Thu.May 23, 2019

Assange Now Faces 18 US Charges

Data Breach Today

WikiLeaks Founder Faces Indicted Under Espionage Act A federal grand jury has indicted WikiLeaks founder Julian Assange on 18 counts under the U.S. Espionage Act for his role in publishing classified material, the Justice Department announced Thursday.

183
183

Thangrycat: A Serious Cisco Vulnerability

Schneier on Security

Summary : Thangrycat is caused by a series of hardware design flaws within Cisco's Trust Anchor module.

Assange Indicted in US Under Espionage Act

Data Breach Today

Case May Prove to be One of the Most Significant First Amendment Challenges A federal grand jury has indicted WikiLeaks founder Julian Assange on 18 counts under the U.S. Espionage Act for his role in publishing classified material, the Justice Department announced Thursday.

180
180

PoC Exploits for CVE-2019-0708 wormable Windows flaw released online

Security Affairs

Several security experts have developed PoC exploits for wormable Windows RDS flaw tracked as CVE-2019-0708 and dubbed BlueKeep.

Contact Center Cloud Migration Done Right

Speaker: Sheila McGee-Smith, Founder and Principal Analyst, McGee-Smith Analytics

Many companies are in the midst of migrating their contact center to the cloud. Understanding how best to execute the transition of premises to cloud is part of that process. Join contact center industry analyst and No Jitter blogger Sheila McGee-Smith as she discussed tried and true best practices for avoiding the potential pitfalls of CX migration.

Cloud-Based EHR Vendor Slapped With HIPAA Fine

Data Breach Today

Investigation Came in Wake of Cyberattack That Affected Millions Federal regulators have smacked a cloud-based electronics health records vendor with a $100,000 HIPAA settlement in the wake of a 2015 cyberattack that affected millions of individuals. What's the focus of the enforcement action

Cloud 173

More Trending

Executive Roundtable Recap: "Confessions of a Healthcare CISO"

Data Breach Today

ISMG and NTT hosted a roundtable dinner in Chicago on May 8 focused on "Confessions of a Healthcare CISO

165
165

How Document Scanning Can Improve Productivity at Your Workplace

AIIM

Companies are always looking for ways to make their workplace more productive and efficient and to reduce costs. Document management has an important part to play here. A survey conducted in 2012 showed that 21.3%

Owner of Defunct Firm Fined in LeakedSource.com Case

Data Breach Today

Website Sold Access to 3.1

Access 158

Playing Cat and Mouse: Three Techniques Abused to Avoid Detection

Security Affairs

The experts at Yoroi -Cybaze Zlab described three techniques commonly implemented by threat actors to avoid detection. Introduction. During our analysis we constantly run into the tricks cyber-attackers use to bypass companies security defences, sometimes advanced, others not.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Bestmixer Cryptocurrency Laundering Site Shuttered

Data Breach Today

Authorities Say 'Mixer' Site Laundered Nearly $200 Million Worth of Cryptocurrencies European police have shuttered Bestmixer.io, considered one of the largest underground money laundering websites for cryptocurrencies used in connection with criminal activities, including ransomware attacks

UK provided evidence to 16 NATO allies of Russia hacking campaigns

Security Affairs

UK Government has provided to 16 NATO allies evidence of malicious Russia ‘s cyber activity in their countries over the last 18 months.

Goodbye Passwords: Hello Identity Management

Threatpost

As passwords are increasingly viewed as security liabilities, Identity Management solutions are picking up the slack.

German SG-41 Encryption Machine Up for Auction

Schneier on Security

A German auction house is selling an SG-41. It looks beautiful. Starting price is 75,000 euros. My guess is that it will sell for around 100K euros. cryptography encryption germany historyofcryptography

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Researcher Publishes Four Zero-Day Exploits in Three Days

Dark Reading

The exploits for local privilege escalation vulnerabilities in Windows could be integrated into malware before Microsoft gets a chance to fix the issues

105
105

The Relevance of agile enterprise Architecture to devops

erwin

How do organizations innovate? Taking an idea from concept to delivery requires strategic planning and the ability to execute. In the case of software development, understanding agile enterprise architecture and its relevance to DevOps is also key.

