Sat.Dec 14, 2019 - Fri.Dec 20, 2019

Ransomware Risk Management: 11 Essential Steps

Data Breach Today

Tips From a Cybersecurity Veteran on Winning the Battle In this in-depth blog, a long-time cybersecurity specialist who recently joined the staff of Information Security Media Group sizes up evolving ransomware risks and offers a list of 11 critical mitigation steps

Don't Make Security Training a 'One-and-Done'

Dark Reading

How to move beyond one-off campaigns and build a true security awareness program

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

It’s Time for Your SOC to Level Up

Threatpost

Artificial intelligence can provide manpower, context and risk assessment. Breach Cloud Security Critical Infrastructure InfoSec Insider IoT Malware Mobile Security Vulnerabilities Web Security ai alert fatigue artificial intelligence balbix benefits guarav banga infosec insider risk assessment security operations center workforce shortage

IT 56

Data Compliance in a World of Data Privacy Concerns

InfoGoTo

We live in an age where we have the ability to collect and utilize more data than ever. As the amount of data we’re responsible for increases, so do concerns that we’re handling it properly. Data compliance refers to statutes and regulations that provide accountabilities, processes and operational obligations for the collection, storage, format and use of data.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

CCPA 2.0 Moves to Next Critical Stage of Referendum Process

Data Matters

In the evening of December 17, 2019, Californians for Consumer Privacy , the consumer privacy rights organization led by Alastair Mactaggart that propelled California towards the U.S.’s s first comprehensive privacy legislation , tweeted the Attorney General’s release of the title and summary for Initiative 19-0021.

More Trending

The Lifecycle of Stolen Payment Data

Data Breach Today

Fiserv's Christine El Eris on How Fraudsters Sit on and Sell Stolen Card Data Even in the post-EMV era, payment card data is very much thriving on the dark web. Why is data still so accessible to fraudsters, and how can card issuers and merchants alike improve card data security?

Access 207

Ransomware Gangs Now Outing Victim Businesses That Don’t Pay Up

Krebs on Security

As if the scourge of ransomware wasn’t bad enough already: Several prominent purveyors of ransomware have signaled they plan to start publishing data stolen from victims who refuse to pay up.

More than 267 millions of Facebook user phone numbers exposed online

Security Affairs

Security researcher Bob Diachenko discovered more than 267 million Facebook user IDs, phone numbers and names in an unsecured database. Security expert Bob Diachenko, along with Comparitech, has discovered more than 267 million Facebook user IDs, phone numbers and names in an unsecured database.

Creditors Seek to Exhume the Body of a Dead Crypto Executive 

WIRED Threat Level

Gerry Cotten took at least $137 million to the grave when he died without giving anyone the password to his encrypted laptop. Security Business Business / Blockchain and Cryptocurrency

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Wawa Stores: POS Malware Attack Undetected for 8 Months

Data Breach Today

Convenience Store Chain Says Payment Card Data Exposed The Wawa convenience store chain is investigating why malware planted on point-of-sale devices at nearly all of its over 850 locations throughout the East Coast went undetected for nearly eight months

Sales 200

Inside ‘Evil Corp,’ a $100M Cybercrime Menace

Krebs on Security

The U.S.

FBI warns travelers against using untrusted and free WiFi networks

Security Affairs

The FBI warned one again the holiday travelers about the danger of using free WiFi networks while traveling. Free WiFi networks, such as the ones in the airports and hotel, hide many dangers to the holiday travelers, for this reason, has once again published a new warning.

The War Vet, the Dating Site, and the Phone Call From Hell

WIRED Threat Level

Jared Johns found out too late that swapping messages with the pretty girl from a dating site would mean serious trouble. If only he had known who she really was. Security Security / Cyberattacks and Hacks Backchannel

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Insurer Races to Fix Security Flaws After Whistleblower Alert

Data Breach Today

Nuclear Bot Author Arrested in Sextortion Case

Krebs on Security

Last summer, a wave of sextortion emails began flooding inboxes around the world. The spammers behind this scheme claimed they’d hacked your computer and recorded videos of you watching porn, and promised to release the embarrassing footage to all your contacts unless a bitcoin demand was paid.

