Mon.Feb 10, 2020

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly 150 million Americans.

Facebook's Privacy Practices Targeted by Canadian Regulator

Data Breach Today

To Force Changes, Regulator Must Prove Facebook Violated Canada's Privacy Law Canada's privacy commissioner is taking Facebook to court to try and force the social network to make specific changes to its privacy practices.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Sharenting, BYOD and Kids Online: 10 Digital Tips for Modern Day Parents

Troy Hunt

Today is Safer Internet Day which marks the annual occurrence of parents thinking about their kids' online presence (before we go back to thinking very little about it tomorrow!)

Law Firms Race to File Phishing Breach Lawsuits

Data Breach Today

Class Action Suits Would Focus on PIH Health Breach That Affected 200,000 Several law firms are racing to be among the first to file class action lawsuits against PIH Health in the wake of the California-based regional healthcare network reporting last month that a 2019 phishing breach affected nearly 200,000 individuals. Why the rush?

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Malaysia’s MyCERT warns cyber espionage campaign carried out by APT40

Security Affairs

Malaysia’s MyCERT issued a security alert to warn of a hacking campaign targeting government officials that was carried out by the China-linked APT40 group.

More Trending

Chinese Military personnel charged with hacking into credit reporting agency Equifax

Security Affairs

The United States Department of Justice charged 4 Chinese military hackers with hacking into credit reporting agency Equifax.

4 in Chinese Army Charged With Breaching Equifax

Data Breach Today

Justice Department Unveils Indictments Against Members of China's PLA Four members of China's People's Liberation Army have been indicted for allegedly hacking Equifax in 2017 and stealing the personal data of over 145 million Americans as well as a vast trove of the company's trade secrets and intellectual property, the U.S. Justice Department announced Monday.

How 4 Chinese Hackers Allegedly Took Down Equifax

WIRED Threat Level

The Department of Justice has pinned the hack on China. Here's how it was done, according to the indictment. Security Security / Cyberattacks and Hacks

IT 87

10 Hot Cybersecurity Topics at RSA Conference 2020

Data Breach Today

From the Human Element and Frameworks to Secure Engineering, Privacy and More Which cybersecurity topics are hot? One topical answer to that question comes via the upcoming RSA Conference 2020. Organizers say they received 2,400 responses to their call for speakers, and they've have highlighted 10 predominant themes, including secure design, frameworks, privacy and the human element

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Apple's Tracking-Prevention Feature in Safari has a Privacy Bug

Schneier on Security

Last month, engineers at Google published a very curious privacy bug in Apple's Safari web browser. Apple's Intelligent Tracking Prevention, a feature designed to reduce user tracking, has vulnerabilities that themselves allow user tracking. Some details : ITP detects and blocks tracking on the web.

5 Signs a Cyberattack Is Under Way and 5 Things You Need to Do Before It Happens

Adam Levin

As if cybersecurity weren’t already a red-letter issue, the United States and, most likely, its allies–in other words, the global economic community–are in Iran’s cyber sites, a major player in cyber warfare and politically divisive disinformation campaigns.

China's Military Behind 2017 Equifax Breach: DoJ

Dark Reading

Four members of China's People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens

1.2 million CPR numbers for Danish citizen leaked through tax service

Security Affairs

A glitch in the TastSelv Borger ta x service has sent over one million Danish CPR numbers to the US companies Google and Adobe.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Day in the Life of a Bot

Dark Reading

A typical workday for a bot, from its own point of view

IT 73

A sad story of pedophilia on how disgusting images fed the web

Security Affairs

The journalist Livio Varriale sheds the light on a story about pedophilia that starts from afar and still today finds its roots in the darker side of the internet.

How North Korea's Senior Leaders Harness the Internet

Dark Reading

Researchers learn how North Korea is expanding its Internet use in order to generate revenue and bypass international sanctions

IT 63

Netanyahu’s party Elector app exposes data on over 6.5M Israelis

Security Affairs

A misconfiguration in the Elector election day app developed by Likud, the Netanyahu’s party might have exposed data on over 6.5 million Israelis. A misconfiguration in an election day app developed by the N etanyahu’s party L ikud, might have exposed p ersonal details of over 6.5

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

7 best practices in customer experience

OpenText Information Management

In today’s world, customer experience determines success. Regardless of your organization’s size, products, service or industry, providing your customers with a consistently great experience only means good things for your bottom line.

Too Weak, Too Slow: MicroStrategy World 2020’s Big Theme

Perficient Data & Analytics

“Too weak. Too slow.” That’s what Norwegian chess grandmaster Magnus Carlsen , who thinks 15-20 moves ahead, says matter-of-factly to his opponents.

Breaking: ARMA International Announces New CEO

IG Guru

Check out the press release here. The post Breaking: ARMA International Announces New CEO appeared first on IG GURU. ARMA Business IG News Information Governance Mona Buckley

Data Architecture: 2.5 Types of Modern Data Integration Tools

Perficient Data & Analytics

As we move into the modern cloud data architecture era, enterprises are deploying 2 primary classes of data integration tools to handle the traditional ETL and ELT use cases. The first type of Data integration tools are GUI-Based Data Integration solutions.

MDM 61

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Scholar Calling on Writers for New Book: Impacts of the Cloud on Records Management and Archives

IG Guru

Impacts of the Cloud on Records Management and ArchivesA book edited by Salvador P. Barragan (San Jose State University) Introduction “The Library of Babel” is a short story conceiving of a universe in the form of a nearly infinite library containing all possible books.

6 Factors That Raise The Stakes For IoT Security

Dark Reading

Developments that exacerbate the risk and complicate making Internet of Things devices more secure

Risk 56

Docker Registries Expose Hundreds of Orgs to Malware, Data Theft

Threatpost

Misconfigured Docker registries could leak confidential data, lead to a full-scale compromise and interrupt the business operations.”. Breach Cloud Security confidential data Docker Images malware misconfiguration Palo Alto registries

Cloud 78

Unlocked S3 Bucket Lets 36,077 Jail Files Escape

Dark Reading

The leaky repository belongs to JailCore, a cloud management and compliance platform used in several states' correctional facilities

Cloud 54

ibml unveils world’s fastest, ultra-high-volume, intelligent scanner: the ibml FUSiON, the most comprehensive intelligent information capture solution

Document Imaging Report

New product offers transformative solutions for outdated information management processes. London, February 10, 2020 – Imaging Business Machines, LLC (ibml) , the leading global provider of intelligent information capture solutions, unveiled its next generation of ultra-high-volume scanners.