Sat.Jul 27, 2019 - Fri.Aug 02, 2019

The psychology behind phishing attacks

IT Governance

With 3.4 billion malicious emails sent every day , phishing poses a massive risk to organisations of all sizes. However, the threat doesn’t just come from the volume of scams, but their idiosyncrasy.

Why Every Organization Needs an Incident Response Plan

Dark Reading

OK, perhaps that's self-evident, so how come it far too often still takes an incident to trigger planning

IT 108

How Brexit Impacts the Future of Europe’s Cybersecurity Posture

Thales eSecurity

The British parliament has been unable to agree the exit package from the European Union. With the possibility of a “no deal” departure looming, EU leaders have granted a six-month extension to Brexit day.

JPMorgan Chase Develops 'Early Warning System'

Data Breach Today

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Capital One Data Theft Impacts 106M People

Krebs on Security

Federal prosecutors this week charged a Seattle woman with stealing data from more than 100 million credit applications made with Capital One Financial Corp. Incredibly, much of this breach played out publicly over several months on social media and other open online platforms.

Data 242

More Trending

List of data breaches and cyber attacks in July 2019 – 2.2 billion records leaked

IT Governance

Remember after last month’s relatively serene cyber security scene we said this wasn’t the beginning of the GDPRevolution ? July was bound to be a bounce-back month, but we couldn’t have expected the frighteningly high total of 2,266,042,039 breached records.

Woman Arrested in Massive Capital One Data Breach

Data Breach Today

Authorities Allege Paige A. Thompson Referenced Stolen Files on GitHub A Seattle-area woman has been charged with accessing tens of millions of Capital One credit card applications after allegedly taking advantage of a misconfigured firewall.

What We Can Learn from the Capital One Hack

Krebs on Security

On Monday, a former Amazon employee was arrested and charged with stealing more than 100 million consumer applications for credit from Capital One.

Despite growing risks, most organizations short-change security training, basics

Information Management Resources

While it’s perfectly understandable that every business has to operate on a specific budget, it’s very odd that, when the money gets tight, IT almost exclusively gets the short end of the stick. Data security Cyber security Cyber attacks

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Welcoming the Irish Government to Have I Been Pwned

Troy Hunt

Over the last year and a bit I've been working to make more data in HIBP freely available to governments around the world that want to monitor their own exposure in data breaches.

Capital One: Where Did the Bank Fail on Defense?

Data Breach Today

Experts Say Bank May Have Made Several Errors The cause of Capital One's breach is known. But experts say the incident still raises questions over why Capital One held onto personal data so long and if the bank was adequately monitoring administrator accounts

Data 231

No Jail Time for “WannaCry Hero”

Krebs on Security

Europe's data privacy rules hurt small firms, not Google and Facebook

Information Management Resources

Evidence mounts that the GDPR as applied today hurts smaller firms and has no effect on tech giants, which are the least interested in preserving user privacy. GDPR Data privacy Data privacy rules Data security

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Android devices could be hacked by playing a video due to CVE-2019-2107 flaw

Security Affairs

Watch out! Playing a video on Android devices could be a dangerous operation due to a critical CVE-2019-2107 RCE flaw in Android OS between version 7.0 and 9.0.

Video 114

Visa Contactless Cards Vulnerable to Fraudsters: Report

Data Breach Today

Researchers Say Proxy Machine Can Bypass Transaction Limits Via Man-in-the-Middle Attack A newly discovered vulnerability in Visa's contactless payment cards could allow fraudsters to bypass payment limits of 30 British pounds ($37) at U.K.

219
219

More on Backdooring (or Not) WhatsApp

Schneier on Security

Yesterday, I blogged about a Facebook plan to backdoor WhatsApp by adding client-side scanning and filtering. It seems that I was wrong, and there are no such plans.

Shifting compliance to effectively measure risk and balancing GRC mandates

Information Management Resources

In order to survive progressively new audits, governance, risk and compliance programs need to focus on proving that solutions are in place as safeguards to protect data. Data security Data governance Cyber security

How to Reverse Engineer, Sniff & Bruteforce Vulnerable RF Adult Toys with WHID Elite

Security Affairs

Expert Luca Bongiorni was looking for new targets to test WHID Elite’s Radio Hacking capabilities and found an interesting one: Electrocuting C**k Ring.

How To 109

GAO Blasts Cybersecurity Efforts of Federal Agencies

Data Breach Today

ROUNDTABLE: Huge Capital One breach shows too little is being done to preserve data privacy

The Last Watchdog

Company officials at Capital One Financial Corp ought to have a crystal clear idea of what to expect next — after admitting to have allowed a gargantuan data breach. Capital One’s mea culpa coincided with the FBI’s early morning raid of a Seattle residence to arrest Paige Thompson. Authorities charged the 33-year-old former Amazon software engineer with masterminding the hack.

Mitigating the artifacts of machine learning bias

Information Management Resources

As more departments of business adopt machine learning, we’re finding that ethical decision-making is at risk due to bias within the algorithm involved. Artificial intelligence Machine learning Data strategy

Risk 112

Over 23 million stolen payment card data traded on the Dark Web in H1 2019

Security Affairs

According to a report published by cyber security firm Sixgill data for over 23 million payment card were on offer in underground forums in the first half of 2019. .

Sales 109

NY Attorney General Investigates Capital One; Lawsuits Loom

Data Breach Today

Questions Remain Over How Hacker Breached Bank Files In what's likely the first of many investigations, the New York attorney general's office announced late Tuesday that it's launching a Capital One probe following the disclosure that over 100 million U.S.

Data 203

Disabling Security Cameras with Lasers

Schneier on Security

There's a really interesting video of protesters in Hong Kong using some sort of laser to disable security cameras. I know nothing more about the technologies involved

Video 100

4 top data security and risk trends, according to Gartner

Information Management Resources

It’s an increasingly difficult challenge for many IT and security executives. One good practice is to stay up on the latest cyber security trends and potential solutions. Data security Data privacy Data strategy

Trends 112

Hackers inject Magecart multi-gateway skimmer in fake Google domains

Security Affairs

Attackers deployed a Magecart credit card skimmer script into fake Google domains used to trick visitors into making online transactions.

CMS 110

Mobile Ransomware Targets Android Users Through SMS

Data Breach Today

Filecoder.C Can Infect Multiple Contacts With Malicious Links A newly discovered mobile ransomware strain called Filecoder.C

Revving up the AMC Technical Blogs

Micro Focus

With so much valuable technology available from our modernization solution, we’re often asked to provide greater insights. Now, as Derek Britton reveals, we’ve put all the latest AMC practitioner blogs in a single location.

Blog 100

How IoT is revolutionizing facilities data management

Information Management Resources

IoT is finally entering its rightful place as a fully fledged enterprise technology that is revolutionizing many different industries and business functions. Internet of things Data management Mobile technology

IoT 104

Crooks used rare Steganography technique to hack fully patched websites in Latin America

Security Affairs

Experts at Trustwave observed threat actors using a rare technique to compromise fully patched websites.

GDPR 109

No More Ransom Thwarts $108 Million in Ill-Gotten Profits

Data Breach Today

Europol Marks Three-Year Anniversary of Non-Profit Security Initiative Three years since its launch, the No More Ransom portal has assisted 200,000 ransomware victims and stopped $108 million from being paid in ransom, according to Europol - one of its founding partners