Sales 148

TP-Link Archer routers allow remote takeover without passwords

Security Affairs

TP-Link has addressed a critical vulnerability impacting some TP-Link Archer routers that could allow attackers to login without passwords.

Cloud Data Security: Who Should Hold the Keys?

Thales eSecurity

Nearly half (48%) of all corporate data is stored in the cloud according to the 2019 Thales Global Cloud Security Study conducted by the Ponemon Institute.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Facebook Wins an EU Privacy Ruling

Data Breach Today

Will Dispute Over Sharing European's Data With US Continue? Facebook's sharing of data of European users with the U.S. is legal and provides enough protections, the legal adviser to the EU's top court said on Thursday

Chrome Will Automatically Scan Your Passwords Against Data Breaches

WIRED Threat Level

Google's Password Checkup feature will be fully integrated into the desktop and mobile versions of Chrome 79. Security Security / Security News

A thief stole hard drives containing Facebook payroll data from a car

Security Affairs

Facebook informed its employees that hard drives containing information about its workers’ payroll were stolen from a car last month. On Friday, Facebook announced that hard drives containing information about its workers’ payroll were stolen from a car last month.

IT 83

Attacker Causes Epileptic Seizure Over the Internet

Schneier on Security

This isn't a first, but I think it will be the first conviction : The GIF set off a highly unusual court battle that is expected to equip those in similar circumstances with a new tool for battling threatening trolls and cyberbullies.

IT 75

Fraud Prevention: Keeping Up With Attackers

Data Breach Today

Anthony Cardoza of XTN Cognitive Security on Defensive Measures Fraud prevention is a perpetual cat-and-mouse game as fraudsters develop new tools and uncover new ways to monetize their activities, says Anthony Cardoza of XTN Cognitive Security, who offers defensive insights

5G Is More Secure Than 4G and 3G—Except When It’s Not

WIRED Threat Level

The next-generation wireless networks make it harder to track and spoof users, but security holes remain because devices still connect to older networks. Security Security / Privacy Business

IT 76

A study reveals the list of worst passwords of 2019

Security Affairs

Another year is ending and this is the right time to discover which are the worst passwords of 2019 by analyzing data leaked in various data breaches.

Watch out for phishing scams this Christmas

IT Governance

Christmastime in the workplace is often a time of monumental boredom, as you put off starting any new projects before the end of the year and start counting down the days until your holiday begins.

Visa: Gas Station Networks Targeted to Steal Card Data

Data Breach Today

Network Attacks an Alternative to Use of Skimmers on Pumps, Alert Notes Several sophisticated cybercriminals gangs are targeting "fuel dispenser merchants" throughout North America, in some cases by planting malware within corporate networks to steal payment card data, Visa warns in a new alert

169
169

Hackers Could Use Smart Displays to Spy on Meetings

WIRED Threat Level

By exploiting flaws in popular video conferencing hardware from DTEN, attackers can monitor audio, capture slides—and take full control of devices. Security Security / Cyberattacks and Hacks

Largest hospital system in New Jersey was hit by ransomware attack

Security Affairs

The largest hospital in New Jersey announced on Friday that a ransomware attack last week disrupted its network and that it paid a ransom.

Discovery Dispute Comes to a Head in Theranos Case

ARMA International

A discovery dispute in the criminal prosecution of Elizabeth Holmes and Ramesh Balwani serves as a reminder of the importance and challenge of keeping your e-discovery house in order. It seems even federal prosecutors and agencies sometimes fall short of the mark, too.

CMS 71

Database Left 267 Million Facebook IDs Exposed: Report

Data Breach Today

Security Researchers Say Criminal Group Scraped Phone Numbers and Other Data An unsecured Elasticsearch database exposed the identities and phone numbers of over 267 million Facebook users for about two weeks, according to a new research report