Sun.Sep 15, 2019

A bug in Instagram exposed user accounts and phone numbers

Security Affairs

Facebook addressed a vulnerability in Instagram that could have allowed attackers to access private user information. The security researcher @ZHacker13 discovered a flaw in Instagram that allowed an attacker to access account information, including user phone number and real name.

Access 114

Tory Brexit advert ‘could breach privacy’

The Guardian Data Protection

Online campaign gathering information on voters may be illegal, claims data protection expert The Conservatives are at risk of breaking data laws by gathering information about pro-Brexit voters through an online campaign, it has emerged.

Drone attacks hit two Saudi Arabia Aramco oil plants

Security Affairs

Drone attacks have hit two major oil facilities run by the state-owned company Aramco in Saudi Arabia, one of them is the Abqaiq site.

The rise of low-code/no-code application development platforms

DXC Technology

“Software is eating the world.” That was the bold proclamation renowned innovator and venture capitalist Marc Andreessen expressed in an article he wrote for the Wall Street Journal. More and more businesses are being run by software, he argued, or are differentiating themselves and disrupting their competitors and industries using the same. Today, that article […]. Applications Asia app development

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Astaroth Trojan leverages Facebook and YouTube to avoid detection

Security Affairs

Cofense experts uncovered a new variant of the Astaroth Trojan that uses Facebook and YouTube in the infection process. Researchers at Cofense have uncovered a phishing campaign targeting Brazilian citizens with the Astaroth Trojan that uses Facebook and YouTube in the infection process.

More Trending

Delaler Leads, a car dealer marketing firm exposed 198 Million records online

Security Affairs

Researcher discovered an unsecured database exposed online, belonging to car dealership marketing firm Dealer Leads, containing 198 million records. The researcher Jeremiah Fowler discovered an unsecured database exposed online that belong to car dealership marketing firm Dealer Leads.

Appellate Court Vacates Order Allowing Plaintiff’s Expert Access to Defendant’s ESI Prior to Privilege Determination: eDiscovery Case Law

eDiscovery Daily

In Crosmun v. Trustees of Fayetteville Technical Community College, No. COA18-1054 (N.C.

Security Affairs newsletter Round 231

Security Affairs

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs. Hi folk, let me inform you that I suspended the newsletter service, anyway I’ll continue to provide you a list of published posts every week through the blog. Once again thank you!

Top 9 Best Cyber Managed Security Service Providers (MSSPs)

Cllax

The threats posed by nation-state actors or other international crime syndicates are pervasive and will continue to affect every industry due to the reliance upon technology. Various studies have cited. Providers

Study 28

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Tor Project’s Bug Smash Fund raises $86K in August

Security Affairs

The Tor Project has raised $86,000 for a Bug Smash fund that it will use to pay developers that will address critical flaws in the popular anonymizing network. The Tor Project has raised $86,000 for a Bug Smash fund that was created to pay developers that will address critical security and privacy issues in the popular anonymizing network.

Tools 85

Top 7 Network Access Control (NAC) Products, Software & Solutions

Cllax

A computer network access control is employed in order to control any kind of communications by any software, user or computer within or outside the network. This is to prevent. Software and Tools