Sun.Nov 11, 2018

article thumbnail

Linux Cryptocurrency miner leverages rootkit to avoid detection

Security Affairs

Researchers from Trend Micro spotted a new cryptocurrency miner that leverages a rootkit component to hide its presence on the infected systems. Cryptocurrency malware continues to be a privileged choice for crooks and the number of victims is rapidly growing. Cryptocurrency miners are easy to detect due to the saturation of resources on the affected systems, but experts from Trend Micro spotted a new miner that leverages a rootkit component to hide its presence.

Mining 93
article thumbnail

Data watchdog investigates ‘bin Chequers’ email campaign

The Guardian Data Protection

Ads by secretive organisation Mainstream Network may have breached personal privacy rules A secretive group that has spent hundreds of thousands of pounds encouraging voters to back a hard Brexit is being investigated by Britain’s data watchdog, it has emerged. MPs had already raised concerns about the activities of the anonymous Mainstream Network group, whose ads and website encourage readers to “chuck Chequers”, referring to Theresa May’s proposed Brexit deal.

Privacy 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 188 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Paper Copy. Once again thank you! Apple T2 security chip in new MacBooks disconnects Microphone when lid is closed.

article thumbnail

How to Safely and Securely Dispose of Your Old Gadgets

WIRED Threat Level

Keep your data private and the environment protected.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Tomorrow is the Day to “Master” Your Knowledge of eDiscovery in Orlando for 2018: eDiscovery Trends

eDiscovery Daily

If you’re going to be in the Orlando area tomorrow, join me and other legal technology experts and professionals at The Master’s Conference Orlando event. It’s a full day of educational sessions covering a wide range of topics! The Master’s Conference brings together leading experts and professionals from law firms, corporations and the bench to develop strategies, practices and resources for managing eDiscovery and the information life cycle.