Tue.Aug 20, 2019

Facebook and Twitter Scuttle Hong Kong Disinformation

Data Breach Today

Pro-Democracy Protestors Targeted via Information Operations Attributed to China Facebook and Twitter have suspended a number of accounts and pages that they have tied to information operations being run by the Chinese government.

SHARED INTEL: Malware-ridden counterfeit phones place consumers, companies in harm’s way

The Last Watchdog

A faked Rolex or Prada handbag is easy enough to acquire on the street in certain cities, and you can certainly hunt one down online. Now add high-end counterfeit smartphones to the list of luxury consumer items that are being aggressively marketed to bargain-hungry consumers.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Use of Facial Recognition Stirs Controversy

Data Breach Today

The Technology Sparks Privacy Concerns in the U.K. and Beyond A developer's use of facial recognition technology to scan the faces of pedestrians in London has sparked concerns from residents, the mayor and Britain's privacy watchdog.

A Huge Ransomware Attack Messes With Texas

WIRED Threat Level

A coordinated strike against 23 local governments is called the largest such hack from a single source. Security Security / Cyberattacks and Hacks

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Medical Device Security: The Doctor's View

Data Breach Today

Dale Nordenberg on Why the US Security Debate Is a Global Issue For years now, pediatrician Dale Nordenberg has been battling within the U.S. to ensure that medical device security is given proper attention and regulation.

More Trending

Threat Intel for a Global Economy

Data Breach Today

NTT Data's Jaime Chanaga on the Business Impact of Cyberthreats The World Economic Forum recently identified "cyberattacks and data integrity concerns crippling large parts of the internet" as one of the top 10 global risks.

Risk 172

A backdoor mechanism found in tens of Ruby libraries

Security Affairs

Maintainers of the RubyGems package repository have removed 18 malicious versions of 11 Ruby libraries that contained a backdoor. Maintainers of the RubyGems package repository have discovered a backdoor mechanism in 18 malicious versions of 11 Ruby libraries.

Designing a Behavior-Centric Security Plan

Data Breach Today

Organizations looking to implement behavior-centric security must set clear goals for the business outcomes, says David Coffey, senior vice president of engineering at Forcepoint, who offers tips

The rise of hybrid cloud poses new security challenges – are you prepared?

Thales eSecurity

Cloud 105

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Facebook’s New Privacy Feature Comes With a Loophole

WIRED Threat Level

"Off-Facebook Activity" will give users more control over their data, but Facebook needs up to 48 hours to aggregate your information into a format it can share with advertisers. Security Security / Privacy

Flaw in New Facebook Design Allowed Removal of Profile Photos

Security Affairs

A security vulnerability in the Facebook design (FB5) could have allowed attackers to remove any photo from profiles of the users.

Surveillance as a Condition for Humanitarian Aid

Schneier on Security

Excellent op-ed on the growing trend to tie humanitarian aid to surveillance. Despite the best intentions, the decision to deploy technology like biometrics is built on a number of unproven assumptions, such as, technology solutions can fix deeply embedded political problems.

Twitter bans 936 accounts that attempted to sow political discord in Hong Kong

Security Affairs

Twitter announced it has banned 936 accounts managed by China-linked actors that attempted to sow political discord in Hong Kong. Twitter has observed and banned 936 accounts managed by China-linked actors that attempted to stir up riots and sow political discord in Hong Kong.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

How will UK organisations share data with the EU in no-deal Brexit?

IT Governance

As we approach 31 October and the revised Brexit deadline day, you’ll see more and more stories pop up about previously under-reported ways that the UK’s departure from the EU will affect organisations. The latest concerns are about how UK organisations will be able to share data with EU partners.

Damage from Silence APT operations increases fivefold. The gang deploys new tools on its “worldwide tour”

Security Affairs

Experts from Group-Ib that exposed the most recent campaigns carried out by Silence reported that damage from the APT group operations increases fivefold.

Fortnite Ransomware Masquerades as an Aimbot Game Hack


Attackers are taking aim at Fortnite's global community of 250 million gamers. Malware Web Security aimbot cyberattack cyren esp Fortnite Malware analysis ransomware syrk World Cup

9 top trends that are driving AI and software investments

Information Management Resources

IT and data leaders are constantly challenged to keep up with new trends in emerging and disruptive technologies, and to determine how each can best aid the organization

IT 79

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Microsoft Offers $30K Rewards For Chromium Edge Beta Flaws


Microsoft released the beta of its new Chromium-based Edge - and it is offering rewards of up to $30,000 for researchers to hunt out vulnerabilities in the browser.

IT 111

Using intelligent automation to empower teams for enterprise-wide innovation

Information Management Resources

Through embedded cognitive algorithms, IA focuses on continuous learning, adapting to deliver more knowledgeable and accurate decisions


Apple iOS Patch Blunder Opens Updated iPhones to Jailbreaks


Apple accidentally re-introduced a vulnerability in its latest operating system, iOS 12.4, that had been previously fixed in iOS 12.3. Hacks Mobile Security Vulnerabilities apple apple flaw apple jailbreak ios iOS 12.3 ios 12.4 iphone jailbreak patch vulnerability

IT 106

Finally, a Lightning YubiKey to Kill Password Clutter on Your iPhone

WIRED Threat Level

First promised back in January, the first YubiKey for iOS will help cut down on painful password clutter starting. Security Security / Security News

5 Ways to Improve the Patching Process

Dark Reading

So many software vulnerabilities, so little time. But failure to patch them can have serious consequences. Here's help for overwhelmed security teams

Adwind Spyware-as-a-Service Attacks Utility Grid Operators


A phishing campaign targeting utility grid operators uses a PDF attachment to deliver spyware. Malware Web Security Adwind antivirus bypass cofense malware as a service pdf spoof phishing campaign Spyware utility operators

CISOs Struggle with Diminishing Tools to Protect Assets from Growing Threats

Dark Reading

Most CISOs see the risk of cyberattacks growing and feel they're falling behind in their ability to fight back, a new survey finds

Risk 83

How to Prepare for Misconfigurations Clouding the Corporate Skies


With cloud misconfigurations rampant in cloud storage and IaaS environments, adding security layers to identify them is crucial for securing sensitive data.

Cloud 87

The forgotten step to AI project success

OpenText Information Management

A few weeks ago, a WSJ article discussed the reality of artificial intelligence (AI) project failures or delays that rarely make the news. It’s no surprise that some AI projects fail. We know that not all projects go as planned and that we learn from the experience, adjust and apply those lessons to the next … The post The forgotten step to AI project success appeared first on OpenText Blogs.

Cyberthreats Against Financial Services Up 56%

Dark Reading

Financial institutions interacting with customers online must prepare for a broader, more sophisticated variety of threats

Discover how to infuse analytics into your business at the Data and AI Forum 2019

IBM Big Data Hub

The event formerly known as IBM Analytics University is happening again this fall. Join us at the Data and AI Forum on October 21–24 in Miami, Florida. Here’s a preview of what you can get out of this exciting event

Apple Misstep Leaves iPhones Open to Jailbreak

Dark Reading

Newest version of iOS contains a critical bug that the company had previously already patched


Episode 158: How NotPetya has Insurers grappling with Systemic Cyber Risk

The Security Ledger

We talk to Bruce McDonnell of the East West Institute about how insurers are responding.