Tue.Apr 23, 2019

Facebook Marketplace Flaw Revealed Seller's Exact Location

Data Breach Today

Privacy Peril: Thieves Use Location Data to 'Shop' for High-Value Items Facebook has fixed a security vulnerability in its digital marketplace that could have been abused to identify the precise location of a seller, and by extension, their goods.

G7 Comes Out in Favor of Encryption Backdoors

Schneier on Security

How to Shift Security Practices From Monitoring to Observability

Data Breach Today

Is 'Observability' just a disingenuous rebrand of 'monitoring'? Is it monitoring on steroids? Or, is it the new way to find out "why" (and not just "if") your system, IT or application isn't working as expected? Today we see th

How To 196

NEW TECH: Alcide introduces a “microservices firewall” as a dynamic ‘IaaS’ market takes shape

The Last Watchdog

As a tech reporter at USA TODAY, I wrote stories about how Google fractured Microsoft’s Office monopoly , and then how Google clawed ahead of Apple to dominate the global smartphone market. Related: A path to fruition of ‘SecOps’ And now for Act 3, Google has thrown down the gauntlet at Amazon, challenging the dominant position of Amazon Web Services in the fast-emerging cloud infrastructure global market.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Protecting Substance Addiction Data: The Challenges

Data Breach Today

Recent Breaches Call Attention to Complex Privacy Compliance Issues Two organizations that provide treatment to patients with substance addictions have recently reported breaches of sensitive information.

More Trending

'Silence' Cybercrime Gang Targets Banks in More Regions

Data Breach Today

Banks in U.K.,

Tools 176

GDPR fines are coming and here’s why

IT Governance

Stop us if you’ve heard this one before: organisations that fail to meet the requirements of the GDPR (General Data Protection Regulation) face fines of up to €20 million (about £17.3 million) or 4% of their annual global turnover.

GDPR 89

The FBI's RAT: Blocking Fraudulent Wire Transfers

Data Breach Today

Bureau's Recovery Asset Team Targets Choke Points to Recover Lost Funds Fraud, e-hustles and social engineering attacks continues to proliferate, the FBI's latest report into the state of internet crime confirms. But over the past year, a new FBI tactic for quickly stopping fraudulent wire transfers has notched notable successes

140
140

A 'Blockchain Bandit' Is Guessing Private Keys and Scoring Millions

WIRED Threat Level

The larger lesson of an ongoing Ethereum crime spree: Be careful with who's generating your cryptocurrency keys. Security Security / Cyberattacks and Hacks

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

FireEye experts found source code for CARBANAK malware on VirusTotal?

Security Affairs

Cybersecurity researchers from FireEye revealed that the Carbanak source code has been available on VirusTotal for two years, and none noticed it before. Researchers at FireEye discovered that the Carbanak source code has been available on VirusTotal for two years, but it was not noticed before.

15 top providers of data quality tools

Information Management Resources

Informatica, Syncsort, Talend, Information Builders and BackOffice Associates are among the leading vendors for data quality software, according to a new Gartner Magic Quadrant report. Data quality Data visualization Data management

Tools 74

Iran-linked APT34: Analyzing the webmask project

Security Affairs

Security expert Marco Ramilli published the findings of a quick analysis of the webmask project standing behind the DNS attacks implemented by APT34 (aka OilRig and HelixKitten ). Thanks to the leaked source code it is now possible to check APT34 implementations and techniques.

How to prepare your workforce for the arrival of AI

DXC Technology

One of the guiding principles of technology innovation is that any new product should be there to adapt and support the human user not vice versa. The notion of robots taking away jobs is frightening, especially given the dire predictions that have been made about how automation will replace millions of workers, particularly those in […]. Digital Transformation Leadership and Success Robotics Workplace artificial intelligence CIOs

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Kaspersky speculates the involvement of ShadowPad attackers in Operation ShadowHammer

Security Affairs

Experts at Kaspersky Lab linked the recent supply-chain attack targeted ASUS users to the “ShadowPad” threat actor and the CCleaner incident.

