions are ready to move on from 2018, and are rapidly focusing on how to prepare and protect their customers from the next big wave of credit card fraud. As the trends show, it's going to get better before it gets worse.