Sat.Jan 26, 2019 - Fri.Feb 01, 2019

Google Takes Its First Steps Toward Killing the URL

WIRED Threat Level

Google wants to get rid of URLs. But first, it needs to show you why. Security

IT 87

Apple Rushes to Fix Serious FaceTime Eavesdropping Flaw

Data Breach Today

Callers Can Hear and See Recipients Before They Pick Up Apple is preparing a fix for a serious flaw in its FaceTime software for making audio and video calls. The software can be abused to remotely eavesdrop on and view a recipient, without their knowledge, even if they don't answer the call

Video 265

MY TAKE: 3 privacy and security habits each individual has a responsibility to embrace

The Last Watchdog

Would you back out of a driveway without first buckling up, checking the rear view mirror and glancing behind to double check that the way is clear? Consider that most of us spend more time navigating the Internet on our laptops and smartphones than we do behind the wheel of a car.

250 Webstresser Users to Face Legal Action

Krebs on Security

More than 250 customers of a popular and powerful online attack-for-hire service that was dismantled by authorities in 2018 are expected to face legal action for the damage they caused, according to Europol , the European Union’s law enforcement agency. In April 2018, investigators in the U.S.,

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Researchers published the PoC exploit code for Linux SystemD bugs

Security Affairs

Security researchers at the security firm Capsule8 have published exploit code for the vulnerabilities in Linux systemD disclosed in January. Security researchers at the security firm Capsule8 have published exploit code for the vulnerabilities in Linux systemD disclosed in January.

More Trending

MY TAKE: Why companies should care about 2.2 billion stolen credentials circulating in easy reach

The Last Watchdog

Some chilling hard evidence has surfaced illustrating where stolen personal information ultimately ends up, once it has flowed through the nether reaches of the cyber underground. Wired magazine reported this week on findings by independent security researchers who have been tracking the wide open availability of a massive cache of some 2.2 billion stolen usernames, passwords and other personal data. Related: Massive Marriott breach closes out 2018.

Japanese Government Will Hack Citizens' IoT Devices

Schneier on Security

IoT 103

Exclusive: spreading CSV Malware via Google Sheets

Security Affairs

Cyber security expert Marco Ramilli, founder of Yoroi ,discovered a way to spread CSV malware via Google Sheets … but Big G says it is an Intended behavior. CSV file could be a malware carrier and if interpreted by Microsoft Excel it could become a malware executor !

Apple Slams Facebook for Monitoring App Given to Minors

Data Breach Today

Access 241

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Late last year, Atrium Health disclosed it lost sensitive data for some 2.65 million patients when hackers gained unauthorized access to databases operated by a third-party billing vendor.

Tools 120

Happy Data Privacy Day: City Planning Now Mines Everyone’s Data All the Time

Adam Levin

Sidewalk Labs, a subsidiary of Google’s parent company Alphabet, is the go-to story for Data Privacy Day with its new “user-friendly” tool called Replica, which allows city planners see “how, when, and where people travel in urban areas.”.

Mining 102

Anatova ransomware – Expert believe it will be a dangerous threat

Security Affairs

Security experts at McAfee have discovered a new malware, dubbed Anatova ransomware, that has been spotted infecting computers worldwide. The name Anatova is based on a name in the ransom note that is dropped on the infected systems.

Privacy: Several States Consider New Laws

Data Breach Today

After California Takes Bold Action, Other States Ponder Privacy Protection Measures Several U.S. states are considering new legislation to shore up consumer data privacy laws in the wake of California passing strict privacy requirements last year. What's in the pipeline

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

MY TAKE: ‘Bashe’ attack theorizes a $200 billion ransomware raid using NSA-class cyber weapons

The Last Watchdog

A report co-sponsored by Lloyd’s of London paints a chilling scenario for how a worldwide cyberattack could trigger economic losses of some $200 billion for companies and government agencies ill-equipped to deflect a very plausible ransomware attack designed to sweep across the globe. Related: U.S. cyber foes exploit government shutdown.

