Thu.Nov 07, 2019

Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks

Krebs on Security

Hospitals that have been hit by a data breach or ransomware attack can expect to see an increase in the death rate among heart patients in the following months or years because of cybersecurity remediation efforts, a new study posits.

Trend Micro Employee Sold Consumer Data to Scammers

Data Breach Today

Employee Has Been Fired; 68,000 Customers Affected A Trend Micro employee stole and then sold contact information for 68,000 of the company's consumer subscribers, which led to a raft of unsolicited tech support scam calls, the company says. The employee has been fired.

Risk 186

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Specially Crafted ZIP archives allow bypassing secure email gateways

Security Affairs

Experts observed a new phishing campaign that used a specially crafted ZIP archive that was designed to bypass secure email gateways to distribute malware.

Feds Allege Twitter Infiltrated by Saudi Spies

Data Breach Today

US Charges Two Ex-Employees and Saudi National With Spying on Twitter Users The U.S. Department of Justice has charged three men with perpetrating a campaign to infiltrate Twitter and spy on critics of the Saudi government.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Find New Talent, Don't Fight Over CISSPs: Insights from (ISC)2 COO

Dark Reading

The skills gap will only be closed by attracting and retaining new talent. So don't limit your talent search to CISSPs, says the COO of the organization that issues the CISSP certification

88

More Trending

Bug Hunters Earn $195,000 for Hacking TVs, Routers, Phones at Pwn2Own Tokyo 2019

Security Affairs

Bug hunters have earned a total of $195,000 for finding flaws in TVs, routers and smartphones on the first day of the Pwn2Own Tokyo 2019 contest. Pwn2Own is the annual hacking contest event organized by Trend Micro’s Zero Day Initiative (ZDI).

IT 81

Facebook: Developers Wrongfully Accessed User Data - Again

Data Breach Today

Company Acknowledges 100 Third-Party Developers Had Unauthorized Access Facebook has revealed that, once again, it allowed third-party app developers to wrongfully gain access to its customers' private data. The company changed access for about 100 developers after the problem was discovered

Access 158

Eavesdropping on SMS Messages inside Telco Networks

Schneier on Security

Fireeye reports on a Chinese-sponsored espionage effort to eavesdrop on text messages: FireEye Mandiant recently discovered a new malware family used by APT41 (a Chinese APT group) that is designed to monitor and save SMS traffic from specific phone numbers, IMSI numbers and keywords for subsequent theft.

Why Is Third-Party Risk Management So Complex?

Data Breach Today

Organizations should develop a comprehensive strategy for managing third-party security risks and avoid over-reliance on any one tool, such as vendor security risk assessment, monitoring or ratings services, says analyst Jie Zhang of Gartner

Risk 109

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Twitter & Trend Micro Fall Victim to Malicious Insiders

Dark Reading

The companies are the latest on a long and growing list of organizations that have fallen victim to users with legitimate access to enterprise systems and data

HSTS From Top to Bottom or GTFO

Troy Hunt

We're pretty much at a "secure by default" internet these days, at least that's the assumption with most websites, particularly so in the financial sector.

How to Opt Out of the Sites That Sell Your Personal Data

WIRED Threat Level

It's much harder than it should be to get your name off of data broker and people-search sites, but it's possible. . Security Security / Privacy

Amazon’s Ring Video Doorbell could open the door of your home to hackers

Security Affairs

Bitdefender discovered a high-severity security flaw in Amazon’s Ring Video Doorbell Pro devices that could allow nearby attackers to steal WiFi password.

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

To Prove Cybersecurity's Worth, Create a Cyber Balance Sheet

Dark Reading

How tying and measuring security investments to business impacts can elevate executives' understanding and commitment to cyber-risk reduction

Risk 73

Two former Twitter employees charged of spying on Users for Saudi Arabian Government

Security Affairs

Two former Twitter employees have been charged with spying on thousands of Twitter user accounts on behalf of the Saudi Arabian government. Two former Twitter employees have been charged with spying on thousands of Twitter user accounts on behalf of the Saudi Arabian government.

PayPal Upsets Microsoft as Phishers' Favorite Brand

Dark Reading

Several factors edged the world's most popular payment service into the top spot

72

Trend Micro rogue employee sold customer data to tech support scammers

Security Affairs

A Trend Micro employee was spotted stealing consumer customer information and selling it to tech support scammers. TrendMicro confirmed that it has discovered one employee that was stealing consumer customer information and selling it to tech support scammers.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

TA542 Brings Back Emotet with Late September Spike

Dark Reading

Overall volumes of banking Trojans and RATs increased during the third quarter, when Emotet was suspiciously absent until mid-September

68

Why Many People Got Mysterious Valentine’s Day Texts Today

WIRED Threat Level

The issue was reportedly caused by a maintenance update made to “messaging platforms of multiple carriers in the US.". Security

Black Hat Q&A: Hacking a '90s Sports Car

Dark Reading

Security researcher Stanislas Lejay offers a preview of his upcoming Black Hat Europe talk on automotive engine computer management and hardware reverse engineering

Summary – “Industry in One: Financial Services”

ARMA International

This article summarizes a report published by AIEF on June 26, 2019. Additionally, the article is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in mid-November.

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Calculating ROI for RFID Asset Management

RFID Global Solution, Inc.

So you have a lot of valuable assets that you’re having trouble keeping track of. Maybe it’s the IT items in your data center that are constantly on the move. Perhaps it’s expensive lab equipment or tools that always seems to go missing.

IT 63

Majority of firms fail at fostering a data-driven culture

Information Management Resources

A large majority of organizations think data and analytics are important to their digital transformation and business growth, but most are not enabling a data-driven culture, says a new study. Analytics Data strategy Data management

Data Breach Fines: Are They Working to Boost Consumer Safety?

Threatpost

Despite trillions of dollars in breach fine payouts, each year the number of compromised companies and individuals with private data exposed rise.

Enfuse shines spotlight on AI, analytics and machine learning

OpenText Information Management

Can you imagine living today without a mobile phone or not using the internet? Well, we are rapidly approaching a time where you will feel the same thing about working without the benefits of artificial intelligence (AI).

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Predictive Model Ensembles: Pros and Cons

Perficient Data & Analytics

Many recent machine learning challenges winners are predictive model ensembles. We have seen this in the news. Data science challenges are hosted on many platforms. Techniques included decision trees, regression, and neural networks. And, winning ensembles used these in concert.

OpenText Content Services named a leader in latest Gartner report

OpenText Information Management

OpenText is pleased to announce we have been named a Leader in Gartner’s 2019 Magic Quadrant for Content Services Platforms. The cornerstone of the OpenText strategy is ensuring our customer’s information enables and informs their digital business.

Why GDPR compliance requires a software solution

IT Governance

All organisations need help complying with the GDPR (General Data Protection Regulation). You might not be able to bring in expert consultants, but there are software packages to help with the majority of your compliance requirements, from risk assessments to data breach reporting. IT Governance’s CyberComply platform contains all the software solutions you need in one bundle. Let’s take a look at what it covers and how it simplifies your GDPR requirements. What is CyberComply?