Sat.Jun 08, 2019 - Fri.Jun 14, 2019

Why Data Literacy Matters


Growing up in a multilingual country, I know firsthand how learning a second, third, or fourth language can help connect you to more people and experiences. For knowledge workers today, the ability to “speak” data, just as one might speak a new language, is an invaluable skill.

From architecture to code: A primer on how to get it right

Information Management Resources

Getting an architectural artifact translated into a practical system implementation has always been problematic, but it doesn’t have to be. Software professionals Software development Software architects Hardware and software

IT 47

Computers and Video Surveillance

Schneier on Security

It used to be that surveillance cameras were passive. Maybe they just recorded, and no one looked at the video unless they needed to. Maybe a bored guard watched a dozen different screens, scanning for something interesting.

Microsoft Patch Tuesday, June 2019 Edition

Krebs on Security

Microsoft on Tuesday released updates to fix 88 security vulnerabilities in its Windows operating systems and related software. The most dangerous of these include four flaws for which there is already exploit code available.

IT 285

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Unsecured Database Leaves 8.4TB of Email Metadata Exposed

Data Breach Today

Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4TB of email metadata.

More Trending

Massive DDos attack hit Telegram, company says most of junk traffic is from China

Security Affairs

Encrypted messaging service Telegram was hit by a major DDoS attack apparently originated from China, likely linked to the ongoing political unrest in Hong Kong.

The Next Big Privacy Hurdle? Teaching AI to Forget

WIRED Threat Level

Instagram Shows Kids' Contact Details in Plain Sight

Data Breach Today

Sharing Email Address, Phone Numbers May Be Risky, Experts Say Tens of thousands of minors on Instagram expose their email addresses and phone numbers, which child-safety and privacy experts say is worrisome.

Rock-Paper-Scissors Robot

Schneier on Security

How in the world did I not know about this for three years? Researchers at the University of Tokyo have developed a robot that always wins at rock-paper-scissors.

Paper 114

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Back in 2013, I was beginning to get the sense that data breaches were becoming a big thing. The prevalence of them seemed to be really ramping up as was the impact they were having on those of us that found ourselves in them, myself included.

Radiohead Dropped 18 Hours of Unreleased Music to Screw Pirates

WIRED Threat Level

You can listen to the _OK Computer_–era tracks right here. Security Security / Cyberattacks and Hacks

Unsecured Database Leaves 8.4 TB of Email Metadata Exposed

Data Breach Today

Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4 TB of email metadata.

Ransomware paralyzed production for at least a week at ASCO factories

Security Affairs

Malware infections could be devastating for production environments, a ransomware infection halts production operations for days at airplane parts manufacturer ASCO. ASCO , is of the world’s largest manufacturers of aerospace components.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Report on the Stalkerware Industry

Schneier on Security

Citizen Lab just published an excellent report on the stalkerware industry. citizenlab gdpr privacy reports surveillance

GDPR 112

Cloudflare’s Five-Year Project to Protect Nonprofits Online

WIRED Threat Level

Cloudflare's Project Galileo has helped vulnerable organizations fend off DDoS and other attacks for the last five years. Security Security / Security News

US Border License Plate and Traveler Photos Exposed

Data Breach Today

Hack Attack Victim May Be Contractor Perceptics; Stolen Data Spotted on Dark Web License plate and traveler photos collected at the U.S. border have been compromised after a federal government subcontractor was hacked.

RAMBleed, a new Side-Channel Attack that allows stealing sensitive data

Security Affairs

Security researchers disclosed the details of RAMBleed, a new type of side-channel attack on DRAM that can allow stealing sensitive data from a memory.

Paper 113

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Video Surveillance by Computer

Schneier on Security

The ACLU's Jay Stanley has just published a fantastic report: " The Dawn of Robot Surveillance " (blog post here ) Basically, it lays out a future of ubiquitous video cameras watched by increasingly sophisticated video analytics software, and discusses the potential harms to society.

Hackers Stole a Border Agency Database of Traveler Photos

WIRED Threat Level

In compromising a Customs and Border Protection subcontractor, hackers make off with photos of travelers and license plates. Security Security / Cyberattacks and Hacks

Multiple Class Action Lawsuits Filed in AMCA Breach

Data Breach Today

Millions of Exim mail servers vulnerable to cyber attacks

Security Affairs

Millions of Exim mail servers are exposed to attacks due to a critical vulnerability that makes it possible for unauthenticated remote attackers to execute arbitrary commands. A critical vulnerability affects versions 4.87 to 4.91 of the Exim mail transfer agent (MTA) software.

IT 114

Employment Scam

Schneier on Security

Interesting story of an old-school remote-deposit capture fraud scam, wrapped up in a fake employment scam. Slashdot thread. employment fraud scams


Cryptocurrency Company Hacks Itself Before Hackers Can Hack It

WIRED Threat Level

Microsoft deletes its facial recognition database, hackers hit health care, and more of the week's top security news. Security Security / Security News

IT 114

Are You APT-Ready? The Role of Breach/Attack Simulation

Data Breach Today

Critical RCE affects older Diebold Nixdorf ATMs

Security Affairs

Automated teller machine vendor Diebold Nixdorf has released security updates to address a remote code execution vulnerability in older ATMs.

Workshop on the Economics of Information Security

Schneier on Security

Last week, I hosted the eighteenth Workshop on the Economics of Information Security at Harvard. Ross Anderson liveblogged the talks. conferences economicsofsecurity securityconferences

Hackers Target US Power, Amazon Clones a Neighborhood, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / Cyberattacks and Hacks