Tue.Aug 20, 2019

Facebook and Twitter Scuttle Hong Kong Disinformation

Data Breach Today

Pro-Democracy Protestors Targeted via Information Operations Attributed to China Facebook and Twitter have suspended a number of accounts and pages that they have tied to information operations being run by the Chinese government.

5 Ways to Protect Yourself from IP Address Hacking

Security Affairs

Your IP address represents your digital identity online, hacking it not only allows attackers to access your device or your accounts, but it may cause even bigger damage. Your IP or Internet Protocol address is your digital identity on the internet.

Use of Facial Recognition Stirs Controversy

Data Breach Today

The Technology Sparks Privacy Concerns in the U.K. and Beyond A developer's use of facial recognition technology to scan the faces of pedestrians in London has sparked concerns from residents, the mayor and Britain's privacy watchdog.

A backdoor mechanism found in tens of Ruby libraries

Security Affairs

Maintainers of the RubyGems package repository have removed 18 malicious versions of 11 Ruby libraries that contained a backdoor. Maintainers of the RubyGems package repository have discovered a backdoor mechanism in 18 malicious versions of 11 Ruby libraries.

Contact Center Cloud Migration Done Right

Speaker: Sheila McGee-Smith, Founder and Principal Analyst, McGee-Smith Analytics

Many companies are in the midst of migrating their contact center to the cloud. Understanding how best to execute the transition of premises to cloud is part of that process. Join contact center industry analyst and No Jitter blogger Sheila McGee-Smith as she discussed tried and true best practices for avoiding the potential pitfalls of CX migration.

Medical Device Security: The Doctor's View

Data Breach Today

Dale Nordenberg on Why the US Security Debate Is a Global Issue For years now, pediatrician Dale Nordenberg has been battling within the U.S. to ensure that medical device security is given proper attention and regulation.

More Trending

Threat Intel for a Global Economy

Data Breach Today

NTT Data's Jaime Chanaga on the Business Impact of Cyberthreats The World Economic Forum recently identified "cyberattacks and data integrity concerns crippling large parts of the internet" as one of the top 10 global risks.

Risk 156

SHARED INTEL: Malware-ridden counterfeit phones place consumers, companies in harm’s way

The Last Watchdog

A faked Rolex or Prada handbag is easy enough to acquire on the street in certain cities, and you can certainly hunt one down online. Now add high-end counterfeit smartphones to the list of luxury consumer items that are being aggressively marketed to bargain-hungry consumers.

Study 147

Designing a Behavior-Centric Security Plan

Data Breach Today

Organizations looking to implement behavior-centric security must set clear goals for the business outcomes, says David Coffey, senior vice president of engineering at Forcepoint, who offers tips

Tips 120

Flaw in New Facebook Design Allowed Removal of Profile Photos

Security Affairs

A security vulnerability in the Facebook design (FB5) could have allowed attackers to remove any photo from profiles of the users.

Groups 101

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Facebook’s New Privacy Feature Comes With a Loophole

WIRED Threat Level

"Off-Facebook Activity" will give users more control over their data, but Facebook needs up to 48 hours to aggregate your information into a format it can share with advertisers. Security Security / Privacy

Surveillance as a Condition for Humanitarian Aid

Schneier on Security

Excellent op-ed on the growing trend to tie humanitarian aid to surveillance. Despite the best intentions, the decision to deploy technology like biometrics is built on a number of unproven assumptions, such as, technology solutions can fix deeply embedded political problems.

A Huge Ransomware Attack Messes With Texas

WIRED Threat Level

A coordinated strike against 23 local governments is called the largest such hack from a single source. Security Security / Cyberattacks and Hacks

How will UK organisations share data with the EU in no-deal Brexit?

IT Governance

As we approach 31 October and the revised Brexit deadline day, you’ll see more and more stories pop up about previously under-reported ways that the UK’s departure from the EU will affect organisations. The latest concerns are about how UK organisations will be able to share data with EU partners.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Twitter bans 936 accounts that attempted to sow political discord in Hong Kong

Security Affairs

Twitter announced it has banned 936 accounts managed by China-linked actors that attempted to sow political discord in Hong Kong. Twitter has observed and banned 936 accounts managed by China-linked actors that attempted to stir up riots and sow political discord in Hong Kong.

