Fri.Nov 29, 2019

Security Firm Prosegur Hit By Ryuk Ransomware

Data Breach Today

Incident May Have Disrupted Networked Security Cameras Global security company Prosegur has blamed Ryuk ransomware for a service disruption that started Wednesday, which may have hampered networked alarms. Prosegur isn't revealing much detail but says it is in the process of restoring services

Great Plains center hit by ransomware attack

Security Affairs

A few days ago the Great Plains center was hit by a ransomware attack that forced its staff to to pen and paper. A few days ago the Great Plains Health medical center was hit by a ransomware attack that forced its staff to switch to pen and paper.A

Google: Government-Backed Hackers Targeted 12,000 Users

Data Breach Today

Technology Giant Issues Warnings to Targeted Individuals Across 149 Countries Google has directly warned more than 12,000 users across 149 countries that they have been targeted by government-backed hackers.

Manipulating Machine Learning Systems by Manipulating Training Data

Schneier on Security

Interesting research: " TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents ": Abstract: : Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Health Data Breaches: 3 Lessons Learned

Data Breach Today

Insights From Major Healthcare Sector Breaches and Cyberattacks The healthcare sector has had plenty of significant data breaches so far this year. What can be learned from organizations' experiences? Here are three key lessons

More Trending

The Threat of Ransomware and Doxing

Data Breach Today

The latest edition of the ISMG Security Report discusses new combination ransomware and doxing attacks. Plus, Twitter drops phone numbers in 2FA, and why we need to consider quantum cryptography today

Group-IB presents its annual report on global threats to stability in cyberspace

Security Affairs

Group-IB, has analyzed key recent changes to the global cyberthreat landscape in the “Hi-Tech Crime Trends 2019/2020” report. Group-IB , a Singapore-based cybersecurity company that specializes in preventing cyberattacks, has analyzed key recent changes to the global cyberthreat landscape.

List of data breaches and cyber attacks in November 2019 – 1.34 billion records breached

IT Governance

It was a big month for data breaches this month, with a confirmed 1,341,147,383 records being exposed in 87 incidents. However, almost all of those came from one leaked database , the origin of which is unclear.

3 Everyday Things in Your Office That Could Lead to a Data Breach

Adam Levin

When you think about cyberthreats , what comes to mind? An extortionist announcing your doom with a dark monitor and a laughing skull? State-sponsored cyber-warriors working from a secure command post? President Trump’s certain, “somebody sitting on their bed that weighs 400 pounds ?”

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

What Is a Dead Drop?

WIRED Threat Level

A mainstay of spycraft still has plenty of relevance in the digital age. Security Security / Security News

Professor Daniel J. Solove provides a valuable Newletter on Privacy + Security

IG Guru

Professor Solove’s newsletter provides updates about his scholarship, blog posts, conferences, and privacy and data security training materials. The newsletter is emailed once per week. The post Professor Daniel J. Solove provides a valuable Newletter on Privacy + Security appeared first on IG GURU.

FOIA 52

Amazon Plans Ring Facial Recognition-Based ‘Watch List’, Report

Threatpost

Amazon's facial recognition would alert Ring users if "suspicious" individuals are near their house. IoT Privacy ai amazon amazon ring artificial intelligence Data Privacy facial recognition Ring watch list

General Election 2019 ? Manifesto Special

CILIP

General Election 2019 ? Manifesto Special. Access to quality library services is one of the most transformative investments our society could make. Which is why we?ve ve been working with Bobby Seagull to launch our ?Manifesto Manifesto for Libraries? calling on the Government to ?recognise

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

5 Types of Cards Entrepreneurs Need to Have in Their Pocket

Cllax

If you thought that a paper business card is the only card entrepreneurs need to have in their pockets, you are sorely mistaken. Since we live in times when everything. Sponsored

Paper 26

How to write effective travel and study grant proposals

CILIP

How to write effective travel and study grant proposals. How to write effective grant proposals, and why you should. s Working Internationally project is looking at how information professionals from across the globe can learn from each other and share ideas.

The Basics of HR Automation for Small Businesses

Docuware

In a small business, the Human Resources (HR) function can be held by a small team or by one person who also has other responsibilities. For example, an HR manager in a small business may also handle training, processing expenses, payroll and other administrative tasks.

IT 26

Joyeux Anniversaire! Mario Braggiotti, host of WQXR’s “To France—With Music”

Archives Blogs

It’s the birthday of Mario Braggiotti, the late pianist, composer and host of WQXR’s To France—With Music. The New York Public Radio Archive is celebrating the occasion with a recently acquired broadcast recording of Mr. Braggiotti on WQXR’s The Listening Room. In this appearance, we experience Braggiotti as a beguiling pianist-raconteur, taking WQXR listeners on a musical trip through his fascinating life in 1920s Paris and beyond.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Friday Squid Blogging: Squid-Like Underwater Drone

Schneier on Security

The Sea Hunting Autonomous Reconnaissance Drone (SHARD) swims like a squid and can explode on command. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. drones squid