Tue.Sep 17, 2019

IoT and Quantum Computing’s Impact on the Federal Government

Thales eSecurity

As government agencies get back to work after summer barbeques, family vacations and once-in-a-lifetime getaways, the focus is on the priorities for the rest of 2019. Cybersecurity remains one of the top concerns and priorities for our government.

IoT 106

Researchers: Emotet Botnet Is Active Again

Data Breach Today

New Surge in Activity Spotted After Four-Month Absence Emotet, one of the most powerful malware-spreading botnets, is active again after a four-month absence, according to several security researchers who noticed a surge in activity primarily against U.S., and German targets starting on Monday

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Man Who Hired Deadly Swatting Gets 15 Months

Krebs on Security

An Ohio teen who recruited a convicted serial “swatter “to fake a distress call that ended in the police shooting an innocent Kansas man in 2017 has been sentenced to 15 months in prison. Image: FBI.gov.

Investigation Launched After Ecuadorian Records Exposed

Data Breach Today

Researchers: Unsecured Elasticsearch Database Included Bank Details, Personal Information An unsecured database owned by an Ecuadorian consulting company left over 20 million records on the South American country's citizens exposed to the internet, according to a report from two independent security researchers.

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

The Air Force Will Let Hackers Try to Hijack an Orbiting Satellite

WIRED Threat Level

At the Defcon hacking conference next year, the Air Force will bring a satellite for fun and glory. Security Security / Security News

More Trending

Backup files for Lion Air and parent airlines exposed and exchanged on forums

Security Affairs

Tens of millions of records belonging to passengers of two airline companies owned by Lion Air have been exposed and exchanged on forums. Data belonging to passengers of two airline companies owned by Lion Air have been exposed and exchanged on forums.

IT 114

NIST Issues Draft Guidance for Securing PACS

Data Breach Today

Tips on Keeping Picture Archiving and Communications Systems Secure New draft guidance from the National Institute of Standards and Technology aims to help healthcare organizations improve the security of picture archiving and communications systems, or PACS

Experts warn of the exposure of thousands of Google Calendars online

Security Affairs

The news is shocking, thousands of Google Calendars are leaking private information posing a severe threat to the privacy of the users. Thousands of Google Calendars are leaking private information online threatening the privacy of the users.

Using Artificial Intelligence to Combat Card Fraud

Data Breach Today

Artificial intelligence is playing an important role in the fight against payment card fraud, says Gord Jamieson, senior director of Canada risk services at Visa. He'll offer a keynote presentation on the latest fraud trends at Information Security Media Group's Cybersecurity Summit in Toronto Sept 24-25

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Experts found 125 new flaws in SOHO routers and NAS devices from multiple vendors

Security Affairs

Researchers discovered many flaws in over a dozen small office/home office (SOHO) routers and network-attached storage (NAS) devices. Security experts have discovered multiple vulnerabilities in over a dozen small office/home office (SOHO) routers and network-attached storage (NAS) devices.

Mainframe Security Challenges: An Encroaching Perimeter

Data Breach Today

Even with the uptake of cloud services, many large enterprises still hold data on mainframes, says Philip MacLochlainn of IBM. But the diversity of computing environments around mainframes is rapidly changing, which increases the risk of data breaches, he explains

A Brutal Murder, a Wearable Witness, and an Unlikely Suspect

WIRED Threat Level

Karen Navarra was a quiet woman in her sixties who lived alone. She was found beaten to death. The neighbors didn't see anything. But her Fitbit did. Security Security / Privacy Backchannel

Skidmap Linux miner leverages kernel-mode rootkits to evade detection

Security Affairs

Trend Micro researchers spotted a piece of Linux cryptocurrency miner, dubbed Skidmap that leverages kernel-mode rootkits to evade the detection. Skidmap is a new piece of crypto-miner detected by Trend Micro that target Linux machines, it uses kernel-mode rootkits to evade the detection.

Access 101

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

A Password-Exposing Bug Was Purged From LastPass

WIRED Threat Level

Google Project Zero found and reported a flaw in the widely used password manager. Security Security / Cyberattacks and Hacks

Cybercriminal's Black Market Pricing Guide

Dark Reading

Common prices criminals pay one other for products and services that fuel the cybercriminal ecosystem

United States government files civil lawsuit against Edward Snowden

Security Affairs

The United States government sued Edward Snowden , the former CIA employee and NSA contractor, to block payment for his book, Permanent Record.

Impersonation Fraud Still Effective in Obtaining Code Signatures

Dark Reading

Fraudsters continue to attempt to fool certificate authorities into issuing valid digital certificates for legitimate organizations by impersonating an authoritative user. The reward? The ability to sign code with a legitimate signature

88

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

ISO 27701 unlocks the path to GDPR compliance and better data privacy

IT Governance

We have good news for those looking for help complying with the GDPR (General Data Protection Regulation) : new guidance has been released on how to create effective data privacy controls.

GDPR 85

Poll Results: Maybe Not Burned Out, But Definitely 'Well-Done'

Dark Reading

Staff shortages and an increasingly challenging job is turning up the heat on security pros, Dark Reading readers say

Banks, Arbitrary Password Restrictions and Why They Don't Matter

Troy Hunt

Allow me to be controversial for a moment: arbitrary password restrictions on banks such as short max lengths and disallowed characters don't matter. Also, allow me to argue with myself for a moment: banks shouldn't have these restrictions in place anyway.

MITRE Releases 2019 List of Top 25 Software Weaknesses

Dark Reading

The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities

79

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Australia is confident that China was behind attack on parliament, political parties

Security Affairs

Australia ‘s intelligence is sure that China is behind the cyberattacks that hit its parliament and political parties, but decided to not publicly accuse it.

Any Advice for Assessing Third-Party Risk?

Dark Reading

Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier

Risk 74

The hybrid career space between business and technology

OpenText Information Management

Christine Cole is a leader, a food lover and a connector of people. She’s also the Director and Product Suite Owner, Digital Workplace at Allstate Insurance Company of Canada.

Five Common Cloud Configuration Mistakes

Dark Reading

It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain

Cloud 73

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

U.S. government innovates cyber security job fulfillment

Information Management Resources

A number of agencies recently commented on the progress the U.S. government has made in using creative and innovative approaches to hiring individuals for cyber security roles. Cyber security Data security Cyber attacks

15K Private Webcams Could Let Attackers View Homes, Businesses

Dark Reading

Webcams could be potentially accessed and manipulated by anyone with an Internet connection, researchers say

FAQ: What is a record regarding government or agency websites?

The Texas Record

By law, any information that an elected official, a government employee, or a state employee handles that correlates with the definitions explained in State Agency Bulletin 4 and in Local Government Bulletin D is a record.