Fri.Jan 24, 2020

AI becoming 'need to have' technology in some industries

Information Management Resources

The top sectors where AI is likely to bring major transformation are those in which there is a clear business case for incorporating the technology, says a new report. Artificial intelligence Data strategy Machine learning

5 Resume Basics for a Budding Cybersecurity Career

Dark Reading

You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Does Your Domain Have a Registry Lock?

Krebs on Security

If you’re running a business online, few things can be as disruptive or destructive to your brand as someone stealing your company’s domain name and doing whatever they wish with it.

Hackers Target European Energy Firm: Researchers

Data Breach Today

Report Says Group Tied to Iran Could Be Involved Hackers who may have ties to Iran have recently turned their attention to the European energy sector, using open source tools to target one firm's network as part of an cyberespionage operation, according to the security firm Recorded Future

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Technical Report of the Bezos Phone Hack

Schneier on Security

Motherboard obtained and published the technical report on the hack of Jeff Bezos's phone, which is being attributed to Saudi Arabia, specifically to Crown Prince Mohammed bin Salman.investigators set up a secure lab to examine the phone and its artifacts and spent two days poring over the device but were unable to find any malware on it. Instead, they only found a suspicious video file sent to Bezos on May 1, 2018 that "appears to be an Arabic language promotional film about telecommunications." That file shows an image of the Saudi Arabian flag and Swedish flags and arrived with an encrypted downloader. Because the downloader was encrypted this delayed or further prevented "study of the code delivered along with the video.". Investigators determined the video or downloader were suspicious only because Bezos' phone subsequently began transmitting large amounts of data. "[W]ithin hours of the encrypted downloader being received, a massive and unauthorized exfiltration of data from Bezos' phone began, continuing and escalating for months thereafter," the report states. "The amount of data being transmitted out of Bezos' phone changed dramatically after receiving the WhatsApp video file and never returned to baseline. Following execution of the encrypted downloader sent from MBS' account, egress on the device immediately jumped by approximately 29,000 percent," it notes. "Forensic artifacts show that in the six (6) months prior to receiving the WhatsApp video, Bezos' phone had an average of 430KB of egress per day, fairly typical of an iPhone. Within hours of the WhatsApp video, egress jumped to 126MB. The phone maintained an unusually high average of 101MB of egress data per day for months thereafter, including many massive and highly atypical spikes of egress data.". The Motherboard article also quotes forensic experts on the report: A mobile forensic expert told Motherboard that the investigation as depicted in the report is significantly incomplete and would only have provided the investigators with about 50 percent of what they needed, especially if this is a nation-state attack. She says the iTunes backup and other extractions they did would get them only messages, photo files, contacts and other files that the user is interested in saving from their applications, but not the core files. "They would need to use a tool like Graykey or Cellebrite Premium or do a jailbreak to get a look at the full file system. That's where that state-sponsored malware is going to be found. Good state-sponsored malware should never show up in a backup," said Sarah Edwards, an author and teacher of mobile forensics for the SANS Institute. "The full file system is getting into the device and getting every single file on there­ -- the whole operating system, the application data, the databases that will not be backed up. So really the in-depth analysis should be done on that full file system, for this level of investigation anyway. I would have insisted on that right from the start.". The investigators do note on the last page of their report that they need to jailbreak Bezos's phone to examine the root file system. Edwards said this would indeed get them everything they would need to search for persistent spyware like the kind created and sold by the NSO Group. But the report doesn't indicate if that did get done. amazon hacking malware saudiarabia smartphones spyware

More Trending

New Social Engineering Event to Train Business Pros on Human Hacking

Dark Reading

The DEF CON Social Engineering Capture the Flag contest inspired a new event aimed at teaching both security and non-security professionals on the fine art of hacking human behavior

UK Considers Limited Role for Huawei in 5G Rollout: Report

Data Breach Today

Treasury Secretary Steven Mnuchin Continues to Urge Britain to Reject Huawei U.K. officials reportedly are considering a proposal to allow China's Huawei to play a limited role in providing certain equipment for the country's 5G rollout, which would defy calls from the U.S.


Weekly Update 175

Troy Hunt

Alright, let me get this off my chest first - I've totally lost it with these bloody Instamics. I've had heaps of dramas in the past with recordings being lost and the first time I do a 3-person weekly update only 2 of them recorded (mine being the exception).

Stolen Payment Card Trafficking Mastermind Pleads Guilty

Data Breach Today

Aleksey Burkov's 'Cardplanet' Site Sold Card Data, Prosecutors Say Aleksey Burkov, who was extradited from Israel to the U.S. in November, plead guilty this week to several federal charges related to his site "Cardplanet," which trafficked in stolen payment card data


Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Russian operator of Cardplanet carding site pleads guilty in the US

Security Affairs

A Russian national pleaded guilty this week to running a carding website called Cardplanet that helped people commit credit-card fraud.