Shade Ransomware Expands to U.S. Targets

Threatpost

Coming to America: The Shade ransomware, which has historically targeted Russian victims, was recently spotted expanding its sights.

Tor Browser for Android is available through the Play Store

Security Affairs

Tor Browser for Android is now available on the Play Store, this is a great result for experts that everyday fight to defend human rights and privacy online. The Tor Project announced on Tuesday that the Tor Browser version Tor Browser 8.5 for Android is finally available on the Google Play Store.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

The GDPR: A year in review

IT Governance

A year ago this week, the GDPR (General Data Protection Regulation) took effect, promising to revolutionise information security. To mark the anniversary, we gathered a panel of data protection experts to discuss the effect of the Regulation and the future of data protection. Compliance fatigue’.

GDPR 69

SandboxEscaper disclosed 3 Microsoft zero-day flaws in 24 hours

Security Affairs

Yesterday SandboxEscaper publicly disclosed a Windows zero-day vulnerability, now she disclosed other two unknown issues in less than 24 hours.

Video 72

Russian Nation-State Hacking Unit's Tools Get More Fancy

Dark Reading

APT28/Fancy Bear has expanded its repertoire to more than 30 commands for infecting systems, executing code, and reconnaissance, researchers have found

Tools 98

The Julian Assange Espionage Act Charges Target Press Freedom

WIRED Threat Level

By invoking the Espionage Act against Julian Assange, the Justice Department will effectively put national security journalism on trial. Security Security / National Security

Calibration Attack Drills Down on iPhone, Pixel Users

Threatpost

A new way of tracking mobile users creates a globally unique device fingerprint that browsers and other protections can't stop.

Cinco formas de traducir los retrasos aéreos en experiencias positivas

DXC Technology

Las aerolíneas saben muy bien que habrá retrasos. Pero aún siendo inevitables, hay formas de traducirlos en experiencias positivas. Todas ellas cuentan con datos comerciales muy valiosos (de los comercios del aeropuerto, áreas de descanso y del comportamiento de los viajeros) en este recinto acotado. Conocen sus preferencias. Con esta información, pueden mejorar mucho los […]. Analytics Travel, Transportation & Hospitality airlines customer experience

The Danger in Assange’s Charges, a Memory Experiment, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / National Security

SandboxEscaper Drops Three More Windows Exploits, IE Zero-Day

Threatpost

As promised, developer SandboxEscaper has dropped exploit code for four more bugs, on the heels of releasing a Windows zero-day yesterday. Vulnerabilities Web Security exploit code Internet Explorer 11 Local Privilege Escalation patch sandboxescaper unpatched flaw vulnerability Windows zero day

SPAIN: New Data Protection Act (partly) nullified by the Constitutional Court

DLA Piper Privacy Matters

On 22 May 2019 it was disclosed that the Spanish Constitutional Court had decided to nullify indent 2 of the final provision 3 of the new Spanish Data Protection Act, less than six months after becoming effective.

To Manage Security Risk, Manage Data First

Dark Reading

At Interop 2019, IT and security experts urged attendees to focus on data asset management as a means of mitigating risk

Risk 81

Get a sneak peek of advances in OpenText Content Suite and Extended ECM

OpenText Information Management

New releases of OpenText™ Content Suite and OpenText™ Extended ECM are on the way! At Enterprise World in Toronto, attendees will learn about all the recently released and upcoming features for Content Suite and Extended ECM, complete with demos and interactive sessions hosted by the experts behind the product. What’s new in OpenText Content Suite … The post Get a sneak peek of advances in OpenText Content Suite and Extended ECM appeared first on OpenText Blogs.

ECM 56

Incident Response: 3 Easy Traps & How to Avoid Them

Dark Reading

Sage legal advice about navigating a data breach from a troubleshooting cybersecurity outside counsel

One Year into GDPR: What's Changed?

eSecurity Planet

A year after implementation, the European data privacy regulation has improved data handling, but the biggest changes may be yet to come