Sat.Jul 13, 2019 - Fri.Jul 19, 2019

Digital Transformation: Lessons Learned from the World Cup

Micro Focus

Over the past several weeks, the world has been watching the FIFA Women’s World Cup – a global soccer (or football if you’re not from the US) tournament, which highlighted some of the best athletes in the world and culminated in a landmark win for the US team.

Palantir Manual Shows How Law Enforcement Tracks Families

WIRED Threat Level

An Apple Watch bug, a hackable hair straightener, and more security news this week. Security Security / Cyberattacks and Hacks

Data governance in the age of AI: Beyond the basics

Information Management Resources

Ensuring the quality of data becomes increasingly important so that organizations don’t wind up making bigger mistakes. Data governance Data management Data strategy

Security Flaw Exposed Valid Airline Boarding Passes

Data Breach Today

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack

Krebs on Security

Cloud hosting provider iNSYNQ says it is trying to recover from a ransomware attack that shut down its network and has left customers unable to access their accounting data for the past three days.

More Trending

Think FaceApp Is Scary? Wait Till You Hear About Facebook

WIRED Threat Level

The idea that FaceApp is somehow exceptionally dangerous threatens to obscure the real point: All apps deserve this level of scrutiny. Security Security / Privacy

Payment Fraud: Criminals Enroll Stolen Cards on Apple Pay

Data Breach Today

Fraud Fighters Also See Spikes in ATM Malware, Card Enrollment as a Service Fraudsters continue to get new tricks up their sleeves.

253
253

Party Like a Russian, Carder’s Edition

Krebs on Security

“It takes a certain kind of man with a certain reputation.

Former NSA contractor sentenced to 9 years for stealing classified data

Security Affairs

The former NSA contractor who pled guilty to stealing over 50TB of data from the Agency, was sentenced to nine years in prison.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Hackers Made an App That Kills to Prove a Point

WIRED Threat Level

Medtronic and the FDA left an insulin pump with a potentially deadly vulnerability on the market—until researchers who found the flaw showed how bad it could be. Security Security / Cyberattacks and Hacks

Phishing Scheme Targets Amex Cardholders

Data Breach Today

Researchers Say Campaign Uses Email Hyperlink Splits to Evade URL Filters Researchers have uncovered a new type of phishing campaign that is targeting American Express card users.

Is ‘REvil’ the New GandCrab Ransomware?

Krebs on Security

The cybercriminals behind the GandCrab ransomware-as-a-service (RaaS) offering recently announced they were closing up shop and retiring after having allegedly earned more than $2 billion in extortion payments from victims.

GUEST ESSAY: 6 unexpected ways that a cyber attack can negatively impact your business

The Last Watchdog

Cyber crime can be extremely financially damaging to businesses. However, if you believe that money is the only thing that a cyber-attack costs your organization, you would be wrong. In fact, a recent academic analysis identified 57 specific individual negative factors that result from a cyber-attack against a business. Here are six ways, worth considering, that a attack can affect your organization.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

The App Creeping on Your IG Location, Jakarta’s Insurance Crisis, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / Privacy

Despite BlueKeep Warnings, Many Organizations Fail to Patch

Data Breach Today

Meet the World’s Biggest ‘Bulletproof’ Hoster

Krebs on Security

CVE-2019-6342 flaw allows hackers to fully compromise Drupal 8.7.4 websites

Security Affairs

Drupal developers urge users to update their installs to version 8.7.5, which addresses the CVE-2019-6342 flaw that allows hackers to take control of Drupal 8 sites. Drupal developers informed users that version 8.7.4

CMS 113

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

How To Clear Out Your Zombie Apps and Online Accounts

WIRED Threat Level

All those services you signed up for but forgot about? They're a security risk. Here's how to get rid of them. Security Security / Security Advice

Risk 114

Phishing Campaign Tied to Amazon Prime Day

Data Breach Today

Fraudsters Use Phishing Kit Called 16Shop, McAfee Reports In the run-up to Amazon Prime Day, some of the company's customers were being targeted by a phishing kit called 16Shop, according to McAfee researchers. The campaign is similar to an earlier attack that focused on Apple users

Authentication and the Have I Been Pwned API

Troy Hunt

The very first feature I added to Have I Been Pwned after I launched it back in December 2013 was the public API.

Magecart group infected over 17,000 domains via unprotected AWS S3 Buckets

Security Affairs

The Magecart continues to target websites worldwide, it infected over 17,000 domains by targeting improperly secured Amazon S3 buckets. .

CMS 114

Palantir's Surveillance Service for Law Enforcement

Schneier on Security

Motherboard got its hands on Palantir's Gotham user's manual, which is used by the police to get information on people: The Palantir user guide shows that police can start with almost no information about a person of interest and instantly know extremely intimate details about their lives.

FOIA 111

Patient Record Snooping Incident Leads to GDPR Fine

Data Breach Today

GDPR 221

The FaceApp Privacy Panic, a Mysterious Satellite Outage, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / Privacy

A flaw could have allowed hackers to take over any Instagram account in 10 minutes

Security Affairs

Instagram has recently addressed a critical flaw that could have allowed hackers to take over any Instagram account without any user interaction. Instagram has recently addressed a critical vulnerability that could have allowed attackers to completely take over any account without user interaction.

Zoom Vulnerability

Schneier on Security

The Zoom conferencing app has a vulnerability that allows someone to remotely take over the computer's camera.

IT 100

Ransomware: As GandCrab Retires, Sodinokibi Rises

Data Breach Today

Ransom Payments to Crypto-Locking Malware Extortionists Are Surging With the GandCrab ransomware-as-service gang promising to retire - and free decryptors now aiding victims - rival Sodinokibi has already stepped into the void, security experts warn.