Tue.Aug 13, 2019

Report: SEC Investigates First American Data Exposure

Data Breach Today

Title and Settlement Company Exposed Hundreds of Millions of Data Records The U.S. Securities and Exchange Commission is investigating the exposure of personal and mortgage-related records from First American Financial Corp., according to Brian Krebs. First American spent $1.7

Patch Tuesday, August 2019 Edition

Krebs on Security

Most Microsoft Windows (ab)users probably welcome the monthly ritual of applying security updates about as much as they look forward to going to the dentist: It always seems like you were there just yesterday, and you never quite know how it’s all going to turn out.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Elon Musk Wants to Hack Your Brain

Data Breach Today

Neuralink Pursues a Brain-Computer Interface; What Could Go Wrong?

Payments and Security: Putting security where your money is

Thales eSecurity

Originally published in Payments Journal on July 31, 2019.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

SQLite Vulnerability Permits iOS Hack: Report

Data Breach Today

Check Point Researchers Say Flaw Allows Execution of Malicious Code Security researchers at Check Point Software Technologies say they've uncovered an SQLite database vulnerability in Apple iOS devices that can run malicious code capable of stealing passwords and gaining persistent control on affected devices.

More Trending

Health Data Breaches Involving Unencrypted Devices Reported

Data Breach Today

Despite the Decline of Such Incidents, Recent Breaches Serve as Reminders of Risks While health data breaches stemming from the loss or theft of unencrypted devices have nosedived in recent years, a handful of recent incidents serve as a reminder that these devices still can pose risks to patient data.

Flaws in 4G Routers of various vendors put millions of users at risk

Security Affairs

Security expert discovered multiple flaws in 4G routers manufactured by several companies, some of them could allow attackers to take over the devices. G Richter, a security researcher at Pen Test Partners discovered multiple vulnerabilities 4G routers manufactured by different vendors.

Risk 111

Exploiting GDPR to Get Private Information

Schneier on Security

A researcher abused the GDPR to get information on his fiancee: It is one of the first tests of its kind to exploit the EU's General Data Protection Regulation (GDPR) , which came into force in May 2018.

GDPR 107

Cerberus, a new banking Trojan available as malware-as-a-service in the underground

Security Affairs

Security experts analyzed a new interesting Android banking Trojan, dubbed Cerberus, that is offered for rent by its author.

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Moving on Up: Ready for Your Apps to Live in the Cloud?

Dark Reading

Among the complications: traditional security tools work poorly or not at all in the cloud, and if a company screws up, the whole Internet will know

Cloud 103

Can Information Management Policies Be Both Clear and Concise?

ARMA International

Most information management (IM) professionals would agree that well-written policies are clear and concise.

Apple's New Bounty Program Has Huge Incentives, Big Risks

Dark Reading

Industry observers applaud the program's ability to find exploits but fear unintended consequences

Risk 101

DejaBlue: New BlueKeep-Style Bugs Mean You Need to Update Windows Now

WIRED Threat Level

Vulnerabilities in Microsoft's Remote Desktop Protocol continue to plague the web. Security Security / Security News

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

History Doesn't Repeat Itself in Cyberspace

Dark Reading

The 10th anniversary of the US Cyber Command is an opportunity to prepare for unknowns in the rapidly changing cybersecurity landscape

How a 'NULL' License Plate Landed One Hacker in Ticket Hell

WIRED Threat Level

Security researcher Joseph Tartaro thought NULL would make a fun license plate. He's never been more wrong. Security Security / Security News

Adobe Patch Tuesday for August 2019 fixed 119 flaws in 8 products

Security Affairs

Adobe Patch Tuesday security updates for August 2019 addressed a total of 119 vulnerabilities affecting multiple products.

Cloud 85

2019 Pwnie Award Winners (And Those Who Wish They Weren't)

Dark Reading

This year's round-up includes awards into two new categories: most under-hyped research and epic achievement

85

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Why Healthcare is Moving to Cloud: Data Security

Perficient Data & Analytics

The following is the first blog in a series about why healthcare organizations are moving to cloud. Gone are the days of healthcare organizations wondering if they need to utilize the cloud. They must now decide how to best utilize it.

Cloud 78

Internet Routing Security Initiative Launches Online 'Observatory'

Dark Reading

Mutually Agreed Norms for Routing Security (MANRS) lets network operators and the public view online router incidents worldwide

British Airways E-Ticketing Flaw Exposes Passenger Flight, Personal Data

Threatpost

A vulnerability in British Airways' e-ticketing system could enable a bad actor to view passengers' personal data or change their booking information. Hacks Vulnerabilities British Airways British airways data breach Data Privacy Data security e-ticketing flaw Encryption

Microsoft Patches Wormable RCE Vulns in Remote Desktop Services

Dark Reading

Similar to the now-patched 'BlueKeep' vulnerability, two flaws fixed today could let malware spread across vulnerable computers

82

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Cloud migration a longer, harder journey than most organizations expect

Information Management Resources

Accenture's Siki Giunta discusses the results of a new study on cloud migration efforts, and why so many organizations say they are disappointed with the results

Cloud 74

Does Personality Make You Vulnerable to Cybercrime?

Dark Reading

A new study explores the connections between personality traits and susceptibility to different cyberattacks

81

How to manage content chaos

OpenText Information Management

ILTACON has been a staple for legal and IT professionals for over 40 years, and this year’s conference promises not to disappoint. The agenda is packed with sessions on collaboration, technological advancements and tangible takeaways that address the challenges law firms and corporate legal clients face on a daily basis. Spend less time searching for … The post How to manage content chaos appeared first on OpenText Blogs.

IT 73

700K Guest Records Stolen in Choice Hotels Breach

Dark Reading

Cybercriminals reportedly stole the information from an exposed MongoDB database on a third-party server

80

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Monzo bank tells customers to change their PINs after security

IT Governance

The digital bank Monzo has told 480,000 customers to change their PINs after it discovered an error that allowed unauthorised staff to view sensitive information. Monzo said that it normally stored PINs in a “particularly secure” part of its systems that only select employees can access.

The California Consumer Privacy Act's Hidden Surprise Has Big Legal Consequences

Dark Reading

The CCPA's provision devoted to 'reasonable' cybersecurity procedures and policies could trip up your business. Get ready now

7 trends impacting commercial and industrial IoT data

Information Management Resources

Here's a look at seven top trends that are driving this space, from compute size, to the value of true edge computing, to closed-loop edge to cloud machine learning

Cloud 64