Sat.Jan 12, 2019 - Fri.Jan 18, 2019

Government Shutdown Leaves Americans More Vulnerable to Identity Theft, Scams

Adam Levin

citizens are more vulnerable to the effects of identity theft and scams as a result of the ongoing government shutdown.

Ransomware Claims to Fund Child Cancer Treatments

Data Breach Today

Separately, Texas City's Operations Disrupted by Crypto-Locking Ransomware Ransomware attacks continue, with the city of Del Rio, Texas, saying its operations have been disrupted by crypto-locking malware.

Q&A: Here’s why robust ‘privileged access management’ has never been more vital

The Last Watchdog

Malicious intruders have long recognized that getting their hands on privileged credentials equates to possessing the keys to the kingdom. This is because privileged accounts are widely deployed all across modern business networks — on-premises, in the cloud, across DevOps environments and on endpoints. Related: California enacts pioneering privacy law.

Access 124

“Stole $24 Million But Still Can’t Keep a Friend”

Krebs on Security

Unsettling new claims have emerged about Nicholas Truglia , a 21-year-old Manhattan resident accused of hijacking cell phone accounts to steal tens of millions of dollars in cryptocurrencies from victims.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Start Your Information Journey With A Step Backwards

Weissman's World

You say you’re tired of not being able to find the information you’re looking for. You say you’re concerned the information you do find is reliable. You say you’re worried about security breaches. And you say you’re ready to do something about it.

Groups 181

More Trending

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

Many people will land on this page after learning that their email address has appeared in a data breach I've called "Collection #1".

Courts Hand Down Hard Jail Time for DDoS

Krebs on Security

Seldom do people responsible for launching crippling cyberattacks face justice, but increasingly courts around the world are making examples of the few who do get busted for such crimes.

IoT 176

Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections

Security Affairs

Z-WASP attack: Phishers are using a recently fixed flaw in Office 365 that allows them to bypass protections using zero-width spaces and deliver malicious messages to recipients.

Airline Booking System Exposed Passenger Details

Data Breach Today

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Collection #1 Mega Breach Leaks 773 Million Email Accounts

Adam Levin

A gigantic trove of email addresses and passwords containing over 2 billion records has been discovered online. The breached data, dubbed “Collection #1” by cybersecurity expert Troy Hunt , is more than 87 gigabytes and contains roughly 773 million email address and 21 million unique passwords.

Evaluating the GCHQ Exceptional Access Proposal

Schneier on Security

The so-called Crypto Wars have been going on for 25 years now. Basically, the FBI -- and some of their peer agencies in the U.K.,

Access 104

Fallout Exploit Kit now includes exploit for CVE-2018-15982 Flash zero-day

Security Affairs

Experts at Malwarebytes have reported that the code for the recently discovered Flash zero-day flaw was added to the Fallout Exploit kit. Experts at Malwarebytes observed a new version of the Fallout Exploit kit that include the code to exploit a recently discovered Flash zero-day vulnerability.

UK Sentences Man for Mirai DDoS Attacks Against Liberia

Data Breach Today

Daniel Kaye Was Paid to Disrupt Liberia's Largest Telecommunications Firm A U.K. court has sentenced Daniel Kaye, 30, after he admitted launching DDoS attacks against Liberia's largest telecommunications company in 2015 and 2016.


Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Robust data governance is key for machine learning success

Information Management Resources

Data governance as a framework defines, and helps implement the overall management of the obtainability, usability, integrity, security and effectiveness of data used in any ecosystem. Data governance Artificial intelligence Machine learning

Prices for Zero-Day Exploits Are Rising

Schneier on Security

Companies are willing to pay ever-increasing amounts for good zero-day exploits against hard-to-break computers and applications: On Monday, market-leading exploit broker Zerodium said it would pay up to $2 million for zero-click jailbreaks of Apple's iOS, $1.5

TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal

Security Affairs

Proofpoint analyzed two strains of malware tracked as ServHelper and FlawedGrace distributed through phishing campaigns by the TA505 crime gang.

