Sat.Jun 22, 2019 - Fri.Jun 28, 2019

The Need for Strong Federal Data Privacy Legislation


Consumers in the United States have finally begun to pay attention to the privacy of their data. The spring of 2018, which saw the Cambridge Analytica scandal break and Mark Zuckerberg testify before the U.S. Congress, seems to have been a tipping point.


BEST PRACTICES: Do you know the last time you were socially engineered?

The Last Watchdog

This spring marked the 20th anniversary of the Melissa email virus , which spread around the globe, setting the stage for social engineering to become what it is today.

4 eye-opening facts about phishing

IT Governance

You probably know what phishing is. It’s been around almost as long as the Internet, and everyone from your employer to Facebook provides warnings about how to identify and report such scams. But are you aware of how extensive phishing is?

Second Florida City Pays Up Following Ransomware Attack

Data Breach Today

After Struggling With Recovery, City Negotiates a Ransom Payment A second small city in Florida is paying off cybercriminals to recover from a ransomware attack that crippled the municipality's local network. How much did Lake City agree to pay, and how much of that was covered by insurance

Contact Center Cloud Migration Done Right

Speaker: Sheila McGee-Smith, Founder and Principal Analyst, McGee-Smith Analytics

Many companies are in the midst of migrating their contact center to the cloud. Understanding how best to execute the transition of premises to cloud is part of that process. Join contact center industry analyst and No Jitter blogger Sheila McGee-Smith as she discussed tried and true best practices for avoiding the potential pitfalls of CX migration.

Breach at Cloud Solution Provider PCM Inc.

Krebs on Security

A digital intrusion at PCM Inc. , a major U.S.-based based cloud solution provider, allowed hackers to access email and file sharing systems for some of the company’s clients, KrebsOnSecurity has learned. El Segundo, Calif.

Cloud 227

More Trending

List of data breaches and cyber attacks in June 2019 ­– 39.7 million records leaked

IT Governance

After a rampant start to the year for data breaches and cyber attacks, it’s about time we went one month without at least one massive security incident.

Ex-Equifax CIO Gets 4-Month Prison Term for Insider Trading

Data Breach Today

Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers

Krebs on Security

It might be difficult to fathom how this isn’t already mandatory, but Microsoft Corp. says it will soon force all Cloud Solution Providers (CSPs) that help companies manage their Office365 accounts to use multi-factor authentication.

I'm Leaving IBM

Schneier on Security

Today is my last day at IBM. If you've been following along, IBM bought my startup Resilient Systems in Spring 2016. Since then, I have been with IBM, holding the nicely ambiguous title of "Special Advisor." As of the end of the month, I will be back on my own.

Access 113

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

The Infrastructure Mess Causing Countless Internet Outages

WIRED Threat Level

You may not have heard of the Border Gateway Protocol, but you definitely know when it goes wrong. Security Security / Security News

Chinese Hackers Play Operator With Global Telcos

Data Breach Today

Tracing the Supply Chain Attack on Android

Krebs on Security

Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices.

Cloud 197

iPhone Apps Surreptitiously Communicated with Unknown Servers

Schneier on Security

Long news article ( alternate source ) on iPhone privacy, specifically the enormous amount of data your apps are collecting without your knowledge.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Announcing Enterprise Suite 5.0

Micro Focus

Rapid mainframe app delivery, with even greater scale and skill Digital means change and change, without care, means risk.

Risk 108

Wipro Attack Tied to Larger Phishing Campaign: Analysis

Data Breach Today

Tracing the Supply Chain Attack on Android

Krebs on Security

Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn’t exactly name those responsible, but said it believes the offending vendor uses the nicknames “ Yehuo ” or “ Blazefire.”

Cloud 179

What does it mean to be Canadian?

OpenText Information Management

On this Canada Day, I thought of no better question to ask myself than: “What does it mean to be Canadian?” For nearly a decade, I have served as CEO and CTO at OpenText, Canada’s largest software company and member of the TSX-60.

IT 106

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

NASA hacked! An unauthorized Raspberry Pi connected to its network was the entry point

Security Affairs

NASA Office of Inspector General revealed that the Agency’s network was hacked in April 2018, intruders exfiltrated roughly 500 MB of data related to Mars missions.

Alleged AlphaBay Moderator Faces Racketeering Charges

Data Breach Today

Investigation Into Shuttered Darknet Site Continues An alleged moderator of the AlphaBay underground marketplace has been indicted for facilitating sales on the darknet site before law enforcement shut it down

Sales 226

What is angler phishing?

IT Governance

A version of this blog was originally published on 19 June 2017. Many of us live out whole lives on Facebook, Twitter, Instagram and LinkedIn, publicising our thoughts, interacting with friends, strangers and businesses, and keeping abreast of current affairs.

Five things you don’t want to miss at Enterprise World 2019

OpenText Information Management

With Enterprise World 2019 fast approaching, we’re counting down the days until the conference kicks off in Toronto! Our annual user conference is set to be bigger and better than ever this year.

Silex malware bricks thousands of IoT devices in a few hours

Security Affairs

Security experts warn of a new piece of the Silex malware that is bricking thousands of IoT devices, and the situation could rapidly go worse.

IoT 99

DHS: Conflict With Iran Could Spur 'Wiper' Attacks

Data Breach Today

US Reportedly Responded to Drone Downing With Cyber Strike Iran is increasing its malicious cyber activity against the U.S, which could manifest in attacks that render computers unusable, a top U.S. cybersecurity official says. The warning comes after the U.S.

Election Security

Schneier on Security

Stanford University's Cyber Policy Center has published a long report on the security of US elections. Summary: it's not good. nationalsecuritypolicy reports securityengineering threatmodels voting

A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata

WIRED Threat Level

In one case, they stole the location and call record data of 20 specific individuals. Security Security / Cyberattacks and Hacks

Anonymous Belgium hacker identified after dropping USB drive while throwing Molotov cocktail

Security Affairs

Belgium police have identified a member of the Anonymous Belgium collective while investigating an arson case at a local bank. The Anonymous member is a 35-year-old man from Roeselare, Belgium, was arrested after throwing a Molotov cocktail at the Crelan Bank office in Rumbeke, back in 2014.

Certain Insulin Pumps Recalled Due to Cybersecurity Issues

Data Breach Today

Spanish Soccer League App Spies on Fans

Schneier on Security

The Spanish Soccer League's smartphone app spies on fans in order to find bars that are illegally streaming its games. The app listens with the microphone for the broadcasts, and then uses geolocation to figure out where the phone is.

Data 93

Best Practices to Gain Advantage with Intelligent Information Management


Organizations around the world invest a great deal of time and money to manage information. The expense of hardware, software, and facilities can add up quickly and costs the average organization somewhere in the range of 3.5% to 7% of annual revenue.

Tips 89

Hundreds of million computers potentially exposed to hack due to a flaw in PC-Doctor component

Security Affairs

Hundreds of million computers from many vendors may have been exposed to hack due to a serious flaw in PC-Doctor software.