Sat.Jun 22, 2019 - Fri.Jun 28, 2019

The Need for Strong Federal Data Privacy Legislation


Consumers in the United States have finally begun to pay attention to the privacy of their data. The spring of 2018, which saw the Cambridge Analytica scandal break and Mark Zuckerberg testify before the U.S. Congress, seems to have been a tipping point.


BEST PRACTICES: Do you know the last time you were socially engineered?

The Last Watchdog

This spring marked the 20th anniversary of the Melissa email virus , which spread around the globe, setting the stage for social engineering to become what it is today.

4 eye-opening facts about phishing

IT Governance

You probably know what phishing is. It’s been around almost as long as the Internet, and everyone from your employer to Facebook provides warnings about how to identify and report such scams. But are you aware of how extensive phishing is?

Second Florida City Pays Up Following Ransomware Attack

Data Breach Today

After Struggling With Recovery, City Negotiates a Ransom Payment A second small city in Florida is paying off cybercriminals to recover from a ransomware attack that crippled the municipality's local network. How much did Lake City agree to pay, and how much of that was covered by insurance

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Breach at Cloud Solution Provider PCM Inc.

Krebs on Security

A digital intrusion at PCM Inc. , a major U.S.-based based cloud solution provider, allowed hackers to access email and file sharing systems for some of the company’s clients, KrebsOnSecurity has learned. El Segundo, Calif.

Cloud 228

More Trending

List of data breaches and cyber attacks in June 2019 ­– 39.7 million records leaked

IT Governance

After a rampant start to the year for data breaches and cyber attacks, it’s about time we went one month without at least one massive security incident.

Ex-Equifax CIO Gets 4-Month Prison Term for Insider Trading

Data Breach Today

Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers

Krebs on Security

It might be difficult to fathom how this isn’t already mandatory, but Microsoft Corp. says it will soon force all Cloud Solution Providers (CSPs) that help companies manage their Office365 accounts to use multi-factor authentication.

I'm Leaving IBM

Schneier on Security

Today is my last day at IBM. If you've been following along, IBM bought my startup Resilient Systems in Spring 2016. Since then, I have been with IBM, holding the nicely ambiguous title of "Special Advisor." As of the end of the month, I will be back on my own.

Access 112

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Silex malware bricks thousands of IoT devices in a few hours

Security Affairs

Security experts warn of a new piece of the Silex malware that is bricking thousands of IoT devices, and the situation could rapidly go worse.

IoT 112

Chinese Hackers Play Operator With Global Telcos

Data Breach Today

Tracing the Supply Chain Attack on Android

Krebs on Security

Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn’t exactly name those responsible, but said it believes the offending vendor uses the nicknames “ Yehuo ” or “ Blazefire.”

Cloud 179

What does it mean to be Canadian?

OpenText Information Management

On this Canada Day, I thought of no better question to ask myself than: “What does it mean to be Canadian?” For nearly a decade, I have served as CEO and CTO at OpenText, Canada’s largest software company and member of the TSX-60.

IT 106

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

NASA hacked! An unauthorized Raspberry Pi connected to its network was the entry point

Security Affairs

NASA Office of Inspector General revealed that the Agency’s network was hacked in April 2018, intruders exfiltrated roughly 500 MB of data related to Mars missions.

IT 114

Wipro Attack Tied to Larger Phishing Campaign: Analysis

Data Breach Today

Tracing the Supply Chain Attack on Android

Krebs on Security

Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices.

Cloud 177

The Infrastructure Mess Causing Countless Internet Outages

WIRED Threat Level

You may not have heard of the Border Gateway Protocol, but you definitely know when it goes wrong. Security Security / Security News

Anonymous Belgium hacker identified after dropping USB drive while throwing Molotov cocktail

Security Affairs

Belgium police have identified a member of the Anonymous Belgium collective while investigating an arson case at a local bank. The Anonymous member is a 35-year-old man from Roeselare, Belgium, was arrested after throwing a Molotov cocktail at the Crelan Bank office in Rumbeke, back in 2014.

Alleged AlphaBay Moderator Faces Racketeering Charges

Data Breach Today

Investigation Into Shuttered Darknet Site Continues An alleged moderator of the AlphaBay underground marketplace has been indicted for facilitating sales on the darknet site before law enforcement shut it down

Sales 229

iPhone Apps Surreptitiously Communicated with Unknown Servers

Schneier on Security

Long news article ( alternate source ) on iPhone privacy, specifically the enormous amount of data your apps are collecting without your knowledge.

Five things you don’t want to miss at Enterprise World 2019

OpenText Information Management

With Enterprise World 2019 fast approaching, we’re counting down the days until the conference kicks off in Toronto! Our annual user conference is set to be bigger and better than ever this year.

Lake City agreed to pay $500,000 in ransom, is the second case in Florida in a week

Security Affairs

A few days ago, Riviera Beach City agreed to pay $600,000 in ransom, now a Lake City, another city in Florida, agreed to do the same after a ransomware attack.

DHS: Conflict With Iran Could Spur 'Wiper' Attacks

Data Breach Today

US Reportedly Responded to Drone Downing With Cyber Strike Iran is increasing its malicious cyber activity against the U.S, which could manifest in attacks that render computers unusable, a top U.S. cybersecurity official says. The warning comes after the U.S.

Announcing Enterprise Suite 5.0

Micro Focus

Rapid mainframe app delivery, with even greater scale and skill Digital means change and change, without care, means risk.

Risk 100

What is angler phishing?

IT Governance

A version of this blog was originally published on 19 June 2017. Many of us live out whole lives on Facebook, Twitter, Instagram and LinkedIn, publicising our thoughts, interacting with friends, strangers and businesses, and keeping abreast of current affairs.

US-based Cloud Solution Provider PCM Inc. hacked

Security Affairs

Hackers breached the infrastructure of PCM Inc. , one of the major U.S.-based based cloud solution provider, and accessed to email and file sharing systems for some of its clients. Hackers breached the infrastructure of PCM Inc., one of the major U. based cloud solution provider.

Cloud 105

Certain Insulin Pumps Recalled Due to Cybersecurity Issues

Data Breach Today

Election Security

Schneier on Security

Stanford University's Cyber Policy Center has published a long report on the security of US elections. Summary: it's not good. nationalsecuritypolicy reports securityengineering threatmodels voting

Senate Republicans Block Election Security Bill

Adam Levin

A bill that would provide a billion dollars to states for election security was blocked by Senate Republicans. The Election Security Act, proposed by presidential candidate Senator Amy Klobuchar (D-Minn.),

Paper 87

Trump secretly ordered cyber attacks against Iran missile systems

Security Affairs

The United States launched a series of cyber attacks on Iran after the Iranian military has downed an American surveillance drone. The military response to Iran, after the Iranian army has downed an American surveillance drone, started from the cyberspace.

Report: Huawei's Firmware Riddled With Problems

Data Breach Today

Huawei Has a 'Weak Security Posture,' Cybersecurity Firm Contends The firmware of more than 500 Huawei networking products is riddled with security weaknesses that make the vendor risky to use for 5G networks, a new report contends.

Study 201