Sat.Aug 03, 2019 - Fri.Aug 09, 2019

Debunking the Top 5 Myths about Office 365 Backup & Recovery

Quest Software

Learn about the common misconceptions surrounding Office 365 data protection and the truth behind the myths.( read more ). office 365 backup

Data 42

Capital One's Breach May Be a Server Side Request Forgery

Data Breach Today

SSRF Appears to Fit Scenario, But Details Are Slim Capital One's enormous data breach is a subject of intense scrutiny as well as fear. A definitive post mortem is likely months away. But security professionals have ideas as to how the breach was achieved and the weaknesses that led to it

When Perceived Cybersecurity Risk Outweighs Reality

Dark Reading

Teams need to manage perceived risks so they can focus on fighting the real fires

Risk 96

Who Owns Your Wireless Service? Crooks Do.

Krebs on Security

Incessantly annoying and fraudulent robocalls. Corrupt wireless company employees taking hundreds of thousands of dollars in bribes to unlock and hijack mobile phone service. Wireless providers selling real-time customer location data, despite repeated promises to the contrary.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

How to adopt a business-driven data and analytics strategy

Information Management Resources

To succeed, companies need a process that allows data to be transformed into actionable intelligence with an emphasis on business value

More Trending

WhatsApp flaws allow the attackers to manipulate conversations

Security Affairs

Security experts at CheckPoint discovered a series of vulnerabilities in WhatsApp that could be exploited by attackers to tamper with conversations.

Groups 114

The Risk of Weak Online Banking Passwords

Krebs on Security

If you bank online and choose weak or re-used passwords, there’s a decent chance your account could be pilfered by cyberthieves — even if your bank offers multi-factor authentication as part of its login process.

Why big data analytics is crucial to how the IoT works and grows

Information Management Resources

Big data is the fuel of IoT and artificial intelligence that drives the connected things is its brain

Democratic Campaign Group Left 6 Million Emails Exposed

Data Breach Today

UpGuard Finds Misconfigured Amazon S3 Bucket Left Addresses Exposed Security firm UpGuard found that a misconfigured Amazon S3 bucket belonging to the Democratic Senatorial Campaign Committee left the email addresses of more than 6 million U.S. citizens exposed to the internet.

Groups 247

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Hackers Can Break Into an iPhone Just by Sending a Text

WIRED Threat Level

You don't even have to click anything. Security Security / Cyberattacks and Hacks

iNSYNQ Ransom Attack Began With Phishing Email

Krebs on Security

A ransomware outbreak that hit QuickBooks cloud hosting firm iNSYNQ in mid-July appears to have started with an email phishing attack that snared an employee working in sales for the company, KrebsOnSecurity has learned.

Nearly three-quarters of firms now victims of email-based cyber attacks

Information Management Resources

The most common effects cited were loss of employee productivity, downtime and business disruption, and damage to the reputation of the IT team

IT 139

Digital Transformation: Security Best Practices

Data Breach Today

RSA's Holly Rollo on the Importance of Third-Party Risk Management Organizations going through a digital transformation need to make sure they develop a sound third-party risk management strategy, says RSA's Holly Rollo, who discusses best practices

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

3Fun Dating App leaked members’ location and personal details

Security Affairs

The 3Fun dating mobile app for “curious couples & singles” exposed the location of its members and their personal details. What do you think about the privacy of dating apps?

Trump’s Intel Vacancies Put Americans in Danger

WIRED Threat Level

Sue Gordon's departure is the latest sign that US national security might be stretching its leaders too thin—and risks putting the wrong people into roles that American lives depend upon. Security Security / National Security

Risk 102

Visual data discovery tools help organizations make sense of analytics

Information Management Resources

Visual data discovery involves using visualizations and visual exploration of data to find new insights that can help the business

Microsoft: Russia Probes Office Printers, VOIP Phones

Data Breach Today

Points to the Need to Make IoT Devices More Secure Microsoft warned on Monday that Russia-linked attackers are gaining access to corporate networks through poorly configured devices, such as office printers and VOIP phones.

IoT 227

Fraudster stole $870,000 from 2 US universities with spear-phishing mails

Security Affairs

A crook involved in a spear phishing scheme and that was in Kenya is facing up to 20 years in the US federal prison for stealing thousands of dollars from US universities.

Inside the Hidden World of Elevator Phone Phreaking

WIRED Threat Level

Eavesdropping, reprogramming, talking to strangers: Welcome to the harmless and not-so-harmless fun of hacking elevator call boxes. Security Security / Security News

Researchers urge caution in selecting, using algorithms to support analytics

Information Management Resources

A new study of predictive analytics in healthcare asks a provocative question: How can we know it works

Study 122

Mobile-Only Bank Monzo Warns 480,000 Customers to Reset PINs

Data Breach Today

Software Bug Meant Some Numbers Were Stored Unencrypted Monzo, a U.K. mobile-only bank that plans to expand into the U.S.,

A Zero-Day in Steam client for Windows affects over 100 Million users

Security Affairs

Two researchers publicly disclosed a zero-day vulnerability that affects the popular Steam game client for Windows, 0ver 100 million users at risk.

Access 104

AT&T Employees Took Bribes to Unlock Smartphones

Schneier on Security

This wasn't a small operation : A Pakistani man bribed AT&T call-center employees to install malware and unauthorized hardware as part of a scheme to fraudulently unlock cell phones, according to the US Department of Justice.

Pittsburgh Health Data Alliance, AWS join on machine learning effort

Information Management Resources

A consortium of three Pittsburgh institutions, focused on turning big data into better health, is joining forces with Amazon Web Services as part of a machine learning research sponsorship

DOJ: Bribed AT&T Workers Planted Malware on Carrier's Network

Data Breach Today

Scheme Involved Unlocking 2 Million Smartphones to Enable Fraud The Justice Department has indicted two men on charges of paying more than $1 million in bribes to AT&T employees who helped plant malware on the carrier's network and access the company's internal systems.

Access 220

New strain of Clipsa malware launches brute-force attacks on WordPress sites

Security Affairs

Avast spotted a new strain of Clipsa malware that is used to mine and steal cryptocurrencies along with carrying out brute-force attacks on WordPress sites.

Mining 104

A Boeing Code Leak Exposes Security Flaws Deep in a 787's Guts

WIRED Threat Level

One researcher's discovery suggests troubling oversights in Boeing's cybersecurity. Security Security / Security News

The role and attributes of the chief data officer 4.0, according to Gartner

Information Management Resources

A product-centric data and analytics organization requires new skill sets, roles, investment models and the right culture. Chief Data Officer Data science Gartner

New Ursnif Variant Spreads Through Infected Word Documents

Data Breach Today

Banking Trojan Designed to Steal Passwords and Credentials A new variant of the Ursnif Trojan is targeting vulnerable systems in an attempt to steal banking passwords and other credentials.

DRAGONBLOOD flaws allow hacking WPA3 protected WiFi passwords

Security Affairs

Dragonblood researchers found two new weaknesses in WPA3 protocol that could be exploited to hack WPA3 protected WiFi passwords. passwords.

Bipartisan Senate Support Reveals Russian Election Interference

Adam Levin

A report from the Senate Intelligence Committee released last week concluded that the Russian government extensively interfered in U.S. elections from 2014 to at least 2017.