Sat.Jan 25, 2020 - Fri.Jan 31, 2020

Authorities arrest 3 Indonesian hackers behind many Magecart attacks

Security Affairs

The Indonesian National Police and the Interpol announced the arrest of three Indonesian hackers who carried out Magecart attacks.

The Doomsday Clock Moves Closer Than Ever to Midnight

WIRED Threat Level

Since the advent of the clock—even during the peak years of the Cold War—the minute hand has never advanced past the 11:58 mark. Security Security / Security News

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Australian government secretly releasing sensitive medical records to police

The Guardian Data Protection

Lawyers and health privacy advocates condemn laxness of privacy provisions in guidelines The Australian government is releasing highly sensitive medical records to police through a secret regime that experts say contains fundamentally flawed privacy protections.

Court Rules Defendant’s Production Need Not Be Lost in Translation: eDiscovery Case Law

eDiscovery Daily

In NY Machinery v. The Korean Cleaners Monthly, No. 2:17-12269-SDW-ESK (D.N.J. 6, 2020) , New Jersey Magistrate Judge Edward S.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

City of Potsdam offline following a cyberattack

Security Affairs

The City of Potsdam suffered a major cyberattack that took down its servers earlier this week, but emergency services were not impacted.

More Trending

A guide to the history, uses and opportunities with natural language processing

Information Management Resources

NLP is a field that has been experiencing immense growth together with other data science areas such as artificial intelligence, machine learning and deep learning. Here's what you need to know. Artificial intelligence Data strategy Data management

Britain could lose access to EU data after series of scandals

The Guardian Data Protection

Exchange of key security information at risk after Dutch concerns over data protection ?British

A new piece of Ryuk Stealer targets government, military and finance sectors

Security Affairs

A new piece of the Ryuk malware has been improved to steal confidential files related to the military, government, financial statements, and banking.

Scraping the Web Is a Powerful Tool. Clearview AI Abused It

WIRED Threat Level

The facial recognition startup claims it collected billions of photos from sites like Facebook and Twitter. What does the practice mean for the open web? Security Security / Privacy

IT 66

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

What organizations need to know about new data privacy trends

Information Management Resources

As we embrace this new decade, many tech companies are tightening data control offerings and supplying more secure options to adhere to increased data privacy laws and mitigate noncompliance. Data privacy rules Data security Customer data

Understanding Patient’s Rights Under HIPAA


When it comes to PHI, patients have certain rights under the HIPAA Privacy Rule. All covered entities must follow these rules and guidelines and communicate these rights to every patient, Guest Post

Cisco Webex flaw allows unauthenticated remote attackers to join private meetings

Security Affairs

Cisco addressed a vulnerability in Cisco Webex that could be exploited by a remote, unauthenticated attacker to join a protected video conference meeting.

Google Calls Out Safari for Privacy Flaws

WIRED Threat Level

Facial recognition, iCloud encryption, and the rest of this week's top security news. Security Security / Security News

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Security Affairs newsletter Round 248

Security Affairs

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs. Bot list with Telnet credentials for more than 500,000 servers and IoT devices leaked online. Hackers patch Citrix servers to deploy their own backdoor.

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

Chinese hackers have exploited a zero-day vulnerability the Trend Micro OfficeScan antivirus in the recently disclosed hack of Mitsubishi Electric.

For the second time in a few days, Greek Government websites hit by DDoS attacks

Security Affairs

The Greek government announced that a DDoS cyber attack hit the official state websites of the prime minister, the national police and fire service and several important ministries.