Tue.Jan 21, 2020

Maryland Considers Criminalizing Ransomware Possession

Data Breach Today

Some Question Whether Such a Law Would Prove Effective Maryland lawmakers are considering a bill that would make possession of ransomware a crime punishable by up to 10 years in prison, similar to moves at least two other states have already made. But is such legislation effective

Kids and Code: Object Oriented Programming with Code Combat

Troy Hunt

Geez time flies. It's just a tad under 4 years ago that I wrote about teaching kids to code with code.org which is an amazing resource for young ones to start learning programming basics.

IT 99

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Federal Breach Tally: 2020 Trends So Far

Data Breach Today

Hacking Incidents Involving Email Are Common Three weeks into the new year, several hacking incidents involving email have already been added to the federal tally of major health data breaches. How should organizations stay one step ahead

US-based children’s clothing maker Hanna Andersson discloses a data breach

Security Affairs

The US-based children’s clothing maker Hanna Andersson has disclosed a data breach that affected its customers. The US-based children’s clothing maker and online retailer Hanna Andersson discloses a data breach, attackers planted an e-skimmer on its e-commerce platform.

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Google CEO Backs EU's Proposed Facial Recognition Ban

Data Breach Today

Sundar Pichai Calls for Government Regulation of Artificial Intelligence Alphabet and Google CEO Sundar Pichai is supporting an EU proposal for a temporary ban on the use facial recognition technology in public areas and is calling for government regulation of artificial intelligence

More Trending

GDPR: $126 Million in Fines and Counting

Data Breach Today

More than 160,000 Data Breaches Reported to EU Regulators, DLA Piper Finds Since the EU's General Data Protection Regulation went into full effect in May 2018, European data protection authorities have received more than 160,900 data breach reports and imposed $126 million in fines under GDPR for a wide variety of infringements, not all involving data breaches.

GDPR 141

Data Awareness Is Key to Data Security

Dark Reading

Traditional data-leak prevention is not enough for businesses facing today's dynamic threat landscape

Ransom-Demanding Gangs Target Fresh Victims: Patients

Data Breach Today

Could Attack on Florida Clinic Be Start of Disturbing Trend? Are ransomware shakedowns against healthcare entities taking an even uglier turn?

The Mystery of Fbot

Security Affairs

In a few days back, the MalwareMustDie team’s security researcher unixfreaxjp has published a new Linux malware analysis of Fbot that has focused on the decryption of the last encryption logic used by its bot client.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Mitsubishi Electric Blames Anti-Virus Bug for Data Breach

Data Breach Today

Hackers Exploited AV Software Zero-Day Vulnerability Before Vendor Patched Flaw Mitsubishi Electric says hackers exploited a zero-day vulnerability in its anti-virus software, prior to the vendor patching the flaw, and potentially stole trade secrets and employee data.

FBI Shuts Down Website Trafficking in Breached Data

Adam Levin

The FBI has seized the domain of WeLeakInfo.com, an online service that sold data from hacked and breached websites.

Microsoft Zero-Day Actively Exploited, Patch Forthcoming

Threatpost

CVE-2020-0674 is a critical flaw for most Internet Explorer versions, allowing remote code execution and complete takeover.

A Handy Chrome Feature, a Sonos Update Warning, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / Security Advice

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Yomi Hunter Catches the CurveBall

Security Affairs

Yomi implements detection for CurveBall exploits and also supports CVE-2020-0601 exploit detection even for signed Powershell modules. . The recent CurveBall vulnerability shook the Info-Sec community worldwide: a major vulnerability reported directly by the US National Security Agency.

Elaborate Honeypot 'Factory' Network Hit with Ransomware, RAT, and Cryptojacking

Dark Reading

A fictitious industrial company with phony employees personas, website, and PLCs sitting on a simulated factory network fooled malicious hackers - and raised alarms for at least one white-hat researcher who stumbled upon it

Free Press Advocates Decry Cybercrime Charges Against Glenn Greenwald

WIRED Threat Level

Brazil has accused journalist Glenn Greenwald of aiding a hacking ring, with seemingly scant evidence. Security Security / Security News

Brazil Charges Glenn Greenwald with Cybercrimes

Schneier on Security

Glenn Greenwald has been charged with cybercrimes in Brazil, stemming from publishing information and documents that were embarrassing to the government.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

7 Tips for Infosec Pros Considering A Lateral Career Move

Dark Reading

Looking to switch things up but not sure how to do it? Security experts share their advice for switching career paths in the industry

SIM Hijacking

Schneier on Security

SIM hijacking -- or SIM swapping -- is an attack where a fraudster contacts your cell phone provider and convinces them to switch your account to a phone that they control.

16Shop Phishing Gang Goes After PayPal Users

Threatpost

A sophisticated malware-as-a-service phishing kit includes full customer service and anti-detection technologies. Malware Web Security 16shop anti-detection indonesian cyber army Malware analysis malware as a service PayPal Phishing kit zerofox

The 2020 chief data officer: A move to data intelligence

Information Management Resources

The majority of companies have only hired CDOs recently, and those executives are only just beginning to take their organizations on a data journey. Data Scientist Data science CDOs

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Donald Trump's 'National Security' Impeachment Defense Is a Red Herring

WIRED Threat Level

The president’s cry-wolf strategy is straight from Richard Nixon’s playbook. Security Security / National Security

Microsoft, DHS Warn of Zero-Day Attack Targeting IE Users

Dark Reading

Software firm is "aware of limited targeted attacks" exploiting a scripting issue vulnerability in Internet Explorer 9, 10, and 11 that previously has not been disclosed

55

It’s Official: 2019 Was Our Best Year Ever

Zapproved

The post It’s Official: 2019 Was Our Best Year Ever appeared first on Zapproved. Company Culture Events PREX Product updates Recognition Zapproved News Corporate Ediscovery Hero Awards product updates recognition Zapproved news

IT 52

Avoid That Billion-Dollar Fine: Blurring the Lines Between Security and Privacy

Dark Reading

While doing good for the user is the theoretical ideal, the threat of fiscal repercussions should drive organizations to take privacy seriously. That means security and data privacy teams must work more closely

How to Get Legal and IT Working Together to Solve the Ediscovery Challenges of Collaboration Data

Hanzo Learning Center

Here’s a riddle: what will it take to solve the ediscovery challenges posed by new collaboration applications? ediscovery collaboration Hanzo Hold enterprise Slack

IT 52

FireEye Buys Cloudvisory

Dark Reading

The purchase is intended to bring new cloud capabilities to the FireEye Helix security platform

Cloud 54

Opinion: The Perils and Promise of the Data Decade

The Security Ledger

We have entered the "Data Decade," says RSA Security CTO Dr. Zulfikar Ramzan. What does that mean? Here are three "Data Decade" trends that will reshape how we talk about, approach, and manage data. The post Opinion: The Perils and Promise of the Data Decade appeared first on The Security Ledger.

Nearly 75% of SD-WAN Owners Lack Confidence Post-Digital Transformation

Dark Reading

More businesses think SD-WAN will reduce WAN costs, but only 37% think SD-WANs will help defend against malware and other threats