Security Flaws in Children's Smart Watches

Schneier on Security

A year ago , the Norwegian Consumer Council published an excellent security analysis of children's GPS-connected smart watches. The security was terrible. Not only could parents track the children, anyone else could also track the children.

Using steganography to obfuscate PDF exploits

Security Affairs

Experts discovered PDF exploit that was using steganography to hide malicious JavaScript code in images embedded in PDF files. The exploit analysis firm EdgeSpot recently discovered PDF exploit that was using steganography to hide malicious JavaScript code in images embedded in PDF files.

Yahoo's Proposed Data Breach Lawsuit Settlement: Rejected

Data Breach Today

OpenText Buys Catalyst Repository Systems, Inc.

OpenText Information Management

I’m pleased to announce that OpenText has acquired Catalyst Repository Systems, Inc., a leading provider of cloud-based eDiscovery software for large-scale discovery and regulatory compliance.

Cloud 97

8 key elements of an effective staff awareness training programme

IT Governance

Hackers are targeting Cisco RV320/RV325, over 9K routers exposed online

Security Affairs

Cisco released security updates to address security flaws in several products including Small Business RV320/RV325 routers and hackers are already targeting them. The tech giant addressed two serious issues in Cisco’s Small Business RV320 and RV325 routers.

Airbus Hacked: Aircraft Giant Discloses Data Breach

Data Breach Today

Investigation Underway After Attack Compromises Employee Details Airbus says it suffered a hack attack, leading to a breach of "contact and IT identification details" for at least some of its EU employees.

Why capture is a key foundation of information management strategies

OpenText Information Management

Today’s number one business challenge is keeping track of information.

DevOps adoption rises to meet business, data privacy demands

Information Management Resources

DevOps adoption is increasing and spreading across organizations, bringing together application and database development, delivering business benefits, and helping companies comply with data privacy regulations. Hardware and software Data management Data strategy

Imperva mitigated DDoS attack generated 500 Million Packets per Second, the largest ever

Security Affairs

Imperva mitigated a SYN flood DDoS attack against one of its clients that exceeded 500 million packets per second, this is the largest ever.

Tools 106

Intelligence Chiefs Expect More Cyberattacks Against US

Data Breach Today

China, Russia, Iran and North Korea Pose Increasing Risk, Congress Hears Efforts to exploit U.S.

Risk 206

Wake up to the reality of the GDPR: What you need to know about compliance

IT Governance

With a mammoth GDPR fine handed out to Google last week, it’s time for organisations to reassess their understanding of the Regulation. We’re through the eye of the GDPR (General Data Protection Regulation) storm.


How do you best talk to your board about cybersecurity?

Information Management Resources

While the question lingers, substantial progress has been made — something we uncovered in our interviews of almost 100 senior security leaders and board members from around the globe. Data security Cyber security Cyber attacks

Hackers compromise WordPress sites via Zero-Day flaws in Total Donations plugin

Security Affairs

Security experts at Wordfence security firms discovered WordPress Sites compromised via Zero-Day vulnerabilities in Total Donations Plugin.

CMS 106

Brexit Preparation: Get Personal Data Flows in Order

Data Breach Today

Privacy Watchdog Orders Businesses to Prepare as UK Teeters on Edge of 'No Deal' As the U.K.

List of data breaches and cyber attacks in January 2019 – 1,769,185,063 records leaked

IT Governance

The first of this year’s monthly lists amounts to an impressive 1,769,185,063 leaked records, which – let’s be honest – isn’t the greatest start to the year. Although there will be some debate about the usefulness of including the 772,904,991 records from the Collection #1 breach – which comprises data stolen from a number of historic data breaches – even without them, the number of breached records still stands at just under 1 billion records for January 2019.

Four data management trends that will help driving business acceleration

Information Management Resources

These prevailing trends will help IT teams best manage data, be fully aligned with the business’ goals, and have direct impact on future operations of the enterprise. Data management Data strategy Data transparency