Healthcare plays catch-up on adopting disruptive technologies

Information Management Resources

Big data and data management solutions will provide the necessary tools to drive better decisions, and can also improve the efficiency, output and accuracy of nearly all medical operations. Healthcare innovations Artificial intelligence Data visualization Internet of things

Bodybuilding.com forces password reset after a security breach

Security Affairs

Bad news for fitness and bodybuilding passionates, the popular online retailer Bodybuilding.com announced that hackers have broken into its systems. The popular online retailer website Bodybuilding.com announced last week that hackers have broken into its systems.

The Micro Focus Experience Approach

Micro Focus

Horses for courses The best Experience Management treats all customers differently. We, at Micro Focus, don’t just broad brush all of our customers but instead tailor our views and understanding for different customer groups and segments. This allows us to both understand specific change as it occurs and action on it effectively. Experience Premium The. View Article. Company Culture Corporate Customer Experience Experience Premium

Targeted Attacks hit multiple embassies with Trojanized TeamViewer

Security Affairs

CheckPoint firm uncovered a cyber espionage campaign leveraging a weaponized version of TeamViewer to target officials in several embassies in Europe. Security experts at CheckPoint uncovered a cyber espionage campaign leveraging a weaponized version of TeamViewer and malware disguised as a top-secret US government document to target officials in several embassies in Europe.

Supply Chain Hackers Snuck Malware Into Videogames

WIRED Threat Level

An aggressive group of supply chain hackers strikes again, this time further upstream. Security Security / Cyberattacks and Hacks

FireEye experts found source code for CARBANAK malware on VirusTotal?

Security Affairs

Cybersecurity researchers from FireEye revealed that the Carbanak source code has been available on VirusTotal for two years, and none noticed it before. Researchers at FireEye discovered that the Carbanak source code has been available on VirusTotal for two years, but it was not noticed before.

Morrisons heads to the Supreme Court over data breach

IT Governance

The Supreme Court has given Morrisons permission to appeal a ruling that found the supermarket liable for a data breach caused by a malicious insider. Morrisons has lost two cases related to its March 2014 data breach , in which Andrew Skelton, a senior internal auditor at the supermarket’s Bradford office, leaked the payroll data of 99,998 employees. The information comprised names, addresses, gender, dates of birth, phone numbers, National Insurance numbers, bank details and salaries.

Compromised EmCare email accounts put data of 60,000 at risk

Information Management Resources

A national provider of medical professionals for U.S. hospitals had employees’ email accounts accessed by hackers, potentially exposing the data of 60,000 patients and physicians. Hacking Data breaches Healthcare fraud Identity theft

Risk 60

1 in 4 Workers Are Aware Of Security Guidelines - but Ignore Them

Dark Reading

1 in 4 Workers Are Aware Of Company IT Security Guidelines but Don't Follow Them

IT 84

EmCare reveals patient and employee data were hacked

Security Affairs

EmCare disclosed that a number of employees’ email accounts had been hacked, potentially exposing personal information of patients and employees. EmCare disclosed that a number of employees’ email accounts had been hacked, potentially exposing personal information of patients and employees.

Stuxnet Family Tree Grows

Dark Reading

What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack

82

The only way to rein in big tech is to treat them as a public service | Nick Srnicek

The Guardian Data Protection

The drive for profit is behind many of the ills of Google, Facebook et al. Unions and public ownership are the only way to solve this After years of praising their virtues, governments across the world are belatedly waking up to the problems posed by big tech. From India and Australia to France and America – and now the UK, with its report from the Digital Competition Expert Panel – politicians have been reckoning with how to mitigate the harms of the world’s largest technology platforms.

Microsoft Windows, Antivirus Software at Odds After Latest Update

Dark Reading

This month's Windows update has caused incompatibilities with software from at least five antivirus companies, resulting in slow boot times and frozen systems

77

Two Weeks, Two Sedona Conference Guides Published: eDiscovery Best Practices

eDiscovery Daily

Last year, The Sedona Conference® (TSC) published a bunch of…er…publications.

#ModernDataMasters: Scott Taylor, “The Data Whisperer”

Reltio

Kate Tickner, Reltio.

MDM 52

New Twist in the Stuxnet Story

Dark Reading

What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack

73

Exploits for Social Warfare WordPress Plugin Reach Critical Mass

Threatpost

More and more attacks taking advantage of a XSS and RCE bug in the popular plugin have cropped up in the wild. Hacks Vulnerabilities Web Security Attacks cross-site scripting exploits in the wild plugin remote code execution vulnerability wordpress