Groups 101

Your Garage Opener Is More Secure Than Industrial Remotes

Data Breach Today

Trend Micro Says It Moved Cranes Using RF Software Flaws Radio controllers used in the construction, mining and shipping industries are dangerously vulnerable to hackers, Trend Micro says in a new report.

Strong data quality key to success with machine learning, AI or blockchain

Information Management Resources

Enterprises must be skeptical of data as it essentially determines how the AI will work and bias in the data may be inherent because of past customers, business practices and sales. Artificial intelligence Machine learning Blockchain

5 information security policies your organisation must have

IT Governance

Information security policies are essential for tackling organisations’ biggest weakness : their employees. Everything an organisation does to stay secure, from implementing state-of-the-art technological defences to sophisticated physical barriers, relies on people using them properly.

Unsecured MongoDB archive exposed 202 Million private resumes

Security Affairs

Security expert discovered an unprotected MongoDB archive that has exposed personal and professional details of more than 202 million people. Security expert Bob Diachenko discovered an unprotected MongoDB archive that has exposed personal and professional details of more than 202 million people.

Emotet Malware Returns to Work After Holiday Break

Data Breach Today

Fallout Exploit Kit Has Also Reappeared, Distributing GandCrab Ransomware Cybercrime outfits appeared to take a vacation around the December holidays.

GUEST ESSAY: Why the hack of South Korea’s weapons, munitions systems was so predictable

The Last Watchdog

The disclosure that malicious intruders hacked the computer systems of the South Korean government agency that oversees weapons and munitions acquisitions for the country’s military forces is not much of a surprise. The breach of some 30 computers of South Korea’s Defense Acquisition Program Administration (DAPA), which is part of the Ministry of National Defense, reportedly occurred last October.

Data security, artificial intelligence and innovation will drive tech in 2019

Information Management Resources

There is no roadmap to what the New Year may ultimately bring, but with the right planning here are a few technology and cybersecurity predictions to help put you on the right path. Data security Cyber security Artificial intelligence

Zurich refuses to pay Mondelez for NotPetya damages because it’s ‘an act of war’

Security Affairs

Zurich American Insurance Company is refusing to refund its client because consider the attack as “an act of war” that is not covered by its policy.

Why Do Phishing Attacks Continue to Plague Healthcare?

Data Breach Today

Experts Offer Tips for How to Avoid Falling Victim Several health data breaches involving phishing attacks - including one that potentially exposed data on more than 100,000 individuals - have been added to the federal health data breach tally this month.

Trump Must Be a Russian Agent; the Alternative Is Too Awful

WIRED Threat Level

We know a lot about the “what” of the Mueller probe’s findings. The crucial questions now focus on the “why.”. Security

The 5 top trends for data governance strategies in 2019

Information Management Resources

At the heart of all things data-oriented is the concept of data governance, which calls for proper protocols for data collection, storage, management, security and processing. Data governance Data management Data strategy

Too many issues in Pentagon networks expose it to cybersecurity risks

Security Affairs

Risk 91

Facebook Deletes More Bogus Accounts Linked to Russia

Data Breach Today

Sputnik News Agency in Russia Created 'Fake Accounts,' Facebook Alleges Facebook has removed hundreds of accounts, alleging that the account creators misrepresented their identity.


Facebook's '10 Year Challenge' Is Just a Harmless Meme—Right?

WIRED Threat Level

Opinion: The 2009 vs. 2019 profile picture trend may or may not have been a data collection ruse to train its facial recognition algorithm. But we can't afford to blithely play along. Security Opinion

Why Internet Security Is So Bad

Schneier on Security

I recently read two different essays that make the point that while Internet security is terrible, it really doesn't affect people enough to make it an issue. This is true, and is something I worry will change in a world of physically capable computers.