Thu.May 23, 2019

Assange Now Faces 18 US Charges

Data Breach Today

WikiLeaks Founder Faces Indicted Under Espionage Act A federal grand jury has indicted WikiLeaks founder Julian Assange on 18 counts under the U.S. Espionage Act for his role in publishing classified material, the Justice Department announced Thursday.

194
194

Thangrycat: A Serious Cisco Vulnerability

Schneier on Security

Summary : Thangrycat is caused by a series of hardware design flaws within Cisco's Trust Anchor module.

Assange Indicted in US Under Espionage Act

Data Breach Today

Case May Prove to be One of the Most Significant First Amendment Challenges A federal grand jury has indicted WikiLeaks founder Julian Assange on 18 counts under the U.S. Espionage Act for his role in publishing classified material, the Justice Department announced Thursday.

192
192

PoC Exploits for CVE-2019-0708 wormable Windows flaw released online

Security Affairs

Several security experts have developed PoC exploits for wormable Windows RDS flaw tracked as CVE-2019-0708 and dubbed BlueKeep.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Cloud-Based EHR Vendor Slapped With HIPAA Fine

Data Breach Today

Investigation Came in Wake of Cyberattack That Affected Millions Federal regulators have smacked a cloud-based electronics health records vendor with a $100,000 HIPAA settlement in the wake of a 2015 cyberattack that affected millions of individuals. What's the focus of the enforcement action

Cloud 184

More Trending

Executive Roundtable Recap: "Confessions of a Healthcare CISO"

Data Breach Today

ISMG and NTT hosted a roundtable dinner in Chicago on May 8 focused on "Confessions of a Healthcare CISO

175
175

UK provided evidence to 16 NATO allies of Russia hacking campaigns

Security Affairs

UK Government has provided to 16 NATO allies evidence of malicious Russia ‘s cyber activity in their countries over the last 18 months.

Owner of Defunct Firm Fined in LeakedSource.com Case

Data Breach Today

Website Sold Access to 3.1

Access 167

Playing Cat and Mouse: Three Techniques Abused to Avoid Detection

Security Affairs

The experts at Yoroi -Cybaze Zlab described three techniques commonly implemented by threat actors to avoid detection. Introduction. During our analysis we constantly run into the tricks cyber-attackers use to bypass companies security defences, sometimes advanced, others not.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Bestmixer Cryptocurrency Laundering Site Shuttered

Data Breach Today

Authorities Say 'Mixer' Site Laundered Nearly $200 Million Worth of Cryptocurrencies European police have shuttered Bestmixer.io, considered one of the largest underground money laundering websites for cryptocurrencies used in connection with criminal activities, including ransomware attacks

German SG-41 Encryption Machine Up for Auction

Schneier on Security

A German auction house is selling an SG-41. It looks beautiful. Starting price is 75,000 euros. My guess is that it will sell for around 100K euros. cryptography encryption germany historyofcryptography

The Relevance of agile enterprise Architecture to devops

erwin

How do organizations innovate? Taking an idea from concept to delivery requires strategic planning and the ability to execute. In the case of software development, understanding agile enterprise architecture and its relevance to DevOps is also key.

Tor Browser for Android is available through the Play Store

Security Affairs

Tor Browser for Android is now available on the Play Store, this is a great result for experts that everyday fight to defend human rights and privacy online. The Tor Project announced on Tuesday that the Tor Browser version Tor Browser 8.5 for Android is finally available on the Google Play Store.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Goodbye Passwords: Hello Identity Management

Threatpost

As passwords are increasingly viewed as security liabilities, Identity Management solutions are picking up the slack.

Customer demands, cloud services drive demand for predictive analytics tools

Information Management Resources

Among the key drivers of market growth are rising demand for advanced analytics to predict future outcomes and customer requirements and advancements in cloud-based services. Predictive analytics Data management Analytics

SandboxEscaper disclosed 3 Microsoft zero-day flaws in 24 hours

Security Affairs

Yesterday SandboxEscaper publicly disclosed a Windows zero-day vulnerability, now she disclosed other two unknown issues in less than 24 hours.