Sales 79

Analysis: New Details on the Hacking of Jeff Bezos' iPhone

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of fresh details on the hacking of Amazon CEO Jeff Bezos' iPhone. Also featured: an update on Microsoft's exposure of customer service records; a hacker's take on key areas of cyber hygiene

Online Employment Scams on the Rise, Says FBI

Dark Reading

Looking to change jobs? Watch out for fraudsters who use legitimate job services, slick websites, and an interview process to convince applicants to part with sensitive personal details


The Bezos Phone Hack: Narrative Framed by Loose Facts

Data Breach Today

Forensic Examination Declares Malware, But No Malware Was Found It's a seductive story line: A chat app belonging to Saudi Arabia's Crown Prince is used to deliver malware to an American billionaire's phone. But a forensic investigation of Amazon CEO Jeff Bezos' phone raises more questions than it answers

IT 109

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Expert released DOS Exploit PoC for Critical Windows RDP Gateway flaws

Security Affairs

Danish security researcher Ollypwn has released DOS exploit PoC for critical vulnerabilities in the Windows RDP Gateway.

Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings


The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting. Vulnerabilities Web Security Cisco cisco flaw Cisco patch Cisco video conferencing vulnerability conference meeting high severity flaw patch video conferencing Webex WebEx flaw

NK CARROTBALL dropper used in attacks on U.S. Govn Agency

Security Affairs

A US Government agency was hit with a phishing attack attempting to deliver a new malware dropper dubbed CARROTBALL. Security experts at Palo Alto Networks have uncovered a new malware dropper called CARROTBALL that was used in targeted attacks against a U.S.

Fake Smart Factory Honeypot Highlights New Attack Threats


The honeypot demonstrates the various security concerns plaguing vulnerable industrial control systems. Critical Infrastructure IoT Malware Web Security Cryptomining Malware CrySis ransomware cyber attack hack honeypot ICS industrial control system malware Phobos ransomware

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

'CardPlanet' Operator Pleads Guilty in Federal Court

Dark Reading

Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services


Cisco fixes critical issue in Cisco Firepower Management Center

Security Affairs

Cisco addressed a critical issue in the Cisco Firepower Management Center (FMC) that could allow a remote attacker to bypass authentication and execute arbitrary actions.

ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates


Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket. Malware Most Recent ThreatLists Email Phishing malware msp pay the ransom ransom ransomware ransomware as a service Remote Desktop Protocol ryuk Sodinokibi

7 Steps to IoT Security in 2020

Dark Reading

There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020

IoT 64

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

New Bill Proposes NSA Surveillance Reforms


The newly-introduced bill targets the Patriot Act's Section 215, previously used by the U.S. government to collect telephone data from millions of Americans.

What can OpenText’s partnership with Microsoft do for you

OpenText Information Management

Did you know that our collaborative partnership with Microsoft enables OpenText™ to develop business and industry solutions that leverage your existing investments in Microsoft technologies, while providing seamless access to information in your other enterprise applications? Now that’s a win/win.

5 Information Management Trends for 2020 via CMS Wire

IG Guru

Joe Shepley lays out five trends the information management industry will face in 2020. The post 5 Information Management Trends for 2020 via CMS Wire appeared first on IG GURU.

CMS 56

What’s in store for the legal industry in 2020

OpenText Information Management

In my view, 2020 will be the year information management and governance are no longer abstract concepts, but critical elements of legal industry strategies and programs.

Types of Data Models: Conceptual, Logical & Physical


There are three different types of data models: conceptual, logical and physical, and each has a specific purpose. Conceptual Data Models: High-level, static business structures and concepts. Logical Data Models: Entity types, data attributes and relationships between entities.

Sales 56

Mitsubishi Electric Discloses Major Data Breach

Adam Levin

Mitsubishi Electric Corporation announced that it experienced a major data breach in June 2019 that has been traced back to a Chinese hacking group. “[O]ur O]ur network has been subject to unauthorised access by third parties.

ISO 27701 adoption can demonstrate data privacy compliance and reduce cyber risk

Information Management Resources

The standard is designed to help organizations manage their information security processes in line with international best practices. Data privacy rules Data security GDPR

Optical Character Recognition (OCR) Defined: What It Is and How It Works

Record Nations

Going paperless in today’s world has many benefits for businesses, but making the transition from paper to digital is not always easy. The most complicated part of this process is transferring physical paperwork into files that can be easily edited and searched.

Paper 52