Wed.Jan 22, 2020

Apple Addresses iPhone 11 Location Privacy Concern

Krebs on Security

Apple is rolling out a new update to its iOS operating system that addresses the location privacy issue on iPhone 11 devices that was first detailed here last month. Beta versions of iOS 13.3.1

BT and Vodafone Reportedly Want Huawei 5G Gear

Data Breach Today

Vodafone CEO Has Warned Huawei Ban Would Delay Britain's 5G Rollout by 2 Years Britain's two largest telecommunications firms - BT and Vodafone - plan to lobby Prime Minister Boris Johnson to not fully ban Huawei hardware from the nation's 5G rollout, warning that doing so could delay their rollouts, the Guardian reports.

176
176

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

HSMs: Facilitating Key Management in a Hybrid Cloud Environment

Thales eSecurity

Organizations are actively working to prevent data breaches by encrypting their sensitive information. Encryption isn’t a foolproof security measure, however.

ROT 94

Updated FTCODE Ransomware Now Steals Credentials, Passwords

Data Breach Today

Revamped Malware Targets Browsers and Email Clients FTCODE, a ransomware strain that has been active since at least 2013, has recently been revamped to include new features, including the ability to steal credentials and passwords from web browsers and email clients, according to two research reports released this week.

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Malware attack took down 600 computers at Volusia County Public Library

Security Affairs

System supporting libraries in Volusia County were hit by a cyber attack, the incident took down 600 computers at Volusia County Public Library (VCPL) branches.

More Trending

Half a Million IoT Device Passwords Published

Schneier on Security

It's a list of easy-to-guess passwords for IoT devices on the Internet as recently as last October and November.

Documents Describe US Cyber Command's Campaign to Hack ISIS

Data Breach Today

Operation Faced a Number of Challenges, Including Data Storage The U.S.

For Mismanaged SOCs, The Price Is Not Right

Dark Reading

New research finds security operations centers suffer high turnover and yield mediocre results for the investment they require

Saudi Arabia Hacked Amazon CEO Jeff Bezos' Phone: Report

Data Breach Today

While Saudis Dismiss Report, United Nations Demands Immediate Investigation The mobile phone of Amazon CEO Jeff Bezos was hacked via a malicious file sent directly from the official WhatsApp account of Saudi Arabia's Crown Prince Mohammed Bin Salman, investigators have concluded.

141
141

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Cybersecurity Lessons Learned from 'The Rise of Skywalker'

Dark Reading

They're especially relevant regarding several issues we face now, including biometrics, secure data management, and human error with passwords

Report: Apple Scuttled Encryption Plans for iCloud Backups

Data Breach Today

Technology Giant Didn't Want to 'Poke the Bear,' Sources Tell Reuters Apple previously scuttled plans add end-to-end encryption to iCloud backups, Reuters reports, noting that such a move would have complicated law enforcement investigations. But the apparent olive branch hasn't caused the U.S.

Everything We Know About the Jeff Bezos Phone Hack

WIRED Threat Level

A UN report links the attack on Jeff Bezos' iPhone X directly to Saudi Arabian Crown Prince Mohammed bin Salman. Security Security / Cyberattacks and Hacks

Tips on Protecting Hospitals From Nation-State Attacks

Data Breach Today

In light of rising tensions between the U.S. and Iran, the Association of Executives in Healthcare Information Security recently issued new data security guidance to help the healthcare sector prepare for potential nation-state attacks, says CISO Christopher Frenz, one of the document's authors

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

To Avoid Disruption, Ransomware Victims Continue to Pay Up

Dark Reading

For all the cautions against doing so, one-third of organizations in a Proofpoint survey said they paid their attackers after getting infected with ransomware

Jeff Bezos’ Hacked Phone, Coronavirus Hits the US, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / Cyberattacks and Hacks

'We Only Have Two of the Blinky Boxes Left to Go'

Dark Reading

Exactly who is king of the castle here

78

Elections Globally Are Under Threat. Here's How to Protect Them

WIRED Threat Level

A new report calls for safeguards to reduce the dangers posed by misinformation, online extremism, and social media manipulation. Business Business / Social Media Security

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Startup Privafy Raises $22M with New Approach to Network Security

Dark Reading

The company today disclosed an approach to data security designed to protect against modern threats at a lower cost than complex network tools

Jeff Bezos phone was hacked by Saudi crown prince

Security Affairs

The phone of the Amazon billionaire Jeff Bezos was hacked in 2018 after receiving a WhatsApp message from the personal account of the crown prince of Saudi Arabia.

Eight Flaws in MSP Software Highlight Potential Ransomware Vector

Dark Reading

An attack chain of vulnerabilities in ConnectWise's software for MSPs has similarities to some of the details of the August attack on Texas local and state agencies

OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propaganda

Security Affairs

US military claims to have disrupted the online propaganda activity of the Islamic State (ISIS) in a hacking operation dating back at least to 2016.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Why DPOs and CISOs Must Work Closely Together

Dark Reading

Recent data protection laws mean that the data protection officer and CISO must work in tandem to make sure users' data is protected

65

Threat Model Thursday: Files

Adam Shostack

There’s a fascinating talk by Dan Luu, “ Files are Fraught With Peril. ” The talk itself is fascinating, in a horrifying, nothing works, we’re going to give up and raise goats now sort of way.

Configuration Error Reveals 250 Million Microsoft Support Records

Dark Reading

Some the records, found on five identically configured servers, might have contained data in clear text

60

Four technology predictions for public sector in 2020

OpenText Information Management

With the investment in technology and personnel training we are currently seeing, 2020 will be a year of reckoning for digital transformation initiatives in the public sector. Here are the four technology predictions for the public sector in 2020.

MER Publishes Conference Agenda

IG Guru

MER Conference Agenda PDF. The post MER Publishes Conference Agenda appeared first on IG GURU.

FOIA 56

Microsoft Leaves 250M Customer Service Records Open to the Web

Threatpost

The trove of information is potentially a scammer's bonanza. Breach Cloud Security Privacy Web Security 250 million Bob Diachenko cloud database Cloud misconfiguration comparitech customer service records Elasticsearch Microsoft Phishing publicly accessible tech support scams

Break barriers in the data maturity curve with IBM Cloud Pak for Data and MongoDB

IBM Big Data Hub

As IBM’s leading platform for data and AI, Cloud Pak for Data integrates seamlessly with MongoDB to help data scientists and developers quickly scale the ladder to AI

Cloud 74

Rocket BlueZone 8.1.0 is now available! See what’s new.

Rocket Software

Our customers want to provide their employees, and ultimately their own customers and partners, the best experiences they can. In order to do that, they need to be able to quickly and efficiently manage and administer their Rocket BlueZone® deployments.