Video 76

The road to 5G is often paved with malware

Information Management Resources

With all good things, there is a dark side. Along with the ubiquity of mobile devices, is also the ubiquity of malware that infects them, made even more so with 5G technology. Hardware and software Mobile technology Internet of things

107
107

The GDPR: A year in review

IT Governance

A year ago this week, the GDPR (General Data Protection Regulation) took effect, promising to revolutionise information security. To mark the anniversary, we gathered a panel of data protection experts to discuss the effect of the Regulation and the future of data protection. Compliance fatigue’.

GDPR 70

Researcher Publishes Four Zero-Day Exploits in Three Days

Dark Reading

The exploits for local privilege escalation vulnerabilities in Windows could be integrated into malware before Microsoft gets a chance to fix the issues

98

Cinco formas de traducir los retrasos aéreos en experiencias positivas

DXC Technology

Las aerolíneas saben muy bien que habrá retrasos. Pero aún siendo inevitables, hay formas de traducirlos en experiencias positivas. Todas ellas cuentan con datos comerciales muy valiosos (de los comercios del aeropuerto, áreas de descanso y del comportamiento de los viajeros) en este recinto acotado. Conocen sus preferencias. Con esta información, pueden mejorar mucho los […]. Analytics Travel, Transportation & Hospitality airlines customer experience

Shade Ransomware Expands to U.S. Targets

Threatpost

Coming to America: The Shade ransomware, which has historically targeted Russian victims, was recently spotted expanding its sights.

Amazon is working on a wearable device that reads human emotions

Information Management Resources

Designed to work with a smartphone app, the device has microphones paired with software that can discern the wearer’s emotional state from the sound of his or her voice. Wearable technology Data management Amazon

Data 90

The Julian Assange Espionage Act Charges Target Press Freedom

WIRED Threat Level

By invoking the Espionage Act against Julian Assange, the Justice Department will effectively put national security journalism on trial. Security Security / National Security

Russian Nation-State Hacking Unit's Tools Get More Fancy

Dark Reading

APT28/Fancy Bear has expanded its repertoire to more than 30 commands for infecting systems, executing code, and reconnaissance, researchers have found

Tools 86

Lowe's offers lesson in perils of outdated tech

Information Management Resources

The retailer was forced to cut its full-year guidance largely because of problems resulting from clunky behind-the-scenes systems that help it set its prices. Hardware and software Data strategy Lowe's

One Year into GDPR: What's Changed?

eSecurity Planet

A year after implementation, the European data privacy regulation has improved data handling, but the biggest changes may be yet to come

Calibration Attack Drills Down on iPhone, Pixel Users

Threatpost

A new way of tracking mobile users creates a globally unique device fingerprint that browsers and other protections can't stop.

The Danger in Assange’s Charges, a Memory Experiment, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / National Security

SPAIN: New Data Protection Act (partly) nullified by the Constitutional Court

DLA Piper Privacy Matters

On 22 May 2019 it was disclosed that the Spanish Constitutional Court had decided to nullify indent 2 of the final provision 3 of the new Spanish Data Protection Act, less than six months after becoming effective.

Get a sneak peek of advances in OpenText Content Suite and Extended ECM

OpenText Information Management

New releases of OpenText™ Content Suite and OpenText™ Extended ECM are on the way! At Enterprise World in Toronto, attendees will learn about all the recently released and upcoming features for Content Suite and Extended ECM, complete with demos and interactive sessions hosted by the experts behind the product. What’s new in OpenText Content Suite … The post Get a sneak peek of advances in OpenText Content Suite and Extended ECM appeared first on OpenText Blogs.

ECM 56

The Institutes' RiskStream Collaborative goes beyond blockchain

Information Management Resources

Director of the former RiskBlock Alliance discusses name change and expanded digital focus including IoT, AI and analytics. Blockchain Internet of things Artificial intelligence Machine learning Analytics