Tue.Apr 23, 2019

Facebook Marketplace Flaw Revealed Seller's Exact Location

Data Breach Today

Privacy Peril: Thieves Use Location Data to 'Shop' for High-Value Items Facebook has fixed a security vulnerability in its digital marketplace that could have been abused to identify the precise location of a seller, and by extension, their goods.

NEW TECH: Alcide introduces a “microservices firewall” as a dynamic ‘IaaS’ market takes shape

The Last Watchdog

As a tech reporter at USA TODAY, I wrote stories about how Google fractured Microsoft’s Office monopoly , and then how Google clawed ahead of Apple to dominate the global smartphone market. Related: A path to fruition of ‘SecOps’ And now for Act 3, Google has thrown down the gauntlet at Amazon, challenging the dominant position of Amazon Web Services in the fast-emerging cloud infrastructure global market.

How to Shift Security Practices From Monitoring to Observability

Data Breach Today

Is 'Observability' just a disingenuous rebrand of 'monitoring'? Is it monitoring on steroids? Or, is it the new way to find out "why" (and not just "if") your system, IT or application isn't working as expected? Today we see th

How To 190

G7 Comes Out in Favor of Encryption Backdoors

Schneier on Security

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Protecting Substance Addiction Data: The Challenges

Data Breach Today

Recent Breaches Call Attention to Complex Privacy Compliance Issues Two organizations that provide treatment to patients with substance addictions have recently reported breaches of sensitive information.

More Trending

'Silence' Cybercrime Gang Targets Banks in More Regions

Data Breach Today

Banks in U.K.,

Tools 170

A 'Blockchain Bandit' Is Guessing Private Keys and Scoring Millions

WIRED Threat Level

The larger lesson of an ongoing Ethereum crime spree: Be careful with who's generating your cryptocurrency keys. Security Security / Cyberattacks and Hacks

The FBI's RAT: Blocking Fraudulent Wire Transfers

Data Breach Today

Bureau's Recovery Asset Team Targets Choke Points to Recover Lost Funds Fraud, e-hustles and social engineering attacks continues to proliferate, the FBI's latest report into the state of internet crime confirms. But over the past year, a new FBI tactic for quickly stopping fraudulent wire transfers has notched notable successes

134
134

FireEye experts found source code for CARBANAK malware on VirusTotal?

Security Affairs

Cybersecurity researchers from FireEye revealed that the Carbanak source code has been available on VirusTotal for two years, and none noticed it before. Researchers at FireEye discovered that the Carbanak source code has been available on VirusTotal for two years, but it was not noticed before.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

How to prepare your workforce for the arrival of AI

DXC Technology

One of the guiding principles of technology innovation is that any new product should be there to adapt and support the human user not vice versa. The notion of robots taking away jobs is frightening, especially given the dire predictions that have been made about how automation will replace millions of workers, particularly those in […]. Digital Transformation Leadership and Success Robotics Workplace artificial intelligence CIOs

Iran-linked APT34: Analyzing the webmask project

Security Affairs

Security expert Marco Ramilli published the findings of a quick analysis of the webmask project standing behind the DNS attacks implemented by APT34 (aka OilRig and HelixKitten ). Thanks to the leaked source code it is now possible to check APT34 implementations and techniques.

The Micro Focus Experience Approach

Micro Focus

Horses for courses The best Experience Management treats all customers differently. We, at Micro Focus, don’t just broad brush all of our customers but instead tailor our views and understanding for different customer groups and segments. This allows us to both understand specific change as it occurs and action on it effectively. Experience Premium The. View Article. Company Culture Corporate Customer Experience Experience Premium

Targeted Attacks hit multiple embassies with Trojanized TeamViewer

Security Affairs

CheckPoint firm uncovered a cyber espionage campaign leveraging a weaponized version of TeamViewer to target officials in several embassies in Europe. Security experts at CheckPoint uncovered a cyber espionage campaign leveraging a weaponized version of TeamViewer and malware disguised as a top-secret US government document to target officials in several embassies in Europe.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Supply Chain Hackers Snuck Malware Into Videogames

WIRED Threat Level

An aggressive group of supply chain hackers strikes again, this time further upstream. Security Security / Cyberattacks and Hacks

Kaspersky speculates the involvement of ShadowPad attackers in Operation ShadowHammer

Security Affairs

Experts at Kaspersky Lab linked the recent supply-chain attack targeted ASUS users to the “ShadowPad” threat actor and the CCleaner incident.

