Sat.Sep 19, 2020 - Fri.Sep 25, 2020

Hacking Group Used Malware to Bypass 2FA on Android Devices

Data Breach Today

Check Point: Hackers Targeted Iranian Dissidents With Various Methods A hacking group targeting Iranian dissidents has developed malware that can bypass two-factor authentication protection on Android devices to steal passwords, according to Check Point Research.

The iOS 14 Privacy and Security Features You Should Know

WIRED Threat Level

The latest update for your iPhone and iPad will make them safer than ever. Security Security / Security Advice

NCSC warns of a surge in ransomware attacks on education institutions

Security Affairs

The U.K. National Cyber Security Centre (NCSC) has issued an alert about a surge in ransomware attacks targeting education institutions. The U.K. National Cyber Security Centre (NCSC), has issued an alert about a surge in ransomware attacks against education institutions.

Cambridgeshire crowned the UK’s cyber crime capital

IT Governance

Cambridgeshire has the unwanted distinction of being the UK’s fastest-growing hotspot for cyber crime, after the number of attacks in the county increased by 49% over a three-year period.

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Onna is breaking down how the concept of information governance has evolved and ways today’s businesses can develop a holistic framework to keep up with a rapidly accelerating datasphere.

The Pulse of ITAD: Using Microbes to Clean Up E-Waste


If you were to stack up all the electronic waste produced annually around the world it would weigh as much as all the commercial aircrafts ever produced – or 5,000 Eiffel towers!

IT 52

More Trending

Mozi Botnet is responsible for most of the IoT Traffic

Security Affairs

The Mozi botnet accounted for 90% of the IoT network traffic observed between October 2019 and June 2020, IBM reported. Mozi is an IoT botnet that borrows the code from Mirai variants and the Gafgyt malware , it appeared on the threat landscape in late 2019.

IoT 89

Bridging the gap: Exploring Digital Preservation at scale with Yaso Arumugam, CIO of The National Archives of Australia


The National Archives of Australia (NAA) is responsible for maintaining and preserving Australia’s official government records and plays a critical role in archiving the events, decisions and stories that have been pivotal in shaping the country into what it is today.

Role of Cloud Platform to Achieve Supply Chain Resilience


In the era of technological advancement, the cutting edge supply chain strategies comprise a worldwide network of ventures that focuses on delivery of the product on-time at the appropriate destination.

Cloud 26

A Bluetooth Flaw Leaves Billions of Devices Vulnerable

WIRED Threat Level

Indictments against Iranian hackers, a Veterans Affairs data breach, and more of the week's top security news. Security Security / Security News

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

German encrypted email service Tutanota suffers DDoS attacks

Security Affairs

The popular encrypted email service Tutanota was hit with a series of DDoS attacks this week targeting its website fist and its DNS providers later. Encrypted email service, Tutanota suffered a series of DDoS attacks that initially targeted the website and later its DNS providers.

Hijacking nearby Firefox mobile browsers via WiFi by exploiting a bug

Security Affairs

Mozilla addressed a bug that can be exploited by attackers to hijack all the Firefox for Android browsers that share the same WiFi network.

IPG Photonics high-performance laser developer hit with ransomware

Security Affairs

IPG Photonics, a leading U.S. manufacturer of high-performance fiber lasers for diverse applications and industries was hit by a ransomware attack that disrupted its operations.

Security Affairs newsletter Round 282

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box.

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

DHS CISA orders federal agencies to fix Zerologon flaw by Monday

Security Affairs

DHS CISA issued an emergency directive to tells government agencies to address the Zerologon vulnerability (CVE-2020-1472) by Monday.

Ways to Create a Buzz for Virtual Events with Social Media Marketing


With the change in times, the ways of hosting events have been changed completely. The recent outbreak of the global pandemic has changed the complete dynamics of the event industry. The post Ways to Create a Buzz for Virtual Events with Social Media Marketing first appeared on Cllax - Top of IT.

7 Best App Creator Software To Create Your Own Mobile Apps


As the world rapidly progresses into autonomous technology, everything and anything is getting connected to the internet. Smart devices are all around us, with Even air conditioners, robot vacuums, dishwashers.

IT 26