Sat.Jun 22, 2019 - Fri.Jun 28, 2019

The Need for Strong Federal Data Privacy Legislation

Informatica

Consumers in the United States have finally begun to pay attention to the privacy of their data. The spring of 2018, which saw the Cambridge Analytica scandal break and Mark Zuckerberg testify before the U.S. Congress, seems to have been a tipping point.

BEST PRACTICES: Do you know the last time you were socially engineered?

The Last Watchdog

192
192

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

4 eye-opening facts about phishing

IT Governance

You probably know what phishing is. It’s been around almost as long as the Internet, and everyone from your employer to Facebook provides warnings about how to identify and report such scams. But are you aware of how extensive phishing is?

Second Florida City Pays Up Following Ransomware Attack

Data Breach Today

After Struggling With Recovery, City Negotiates a Ransom Payment A second small city in Florida is paying off cybercriminals to recover from a ransomware attack that crippled the municipality's local network. How much did Lake City agree to pay, and how much of that was covered by insurance

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Breach at Cloud Solution Provider PCM Inc.

Krebs on Security

A digital intrusion at PCM Inc. , a major U.S.-based based cloud solution provider, allowed hackers to access email and file sharing systems for some of the company’s clients, KrebsOnSecurity has learned. El Segundo, Calif.

Cloud 221

More Trending

List of data breaches and cyber attacks in June 2019 ­– 39.7 million records leaked

IT Governance

After a rampant start to the year for data breaches and cyber attacks, it’s about time we went one month without at least one massive security incident.

Ex-Equifax CIO Gets 4-Month Prison Term for Insider Trading

Data Breach Today

Prosecutors Say Jun Ying Sold Stock Before Data Breach Was Made Public A former Equifax CIO who sold his stock in the company after learning about its 2017 data breach several months before the public and government agencies were informed has been sentenced to four months in prison for insider trading.

Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers

Krebs on Security

It might be difficult to fathom how this isn’t already mandatory, but Microsoft Corp. says it will soon force all Cloud Solution Providers (CSPs) that help companies manage their Office365 accounts to use multi-factor authentication.

NASA hacked! An unauthorized Raspberry Pi connected to its network was the entry point

Security Affairs

NASA Office of Inspector General revealed that the Agency’s network was hacked in April 2018, intruders exfiltrated roughly 500 MB of data related to Mars missions.

IT 114

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

I'm Leaving IBM

Schneier on Security

Today is my last day at IBM. If you've been following along, IBM bought my startup Resilient Systems in Spring 2016. Since then, I have been with IBM, holding the nicely ambiguous title of "Special Advisor." As of the end of the month, I will be back on my own.

Access 113

Wipro Attack Tied to Larger Phishing Campaign: Analysis

Data Breach Today

Tracing the Supply Chain Attack on Android

Krebs on Security

Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices.

Anonymous Belgium hacker identified after dropping USB drive while throwing Molotov cocktail

Security Affairs

Belgium police have identified a member of the Anonymous Belgium collective while investigating an arson case at a local bank. The Anonymous member is a 35-year-old man from Roeselare, Belgium, was arrested after throwing a Molotov cocktail at the Crelan Bank office in Rumbeke, back in 2014.

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

MageCart Launches Customizable Campaign

Dark Reading

A tool new to MageCart bolsters the group's ability to evade detection and steal data

113
113

Chinese Hackers Play Operator With Global Telcos

Data Breach Today

Tracing the Supply Chain Attack on Android

Krebs on Security

Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn’t exactly name those responsible, but said it believes the offending vendor uses the nicknames “ Yehuo ” or “ Blazefire.”

Silex malware bricks thousands of IoT devices in a few hours

Security Affairs

Security experts warn of a new piece of the Silex malware that is bricking thousands of IoT devices, and the situation could rapidly go worse.

IoT 113

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

New Linux Worm Attacks IoT Devices

Dark Reading

Silex has 'bricked' more than 2,000 Linux-based IoT devices so far

IoT 113

Alleged AlphaBay Moderator Faces Racketeering Charges

Data Breach Today

Investigation Into Shuttered Darknet Site Continues An alleged moderator of the AlphaBay underground marketplace has been indicted for facilitating sales on the darknet site before law enforcement shut it down

Sales 229

The Infrastructure Mess Causing Countless Internet Outages

WIRED Threat Level

You may not have heard of the Border Gateway Protocol, but you definitely know when it goes wrong. Security Security / Security News

IT 109

Lake City agreed to pay $500,000 in ransom, is the second case in Florida in a week

Security Affairs

A few days ago, Riviera Beach City agreed to pay $600,000 in ransom, now a Lake City, another city in Florida, agreed to do the same after a ransomware attack.

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

How to Avoid Becoming the Next Riviera Beach

Dark Reading

Be prepared by following these five steps so you don't have to pay a ransom to get your data back

113
113

DHS: Conflict With Iran Could Spur 'Wiper' Attacks

Data Breach Today

US Reportedly Responded to Drone Downing With Cyber Strike Iran is increasing its malicious cyber activity against the U.S, which could manifest in attacks that render computers unusable, a top U.S. cybersecurity official says. The warning comes after the U.S.

iPhone Apps Surreptitiously Communicated with Unknown Servers

Schneier on Security

Long news article ( alternate source ) on iPhone privacy, specifically the enormous amount of data your apps are collecting without your knowledge.

Hundreds of million computers potentially exposed to hack due to a flaw in PC-Doctor component

Security Affairs

Hundreds of million computers from many vendors may have been exposed to hack due to a serious flaw in PC-Doctor software.

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

How Hackers Infiltrate Open Source Projects

Dark Reading

The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code

111
111

Certain Insulin Pumps Recalled Due to Cybersecurity Issues

Data Breach Today

FDA Warns Patients About Medtronic's Voluntary Recall of Some Wireless Pumps In a rare move, the Food and Drug Administration has warned patients that medical device maker Medtronic has issued a voluntary recall of certain wireless insulin pumps due to cybersecurity vulnerabilities that cannot be adequately patched.

Announcing Enterprise Suite 5.0

Micro Focus

Rapid mainframe app delivery, with even greater scale and skill Digital means change and change, without care, means risk.

Risk 108