Sat.Jul 27, 2019 - Fri.Aug 02, 2019

The psychology behind phishing attacks

IT Governance

Why Every Organization Needs an Incident Response Plan

Dark Reading

OK, perhaps that's self-evident, so how come it far too often still takes an incident to trigger planning

IT 114

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How Brexit Impacts the Future of Europe’s Cybersecurity Posture

Thales eSecurity

The British parliament has been unable to agree the exit package from the European Union. With the possibility of a “no deal” departure looming, EU leaders have granted a six-month extension to Brexit day.

JPMorgan Chase Develops 'Early Warning System'

Data Breach Today

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Capital One Data Theft Impacts 106M People

Krebs on Security

Federal prosecutors this week charged a Seattle woman with stealing data from more than 100 million credit applications made with Capital One Financial Corp. Incredibly, much of this breach played out publicly over several months on social media and other open online platforms.

Cloud 252

More Trending

List of data breaches and cyber attacks in July 2019 – 2.2 billion records leaked

IT Governance

Remember after last month’s relatively serene cyber security scene we said this wasn’t the beginning of the GDPRevolution ? July was bound to be a bounce-back month, but we couldn’t have expected the frighteningly high total of 2,266,042,039 breached records.

Woman Arrested in Massive Capital One Data Breach

Data Breach Today

Authorities Allege Paige A. Thompson Referenced Stolen Files on GitHub A Seattle-area woman has been charged with accessing tens of millions of Capital One credit card applications after allegedly taking advantage of a misconfigured firewall.

What We Can Learn from the Capital One Hack

Krebs on Security

On Monday, a former Amazon employee was arrested and charged with stealing more than 100 million consumer applications for credit from Capital One.

The Top 8 Benefits of Data Lineage

erwin

114
114

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

More on Backdooring (or Not) WhatsApp

Schneier on Security

Yesterday, I blogged about a Facebook plan to backdoor WhatsApp by adding client-side scanning and filtering. It seems that I was wrong, and there are no such plans.

Capital One: Where Did the Bank Fail on Defense?

Data Breach Today

Experts Say Bank May Have Made Several Errors The cause of Capital One's breach is known. But experts say the incident still raises questions over why Capital One held onto personal data so long and if the bank was adequately monitoring administrator accounts

No Jail Time for “WannaCry Hero”

Krebs on Security

Marcus Hutchins , the “accidental hero” who helped arrest the spread of the global WannaCry ransomware outbreak in 2017, will receive no jail time for his admitted role in authoring and selling malware that helped cyberthieves steal online bank account credentials from victims, a federal judge ruled Friday.

Android devices could be hacked by playing a video due to CVE-2019-2107 flaw

Security Affairs

Watch out! Playing a video on Android devices could be a dangerous operation due to a critical CVE-2019-2107 RCE flaw in Android OS between version 7.0 and 9.0.

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Russia Is Going to Up Its Game for the 2020 Elections

WIRED Threat Level

"You don't need to change votes to cause chaos," Senator Mark Warner tells WIRED in an exclusive interview. Security Security / National Security

IT 110

Visa Contactless Cards Vulnerable to Fraudsters: Report

Data Breach Today

Researchers Say Proxy Machine Can Bypass Transaction Limits Via Man-in-the-Middle Attack A newly discovered vulnerability in Visa's contactless payment cards could allow fraudsters to bypass payment limits of 30 British pounds ($37) at U.K.

223
223

The Attribution Trap: A Waste of Precious Time & Money

Dark Reading

Aiming for attribution doesn't help most organizations become more secure. It can actually have the opposite effect

How to Reverse Engineer, Sniff & Bruteforce Vulnerable RF Adult Toys with WHID Elite

Security Affairs

Expert Luca Bongiorni was looking for new targets to test WHID Elite’s Radio Hacking capabilities and found an interesting one: Electrocuting C**k Ring.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Revving up the AMC Technical Blogs

Micro Focus

With so much valuable technology available from our modernization solution, we’re often asked to provide greater insights. Now, as Derek Britton reveals, we’ve put all the latest AMC practitioner blogs in a single location.

109
109

NY Attorney General Investigates Capital One; Lawsuits Loom

Data Breach Today

Questions Remain Over How Hacker Breached Bank Files In what's likely the first of many investigations, the New York attorney general's office announced late Tuesday that it's launching a Capital One probe following the disclosure that over 100 million U.S.

Disabling Security Cameras with Lasers

Schneier on Security

There's a really interesting video of protesters in Hong Kong using some sort of laser to disable security cameras. I know nothing more about the technologies involved

Over 23 million stolen payment card data traded on the Dark Web in H1 2019

Security Affairs

According to a report published by cyber security firm Sixgill data for over 23 million payment card were on offer in underground forums in the first half of 2019. .

Sales 112

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

US Utilities Hit with Phishing Attack

Dark Reading

An email phishing attack, thought to be from a nation-state actor, claims that engineers have failed licensing exams

GAO Blasts Cybersecurity Efforts of Federal Agencies

Data Breach Today

Watchdog Points to Numerous Risk Management Shortcomings Some 23 federal agencies come up short in their cybersecurity efforts even as attacks on their IT infrastructures continue to grow and concerns about foreign interference in the upcoming 2020 elections persist, according to a Government Accountability Office report.

Four emerging digital payments standards you don’t want to catch you by surprise

Thales eSecurity

Digital payments growth. According to 451 Research, digital payment channels are expected to grow from $2.8 trillion in 2018 to $5.8 trillion in 2022. That’s seven times the rate of in-store growth.

Crooks used rare Steganography technique to hack fully patched websites in Latin America

Security Affairs

Experts at Trustwave observed threat actors using a rare technique to compromise fully patched websites.

GDPR 111

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Cisco Pays $8.6M in First False Claims Suit for Vulnerabilities in Security Product

Dark Reading

A security consultant reported vulnerabilities in Cisco's Video Surveillance Manager in 2009 - but the company ignored the issues and fired the consultant

No More Ransom Thwarts $108 Million in Ill-Gotten Profits

Data Breach Today

Europol Marks Three-Year Anniversary of Non-Profit Security Initiative Three years since its launch, the No More Ransom portal has assisted 200,000 ransomware victims and stopped $108 million from being paid in ransom, according to Europol - one of its founding partners

Cops Are Offering Ring Doorbell Cameras in Exchange for Info

WIRED Threat Level

Amazon-owned Ring has cozied up to law enforcement, and critics say it's using police departments to help market its surveillance cameras. Security Security / Privacy