Sun.Apr 21, 2019

60 Million records of LinkedIn users exposed online

Security Affairs

Researcher discovered eight unsecured databases exposed online that contained approximately 60 million records of LinkedIn user data. Researcher Sanyam Jain at GDI foundation discovered eight unsecured databases exposed online that contained approximately 60 million records of LinkedIn user data.

Hackers Can Tell What Netflix 'Bandersnatch' Choices You Make

WIRED Threat Level

Researchers have shown that even though Netflix encrypts its traffic, hackers can figure out your interactive movie choices. Security Security / Cyberattacks and Hacks

Ride-Hailing Company operating in Iran exposes data of Iranian Drivers

Security Affairs

Security researcher discovered a database belonging to a ride-hailing company operating in Iran that was left exposed online containing over 6.7M records.

Why Does Production Have to be Such a Big Production?, Part Four

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

INPIVX hidden service, a new way to organize ransomware attacks

Security Affairs

A new service called Inpivx represents the evolution of the ransomware-as-a-service making it very easy for wannabe crooks to develop their malware and build a management panel. A new Tor hidden service called Inpivx evolves the concept of the ransomware-as-a-service making it very easy for crooks without technical skills to develop their own malware and build a management panel. Operators behind the service offer for sale the source code for the ransomware and for the management dashboard.

More Trending

Security Affairs newsletter Round 210 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Kindle Edition. Paper Copy. Once again thank you! Attackers hacked support agent to access Microsoft Outlook email accounts.

Sales 68

Foxes and hen houses

InfoGovNuggets

“McKinsey Broke the Rules, Now It Wants to Rewrite Them,” The Wall Street Journal , April 12, 2019. Company that was fined $32 million for failing to disclose conflicts to write the rules for industry. It makes sense, in a strange way, to have the person who violated the existing rules and got caught, to write the new rules. Who knows the loopholes better? But why does a single federal judge get to make this decision for all the bankruptcy courts?

Identity

InfoGovNuggets

“Test-Taking Whiz in College Admissions Scandal Pleads Guilty,” The Wall Street Journal , April 13, 2019. Harvard grad would take SAT tests for others. Apparently, someone can impersonate you and take “your” SAT test. One suspects that the SAT folks are tightening the barn door. And schools may be kicking out some loose horses. Lots of different Information, Governance, and Compliance issues, at several different levels.

Abuse

InfoGovNuggets

“Google Sued Over Abuse of Search Power, Opening Path for More Claims,” The Wall Street Journal, April 13, 2019. Google accused of favoring its proprietary price comparison tool over that of a competitor. Are governments starting to rein in the tech giants? What does this tell us about the future? Yes, this is information governance. The German court is being asked to say how Google can and cannot use the searching protocols on its platform to deliver results.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Infection spreads

InfoGovNuggets

“WhatsApp Users Spread Antivaccine Rumors in India,” The Wall Street Journal , April 15, 2019. False reports from the US on vaccines spreads in India. Where do you get your news from? Do you trust the source(s)? Does the government have a legitimate interest in preventing the spread of rumors that affect health? What about politics? What can the platform do to help? Is this people just using the platform as it was designed?

Porridge

InfoGovNuggets

“Pilots Take Aim at Instructions for Boeing 737 MAX,” The Wall Street Journal , April 4, 2019. Were the instructions detailed enough? People died. When you’re training people in a new system, or compliance, you must choose how detailed your instructions are. Are they too detailed, so that people’s attention wanes, or are they too brief, so something that in retrospect seems important is left out or not addressed fully?

Gambling

InfoGovNuggets

“Wynn Resorts CEO Is Pressed on What He Knew About Former Boss,” The Wall Street Journal , April 5, 2019. New CEO challenged on his claim he didn’t know about his boss’s bad behavior. What if there is information that you should know but you don’t? Can that be used to deny your company a gambling license? Is that an identified risk? Is this an aspect of the company’s Governance or an aspect about your own personal governance?

Risk 28

A lost boy

InfoGovNuggets

“Man Who Allegedly Claimed to Be Missing Boy Timmothy Pitzen Is Charged,” The Wall Street Journal , April 6, 2019. Man wandering in streets claimed to be a boy who disappeared in 2011. What possesses someone to claim to an FBI agent that you were a lost boy, profiled in a TV show? This guy had a history of false claims. At least this time, before the news media went bonkers, the claim was debunked.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Information on you

InfoGovNuggets

“The Secret Trust Scores Companies Use to Judge Us All,” The Wall Street Journal , April 6, 2019. How companies know you’re not a robot. The companies use a service that collects a bunch of information about you to determine a score. Based on that score, the online transaction is allowed to proceed or not. But can you know what your score is? That information about you is not your information, even under the GDPR. Theme One: Information

GDPR 28

Nature abhors a vacuum

InfoGovNuggets

“Facebook, Google in Crosshairs of New U.K. Policy to Control Tech Giants,” The Wall Street Journal , April 8, 2019. New law would require platform owners to remove content that was propaganda, cyberbullying, or disinformation. So, once again, a single government tries to come to grip with the absence of Governance over the Information contained on internet platforms. Is this a trend? Theme One: Information Theme Three: Compliance Theme Two: Governance

Opening the door

InfoGovNuggets

“Amazon Wants You to Use Alexa to Track Health Care,” The Wall Street Journal , April 8, 2019. Using Alexa allegedly meets HIPAA requirements. How do you manage your health information? Is that Information Governance? Do you want to automate part of that? How secure is Alexa? Theme One: Information Theme Three: Compliance Theme Two: Governance

Use/non-use

InfoGovNuggets

“U.S. Requires Texas Tech Med School to End Use of Race in Admissions Decisions,” The Wall Street Journal, April 10, 2019. The US government prohibits the use of a person’s race as a factor in medical school admissions. What information can you use in making admissions decisions, and what information can you not use? Is “race” information? Is this part of Information Governance? And Compliance?

Rules v. guidelines

InfoGovNuggets

“PG&E Among Utilities Cited for Failing to Protect Against Cyber and Physical Attacks,” The Wall Street Journal , April 10, 2019. They allegedly broke the rules years ago. What does it say when major utility companies don’t follow the rules on protecting themselves from cyberattack? Is that a colossal Governance and Compliance issue? Do they feel that the rules don’t apply to them? Are they more like guidelines? Is this a cultural issue?

IT 28

Hiding in plain sight

InfoGovNuggets

“Facebook Bends to EU Pressure on ‘Misleading’ Fine Print,” The Wall Street Journal , April 10, 2019. Facebook challenged on its terms of service. Facebook was forced to make its terms of service clearer on a critical point: how Facebook makes money off of your data. Continuing theme of governments starting to get a grip on the major platforms. So, Governance. And Information. And Compliance. And major companies hiding things in plain sight.

Data 28

Ransomware is still out there

InfoGovNuggets

“Norsk Hydro Repairs Systems and Investigates After Ransomware Attack,” The Wall Street Journal , April 11, 2019. Company crippled by cyberattack involving ransomware. How well do we protect our company’s operations from ransomware attacks? Is that Security’s job, or IT’s? Is this part of Information Governance? Important here was the company’s ability to shift to manual operation, bypassing the infected systems. Theme One: Information Theme Two: Governance