Sat.Feb 01, 2020 - Fri.Feb 07, 2020

The Iowa Caucus Tech Meltdown Is a Warning

WIRED Threat Level

The Iowa results will come in eventually, thanks to a paper trail. But it underscores just how much can go wrong when you lean on unnecessary, untested tech. Security Security / National Security

Paper 94

Ransomware Attacks: Why It Should Be Illegal to Pay the Ransom

Dark Reading

For cities, states and towns, paying up is short-sighted and only makes the problem worse

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Google Chrome To Bar HTTP File Downloads


Downloads of files like images may be banned if they use HTTP connections - even if they are available from an HTTPS website. Web Security ban block chrome 82 chrome 83 encrypted executable file file download google Google Chrome HTTP http downloads HTTPS Mp3 PDF PNG Security

Booter Boss Busted By Bacon Pizza Buy

Krebs on Security

A Pennsylvania man who operated one of the Internet’s longest-running online attack-for-hire or “booter” services was sentenced to five years probation today.

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

UK's Brexit Transition Period: Keep Complying With GDPR

Data Breach Today

Privacy Rules Remain in Effect Pending Eventual Outcome of UK-EU Negotiations As former U.K. Prime Minister Theresa May famously declared: "Brexit means Brexit." But what Britain's exit from the EU means for the nation's data privacy rules and future EU-U.K.

GDPR 204

More Trending

New Ransomware Targets Industrial Control Systems

Schneier on Security

EKANS is a new ransomware that targets industrial control systems: But EKANS also uses another trick to ratchet up the pain: It's designed to terminate 64 different software processes on victim computers, including many that are specific to industrial control systems.

When Your Used Car is a Little Too ‘Mobile’

Krebs on Security

Many modern vehicles let owners use the Internet or a mobile device to control the car’s locks, track location and performance data, and start the engine. But who exactly owns that control is not always clear when these smart cars are sold or leased anew.

Access 202

Report: Iowa Caucus App Vulnerable to Hacking

Data Breach Today

Veracode Finds Insecure Data Transmission, ProPublica Reports A review of the mobile app that malfunctioned during Iowa's critical tally of the Democratic Party's caucus has uncovered a security vulnerability, ProPublica reports.

2020 Oscar Nominees Used to Spread Malware

Adam Levin

Online scammers are using the 2020 Oscars to spread malware. A recent study released by Kaspersky Labs uncovered several hacking and phishing campaigns promising their targets free and early access to Best Picture nominees for this year’s Academy Awards.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

An Artist Used 99 Phones to Fake a Google Maps Traffic Jam

WIRED Threat Level

With his "Google Maps Hack," artist Simon Weckert draws attention to the systems we take for granted—and how we let them shape us. Security Security / Privacy

5 Measures to Harden Election Technology

Dark Reading

Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world's most capable

Fraudsters Pose as Journalist in Phishing Campaign: Report

Data Breach Today

Inquiry Posing Interview Questions Designed to Steal Credentials In a recently discovered phishing campaign, hackers attempted to steal victims' passwords and credentials by posing as a former Wall Street Journal reporter and sending documents with potential interview questions, according to security firm Certfa.

RobbinHood ransomware exploit GIGABYTE driver flaw to kill security software

Security Affairs

The operators behind the infamous RobbinHood ransomware are exploiting a vulnerable GIGABYTE driver to kill antivirus products.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Hackable Cisco Phones, a Locust Invasion, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / Security News

Vixie: The Unintended Consequences of Internet Privacy Efforts

Dark Reading

Paul Vixie says emerging encryption protocols for endpoints could 'break' security in enterprise - and even home - networks

FTC Shutters Hundreds of 'Fake' Websites

Data Breach Today

Sites Fraudulently Offered Government Services for a Fee, Commission Says After winning court approval this week, the Federal Trade Commission shuttered over 200 websites that it says fraudulently claimed to offer government services, such as drivers' license renewals or verification of public benefits, for a fee.

The Changing Face of Data Security in Australia and New Zealand

Thales eSecurity

The traditional focus on security has been on breach prevention and threat detection but these can only go so far. For organisations going through digital transformation there needs to be a layered approach to security – complimenting these traditional strategies with data protection.In

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

This Identity Activist Wants to Make Facebook Obsolete

WIRED Threat Level

Your digital self is fragmented and owned by third parties. Kaliya Young has a plan to change that—and make tech fairer for all. Security Security / Privacy

Using 99 mobile phones to create a fake traffic jam in Google Maps

Security Affairs

A German artist demonstrated how using a simple trick it is possible to deceive Google Maps and create a virtual traffic jam. The German artist Simon Weckert conducted a simple experiment to demonstrat e how to deceive Google Maps and create a virtual traffic jam.

IT 81

Breach Report: Sometimes, Encryption Is Still Overlooked

Data Breach Today

Stolen Laptop Contained Patient Data on Thousands Just when you thought the days of big data breaches tied to stolen unencrypted laptops were over comes news of an incident in Oregon affecting hundreds of thousands. What happened this time

From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide

Dark Reading

Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax

IoT 80

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

The Iowa Caucus Meltdown, a Coronavirus Mask Shortage, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / National Security

Security in 2020: Revisited

Schneier on Security

Ten years ago, I wrote an essay : "Security in 2020." Well, it's finally 2020. I think I did pretty well. Here's what I said back then: There's really no such thing as security in the abstract. Security can only be defined in relation to something else.

Report: U.S. Struggled to Counter 2016 Election Interference

Data Breach Today

Senate Committee Releases Third Report on Russian Efforts to Disrupt Presidential Election The U.S.

IT 161

Critical Android Bluetooth flaw CVE-2020-0022 could be exploited without user interaction

Security Affairs

Google addressed a critical vulnerability in its Android OS that affects the Bluetooth subsystem and could be exploited without user interaction. Google has addressed a critical flaw in Android OS that affects the Bluetooth subsystem and could be exploited without user interaction.

Cisco Flaws Put Millions of Workplace Devices at Risk

WIRED Threat Level

Five vulnerabilities in Cisco Discovery Protocol make it possible for a hacker to take over desk phones, routers, and more. . Security Security / Cyberattacks and Hacks

Risk 79

Attacking Driverless Cars with Projected Images

Schneier on Security

Paper 77

Barr: US Should Invest in Nokia, Ericsson

Data Breach Today

Attorney General Calls for Supporting Huawei's Competitors to Help Boost 5G Security U.S.

Crooks start exploiting Coronavirus as bait to spread malware

Security Affairs

Security researchers warn of malspam campaigns aimed at spreading malware that exploit s media attention on the coronavirus epidemic. Unscrupulous cybercriminal groups are attempting to exploit media attention on the coronavirus to infect systems worldwide.