Fri.Jul 19, 2019

QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack

Krebs on Security

Cloud hosting provider iNSYNQ says it is trying to recover from a ransomware attack that shut down its network and has left customers unable to access their accounting data for the past three days.

Phishing Scheme Targets Amex Cardholders

Data Breach Today

Researchers Say Campaign Uses Email Hyperlink Splits to Evade URL Filters Researchers have uncovered a new type of phishing campaign that is targeting American Express card users.

Data governance in the age of AI: Beyond the basics

Information Management Resources

Ensuring the quality of data becomes increasingly important so that organizations don’t wind up making bigger mistakes. Data governance Data management Data strategy

Despite BlueKeep Warnings, Many Organizations Fail to Patch

Data Breach Today

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Former NSA contractor sentenced to 9 years for stealing classified data

Security Affairs

The former NSA contractor who pled guilty to stealing over 50TB of data from the Agency, was sentenced to nine years in prison.

More Trending

Poland and Lithuania fear that data collected via FaceApp could be misused

Security Affairs

Poland and Lithuania are probing the potential privacy and security risks of using a Russian-made app FaceApp. Millions of people recently downloaded the FaceApp app and are taking part in the “ #FaceApp Challenge ” to show friends how they can look like when they will be old and grey.

BEC Scams Cost U.S. Companies $300 Million Per Month: Study

Data Breach Today

Treasury Department Says an Average of 1,100 Businesses Scammed Each Month Business email compromise scams are surging, and they're costing U.S. companies a total of more than $300 million a month, according to a recently released analysis by the U.S. Treasury Department.

Study 215

Digital technologies and the future of geospatial data

Information Management Resources

Geospatial data makes it possible to use point-to-point mapping apps to reach unfamiliar destinations, track incoming flights before heading to the airport or even check weather forecasts. Geospatial data Data types Data management

Data 93

Tesla Vulnerability: A Bounty Hunter's Tale

Data Breach Today

The latest edition of the ISMG Security Report describes the accidental discovery of a Tesla software vulnerability. Also featured: an analysis of the latest ransomware trends and insights from former federal advisers Richard Clarke and Robert Knake on cyber resilience

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Israel surveillance firm NSO group can mine data from major social media

Security Affairs

The Israeli surveillance firm NSO Group informed its clients that it is able to scoop user data by mining from major social media. The Financial Times reported that the Israeli surveillance firm NSO Group informed its clients that it is able to mine user data from major social media.

Phishing Attack Aimed at Stealing Payroll Deposits

Data Breach Today

Healthcare System's Procedures Helped Prevent the Crime A Texas-based healthcare system says hackers unsuccessfully tried to divert employee payroll direct deposits through a phishing attack that also potentially exposed patient data.

Kazakhstan Government Intercepting All Secured Internet Traffic

Adam Levin

The Kazakhstan government is intercepting all HTTPS-encrypted internet traffic within its borders.

Researchers Trick Cylance Into Giving Malware a Pass

Data Breach Today

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

The rising tide of ransomware requires a commitment to best practices

Information Management Resources

It’s no accident that we’re seeing cities become targets. These organizations are traditionally viewed as being slower than the herd. Ransomware Data security Malware Cyber security

New Audit Finds More Security Vulnerabilities at IRS

Data Breach Today

GAO Makes More Security Recommendations; IRS Now Has 127 Issues to Resolve The Internal Revenue Services' internal financial reporting systems and IT infrastructure have 14 new security vulnerabilities, along with a long list of previously unresolved deficiencies, according to a U.S.

Iran-Linked APT34 Invites Victims to LinkedIn for Fresh Malware Infections


The group was posing as a researcher from Cambridge, and was found to have added three new malware families to its spy arsenal. Government Malware apt34 cambridge espionage FireEye Greenbug Irán linked in new malware OilRig Phishing social network

Groups 110

Huawei Question Must Be Answered by New UK Prime Minister

Data Breach Today

Delay is Damaging International Relationships, Parliamentary Committee Warns A powerful parliamentary committee has called on Britain's new prime minister - be it Boris Johnson or Jeremy Hunt - to make a decision "as a matter of priority" about the extent to which telecommunications gear built by Huawei should be used in the nation's 5G network

IT 123

John Paul Stevens Was a Cryptographer

Schneier on Security

I didn't know that Supreme Court Justice John Paul Stevens "was also a cryptographer for the Navy during World War II." He was a proponent of individual privacy. courts cryptography historyofcryptography privacy surveillance

Dutch police arrested the author of Dryad and Rubella Macro Builders

Security Affairs

Dutch authorities announced the arrest of a 20-year old man for allegedly developing Dryad and Rubella Macro Builders. Dutch authorities announced have arrested a 20-year old man that is accused to be the author of Dryad and Rubella Macro Builders.

Weekly Update 148

Troy Hunt

It's the last one from Norway before heading off to the US and diving into the deep end of the Project Svalbard pool followed by Black Hat and DEF CON in Vegas.

Capture? Haven't we been doing this for years?


Capture? Haven’t we been doing this for years and years? Well…yes and no. Yes, organizations have been scanning paper into digital archives for a long time. And for 72% of organizations, scanning paper is still the most important part of their information capture strategy.

eBook 72

A Harlequin Romance Novel about Hackers

Schneier on Security

Really. books hacking


The App Creeping on Your IG Location, Jakarta’s Insurance Crisis, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / Privacy

Adult Sites Lack Privacy, Open the Door for Harassment and Tracking


Third-party tracking is rampant on sites like Pornhub, with users' sexual preferences on full view. Hacks Privacy Web Security harassment opt in policies porn sites Pornhub sexual preferences third party tracking

Did you know? AMC Monthly Newsletter

Micro Focus

With the exciting new product releases across the entire Application Modernization & Connectivity portfolio, this month’s newsletter focuses on the features and support material for these fresh upgrades, including Visual COBOL 5.0 and Enterprise Suite 5.0.

Mirai Groups Target Business IoT Devices

Dark Reading

More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business

Friday Squid Blogging: Squid Mural

Schneier on Security

Large squid mural in the Bushwick neighborhood of Brooklyn. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

Blog 60

Malware in PyPI Code Shows Supply Chain Risks

Dark Reading

A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories

Risk 85

Bug in NVIDIA’s Tegra Chipset Opens Door to Malicious Code Execution


Researcher creates 'Selfblow' proof-of-concept attack for exploiting a vulnerability that exists in "every single Tegra device released so far". Hacks Malware Mobile Security Vulnerabilities bootloader cold-boot attack CVE?2019?5680 5680 Jetson TX1 L4T Nvidia Selfblow SOC system-on-a-chip Tegra vulnerability

Europol Head Fears 5G Will Give Criminals an Edge

Dark Reading

Catherine De Bolle is concerned law enforcement will lose its ability to track criminals with the arrival of 5G networks

IT 80

What Are the Benefits of Medical Records Scanning?

Record Nations

Scanning medical records and taking up a paperless practice offers benefits ranging from saving time to saving money.

Video 52