Sat.Nov 16, 2019 - Fri.Nov 22, 2019

Latest Ransomware Attacks Show Diversity of Victims

Data Breach Today

What Do They Have in Common? Difficult Recovery A ransomware attack against a chain of veterinary medicine clinics plus an attack against a New York hospital show this threat remains pervasive, victims are diverse and recovery is difficult

Opinion: Websites Ask for Permissions And Attack Forgiveness

WIRED Threat Level

Web pages are increasingly powerful—asking for notifications, webcam access, or location—but this great power comes with great vulnerabilities. Security Security / Privacy

Just How Important Is It to Protect the Privacy of Biometric Data?


The post Just How Important Is It to Protect the Privacy of Biometric Data? appeared first on Zapproved. Best Practices biometric data data breach data privacy Security technology

110 Nursing Homes Cut Off from Health Records in Ransomware Attack

Krebs on Security

A ransomware outbreak has besieged a Wisconsin based IT company that provides cloud data hosting, security and access management to more than 100 nursing homes across the United States.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Target Sues Insurer Over 2013 Data Breach Costs

Data Breach Today

Lawsuit Claims Insurer Owes Retailer for Coverage of Card Replacement Costs Target has filed a lawsuit against its long-time insurer, ACE American Insurance Co., in an attempt to recoup money it spent to replace payment cards as part of settlements over the retailer's massive 2013 data breach.

More Trending

Artificial Intelligence Is Coming For You! (Or Is It?)

Weissman's World

A new finding by the Brookings Institution says Artificial Intelligence is coming for white collar jobs. I say, not so much! The post Artificial Intelligence Is Coming For You! (Or Or Is It?) appeared first on Holly Group.

DDoS-for-Hire Boss Gets 13 Months Jail Time

Krebs on Security

A 21-year-old Illinois man was sentenced last week to 13 months in prison for running multiple DDoS-for-hire services that launched millions of attacks over several years.

IT 207

Microsoft Moves Toward DNS Over HTTPS

Data Breach Today

Microsoft Emphasizes DNS Configurations Will Be in Admins' Hands Microsoft has outlined its plans for supporting the encryption of Domain Name System queries, which allows for more private internet browsing.

BEST PRACTICES: Resurgence of encrypted thumb drives shows value of offline backups — in the field

The Last Watchdog

Encrypted flash drives, essentially secure storage on a stick, are a proven technology that has been readily available for at least 15 years. A few years back, it seemed like they would fade into obsolescence, swept aside by the wave of streaming services and cloud storage. Related: Can Europe’s GDPR restore data privacy? And yet today there is a resurgence in demand for encrypted flash drives.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Data Enrichment, People Data Labs and Another 622M Email Addresses

Troy Hunt

Until this month, I'd never heard of People Data Labs (PDL). I'd certainly heard of the sector they operate in - "Data Enrichment" - but I'd never heard of the company itself.

Ransomware Bites 400 Veterinary Hospitals

Krebs on Security

Louisiana Government Recovering From Ransomware Attack

Data Breach Today

Governor Describes 'Aggressive' Incident Response Efforts After a ransomware attack on Monday forced Louisiana's government to take several servers and websites offline to prevent the malware from spreading, state officials spent Tuesday restoring online services

Payment solutions giant Edenred announces malware infection

Security Affairs

The Payment solutions giant Edenred disclosed a malware incident that affected some of its computing systems, it immediately started an investigation.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

1.2 Billion Records Found Exposed Online in a Single Server 

WIRED Threat Level

Here's the next jumbo data leak, complete with Facebook, Twitter, and LinkedIn profiles. Security Security / Security News

Why Were the Russians So Set Against This Hacker Being Extradited?

Krebs on Security

The Russian government has for the past four years been fighting to keep 29-year-old alleged cybercriminal Alexei Burkov from being extradited by Israel to the United States.

IT 199

Ransomware Attackers Leak Stolen Data

Data Breach Today

Maze Crew Reportedly Threatens to Release More of Allied Universal's Data Unless Ransom Paid Ransomware attacks have taken an unwelcome turn: The Maze gang reportedly has begun leaking a victim's files to create pressure to pay a ransom.

Russian author of NeverQuest banking malware gets 4 Years in U.S. Prison

Security Affairs

The Russian hacker who created and used Neverquest banking malware has finally been sentenced to 4 years in prison by a US District Court.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

The NSA Warns of TLS Inspection

Schneier on Security

Risk 83

When Bank Communication is Indistinguishable from Phishing Attacks

Troy Hunt

You know how banks really, really want to avoid their customers falling victim to phishing scams? And how they put a heap of effort into education to warn folks about the hallmarks of phishing scams?

Ransomware Analysis: 'Shade' Surges; Other Trends Emerge

Data Breach Today

Researchers Explain Resurgence in Ransomware, Persistence of Exploit Kits Attacks tied to Shade ransomware continue to surge as part of an overall resurgence in ransomware, security researchers warn.

Personal and social information of 1.2B people exposed on an open Elasticsearch install

Security Affairs

Security duo discovered personal and social information 1.2 billion people exposed online on an unsecured Elasticsearch server. Researchers Bob Diachenko and Vinny Troia discovered an unsecured Eslasticsearch server containing an unprecedented 4 billion user accounts.

Iran Has Shut Off the Internet

Schneier on Security

Iran has gone pretty much entirely offline in the wake of nationwide protests. This is the best article detailing what's going on; this is also good. AccessNow has a global campaign to stop Internet shutdowns. censorship control internetandsociety iran


Hardware, Not Hard Wired

Micro Focus

Managing regular infrastructure change in the hybrid digital enterprise The end is nigh? The excitement and opportunity of a new decade is upon us. I have to confess, however, that I’m not a big fan of prophetic speculations. They tend to make fools of the commentators.

IT 78

PayMyTab Exposes Restaurant Customer Data: Report

Data Breach Today

Researchers Say Company Left Customer Data Unsecured in AWS S3 Bucket An unsecure database belonging to PayMyTab, a company that provides U.S.

French Rouen hospital hit by a ransomware attack

Security Affairs

The University Hospital Center (CHU) of Rouen was hit by the malware last week, the ransomware had a severe impact on the operations during the weekend. The AFP news agency reported that a ransomware attack on a hospital in Rouen last week caused “very long delays in care.”

Security Vulnerabilities in Android Firmware

Schneier on Security

Researchers have discovered and revealed 146 vulnerabilities in various incarnations of Android smartphone firmware. The vulnerabilities were found by scanning the phones of 29 different Android makers, and each is unique to a particular phone or maker.

Burglars Really Do Use Bluetooth Scanners to Find Laptops and Phones

WIRED Threat Level

Bluetooth scanners are readily available and easy to use—which means that smash-and-grab car break-in might not have been pure chance. Security Security / Cyberattacks and Hacks