Most firms see AI and automation as 'game changers' but slow to adopt

Information Management Resources

While the majority believe AI-driven technologies can provide significant competitive advantages, only 29 percent said their organizations actually have such strategies. Artificial intelligence Automation Data strategy

Bodybuilding.com forces password reset after a security breach

Security Affairs

Bad news for fitness and bodybuilding passionates, the popular online retailer Bodybuilding.com announced that hackers have broken into its systems. The popular online retailer website Bodybuilding.com announced last week that hackers have broken into its systems.

Morrisons heads to the Supreme Court over data breach

IT Governance

The Supreme Court has given Morrisons permission to appeal a ruling that found the supermarket liable for a data breach caused by a malicious insider. Morrisons has lost two cases related to its March 2014 data breach , in which Andrew Skelton, a senior internal auditor at the supermarket’s Bradford office, leaked the payroll data of 99,998 employees. The information comprised names, addresses, gender, dates of birth, phone numbers, National Insurance numbers, bank details and salaries.

FireEye experts found source code for CARBANAK malware on VirusTotal?

Security Affairs

Cybersecurity researchers from FireEye revealed that the Carbanak source code has been available on VirusTotal for two years, and none noticed it before. Researchers at FireEye discovered that the Carbanak source code has been available on VirusTotal for two years, but it was not noticed before.

1 in 4 Workers Are Aware Of Security Guidelines - but Ignore Them

Dark Reading

1 in 4 Workers Are Aware Of Company IT Security Guidelines but Don't Follow Them

IT 86

15 top providers of data quality tools

Information Management Resources

Informatica, Syncsort, Talend, Information Builders and BackOffice Associates are among the leading vendors for data quality software, according to a new Gartner Magic Quadrant report. Data quality Data visualization Data management

Tools 76

Stuxnet Family Tree Grows

Dark Reading

What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack

84

EmCare reveals patient and employee data were hacked

Security Affairs

EmCare disclosed that a number of employees’ email accounts had been hacked, potentially exposing personal information of patients and employees. EmCare disclosed that a number of employees’ email accounts had been hacked, potentially exposing personal information of patients and employees.

Microsoft Windows, Antivirus Software at Odds After Latest Update

Dark Reading

This month's Windows update has caused incompatibilities with software from at least five antivirus companies, resulting in slow boot times and frozen systems

78

#ModernDataMasters: Scott Taylor, “The Data Whisperer”

Reltio

Kate Tickner, Reltio.

MDM 52

New Twist in the Stuxnet Story

Dark Reading

What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack

75

Two Weeks, Two Sedona Conference Guides Published: eDiscovery Best Practices

eDiscovery Daily

Last year, The Sedona Conference® (TSC) published a bunch of…er…publications.

Google File Cabinet Plays Host to Malware Payloads

Dark Reading

Researchers detect a new drive-by download attack in which Google Sites' file cabinet template is a delivery vehicle for malware

73

No More Contract Surprises

Daymark

Pretty much everyone likes a good surprise. Whether it’s a birthday party or an unexpected visit from an old friend, surprises can be quite pleasant. When it comes to IT, surprises are not welcome. Suddenly finding out a maintenance contract is expiring next week is not considered good news. Reporting

IT 49

Healthcare plays catch-up on adopting disruptive technologies

Information Management Resources

Big data and data management solutions will provide the necessary tools to drive better decisions, and can also improve the efficiency, output and accuracy of nearly all medical operations. Healthcare innovations Artificial intelligence Data visualization Internet of things

Carbanak Source Code Unveils a Startlingly Complex Malware

Threatpost

The malware is behind billions in banking and credit-card losses. Malware analysis backdoor Banking Carbanak fin 7 financial crime gang FireEye obfuscation sophistication source code