9 top trends that are driving AI and software investments

Information Management Resources

IT and data leaders are constantly challenged to keep up with new trends in emerging and disruptive technologies, and to determine how each can best aid the organization

Fortnite Ransomware Masquerades as an Aimbot Game Hack

Threatpost

Attackers are taking aim at Fortnite's global community of 250 million gamers. Malware Web Security aimbot cyberattack cyren esp Fortnite Malware analysis ransomware syrk World Cup

Using intelligent automation to empower teams for enterprise-wide innovation

Information Management Resources

Through embedded cognitive algorithms, IA focuses on continuous learning, adapting to deliver more knowledgeable and accurate decisions

78

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Damage from Silence APT operations increases fivefold. The gang deploys new tools on its “worldwide tour”

Security Affairs

Experts from Group-Ib that exposed the most recent campaigns carried out by Silence reported that damage from the APT group operations increases fivefold.

Finally, a Lightning YubiKey to Kill Password Clutter on Your iPhone

WIRED Threat Level

First promised back in January, the first YubiKey for iOS will help cut down on painful password clutter starting. Security Security / Security News

Microsoft Offers $30K Rewards For Chromium Edge Beta Flaws

Threatpost

Microsoft released the beta of its new Chromium-based Edge - and it is offering rewards of up to $30,000 for researchers to hunt out vulnerabilities in the browser.

IT 94

5 Ways to Improve the Patching Process

Dark Reading

So many software vulnerabilities, so little time. But failure to patch them can have serious consequences. Here's help for overwhelmed security teams

Adwind Spyware-as-a-Service Attacks Utility Grid Operators

Threatpost

A phishing campaign targeting utility grid operators uses a PDF attachment to deliver spyware. Malware Web Security Adwind antivirus bypass cofense malware as a service pdf spoof phishing campaign Spyware utility operators

The forgotten step to AI project success

OpenText Information Management

A few weeks ago, a WSJ article discussed the reality of artificial intelligence (AI) project failures or delays that rarely make the news. It’s no surprise that some AI projects fail. We know that not all projects go as planned and that we learn from the experience, adjust and apply those lessons to the next … The post The forgotten step to AI project success appeared first on OpenText Blogs.

Apple iOS Patch Blunder Opens Updated iPhones to Jailbreaks

Threatpost

Apple accidentally re-introduced a vulnerability in its latest operating system, iOS 12.4, that had been previously fixed in iOS 12.3. Hacks Mobile Security Vulnerabilities apple apple flaw apple jailbreak ios iOS 12.3 ios 12.4 iphone jailbreak patch vulnerability

IT 91

CISOs Struggle with Diminishing Tools to Protect Assets from Growing Threats

Dark Reading

Most CISOs see the risk of cyberattacks growing and feel they're falling behind in their ability to fight back, a new survey finds

Episode 158: How NotPetya has Insurers grappling with Systemic Cyber Risk

The Security Ledger

We talk to Bruce McDonnell of the East West Institute about how insurers are responding.

Cyberthreats Against Financial Services Up 56%

Dark Reading

Financial institutions interacting with customers online must prepare for a broader, more sophisticated variety of threats

A free webinar on modern capture methodologies

IG Guru

Check out this free on-demand webinar provided by Access and ARMA International. This webinar is pre-recorded and free to registrants. Start here. The post A free webinar on modern capture methodologies appeared first on IG GURU.

Visa Adds New Fraud Disruption Measures

Dark Reading

Payment card giant creates a 'cyber fraud system' to thwart transaction abuse

73

How to Prepare for Misconfigurations Clouding the Corporate Skies

Threatpost

With cloud misconfigurations rampant in cloud storage and IaaS environments, adding security layers to identify them is crucial for securing sensitive data.