Sat.Jan 20, 2018 - Fri.Jan 26, 2018

article thumbnail

DDoS Attacker Targeted Banks, Police, Former Employer

Data Breach Today

Records From Hacked Stresser/Booter Service vDos Helped Unmask Suspect In separate cases, two hackers have either pleaded guilty or been sentenced to serve jail time in part for launching or facilitating DDoS attacks. One defendant, John Kelsey Gammell, was unmasked after taunting a former employer over the "ongoing IT issues" his DDoS attacks were causing.

IT 73
article thumbnail

Your Sloppy Bitcoin Drug Deals Will Haunt You For Years

WIRED Threat Level

Scouring the blockchain, researchers found years-old evidence tying Silk Road transaction to users' public accounts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why invest in custom file folders ?

TAB OnRecord

Getting the folder that meets your needs goes a long way to making sure your filing system is as functional as possible when it comes to workflow, retrieval, and security. If you are wondering if custom folders are a good fit for your organization, consider how they can help in the following areas: Read More. The post Why invest in custom file folders ?

article thumbnail

3 Challenges Created by an Ad Hoc Approach to Information Capture

AIIM

Scanning and information capture lead a curious double life. On one hand, it seems like we’ve been doing scanning and capture forever, at least within larger companies. Scanning and capture are stable, mature technologies with a well-documented ROI. On the other hand, they are still somewhat new when it comes to adoption by many smaller and mid sized organizations.

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Allscripts Ransomware Attack a Reminder of Cloud Risks

Data Breach Today

Points to Need for Clients to Have Business Continuity Plan A ransomware attack on electronic health records vendor Allscripts late last week is a reminder of the potential disruption to patient care delivery healthcare entities can face if a cloud-services provider suffers a cyberattack. It also points to the need for business continuity planning.

Cloud 171

More Trending

article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

This morning we announced, in tandem with our partner 451 Research, the Global Edition of the 2018 Thales Data Threat Report. It’s abundantly clear that medium to larger enterprises (the focus of the report and underlying survey) are finding it harder than ever to protect their sensitive data. The twin drivers of the problem are increased threats and the drive to digitally transform how organizations deliver value and revenue.

article thumbnail

4 Special Requirements Social Media and Collaboration Create for GDPR Compliance

AIIM

A new set of European rules and standards related to privacy and data protection (the General Data Protection Regulation , or GDPR ) has set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers. The regulation is designed to harmonize privacy across the EU, codify more rigorous privacy rights; strike a balance between privacy and security and create an explicit obligation for both data contr

GDPR 95
article thumbnail

Ransomware Outlook: 542 Crypto-Lockers and Counting

Data Breach Today

Crypto-Lockers Remain Serious Threat Despite Recent Attack Volume Decline After spiking in 2017, the volume of attacks involving ransomware has since declined, but the malware still remains a potent threat. For attackers, ransomware barriers to entry are lower than ever, thanks to highly automated ransomware-as-a-service offerings.

article thumbnail

Tinder's Lack of Encryption Lets Strangers Spy on Your Swipes

WIRED Threat Level

Thanks to Tinder's patchwork use of HTTPS, researchers found they could reconstruct someone's entire experience in the app.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

DDoS Attacks Become More Complex and Costly

Dark Reading

Major DDoS attacks cost some organizations more than $100,000 in 2017, according to a new NETSCOUT Arbor report.

94
article thumbnail

AI and analytics has the power to change upstream oil and gas

OpenText Information Management

The upstream oil and gas industries have traditionally been slow to adopt new technologies. Anything new has to be proven in the field before most companies will adopt it. The development of Artificial Intelligence (AI) and advanced analytics should be different. For oil and gas, this combination offers the ability to continuously increase operational performance … The post AI and analytics has the power to change upstream oil and gas appeared first on OpenText Blogs.

article thumbnail

Intel: Stop Installing Patches Due To Reboot Problems

Data Breach Today

Struggles With Firmware Fixes For Meltdown and Spectre The usual advice for major security flaws is to patch as quickly as possible. Now Intel is calling for a full stop due to imperfect patches for a trio of chip security vulnerabilities known as Meltdown and Spectre.

Security 162
article thumbnail

Want to Avoid Malware on Your Android Phone? Try the F-Droid App Store

WIRED Threat Level

Opinion: Researchers from Yale Privacy Lab argue that the scourge of trackers in Android apps means users should stop using the Google Play store.

Privacy 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Satori Botnet Malware Now Can Infect Even More IoT Devices

Dark Reading

Latest version targets systems running ARC processors.

IoT 87
article thumbnail

Organisations need to prepare for “cyber shocks”

IT Governance

Most organisations are aware of the catastrophic damage that extreme cyber attacks can cause, but few have put in place appropriate measures to defend and respond to such incidents, according to a new report from PwC. Strengthening digital society against cyber shocks , which analyses key findings from the 2018 Global State of Information Security ® Survey (GSISS), focuses on the effects of massive incidents such as NotPetya and WannaCry.

article thumbnail

Online Advertising: Hackers' Little Helper

Data Breach Today

Network of Fake Ad Agencies Distributed 1 Billion Bad Ads, Researchers Find The web may be largely funded thanks to online advertising, but the threat posted by malicious advertisements continues to escalate. Indeed, the latest malvertising scheme, uncovered by security firm Confiant, served 1 billion malicious advertisements.

Security 153
article thumbnail

Meltdown and Spectre Patches From Intel and Others Have a Rough Start

WIRED Threat Level

In the haste to address the Meltdown and Spectre vulnerabilities that shook the computer industry, several clumsy patch attempts have had to be pulled.

Security 108
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Top four reasons to start AB testing today

OpenText Information Management

In recent years, the pressure applied to marketers has grown significantly. Year over year, goals are handed down and marketers are expected to do more with less. This trend often leaves marketers scrambling to find new ways to meet these goals. What’s more, in today’s digital ecosystem, with an abundance of options, visitors have come … The post Top four reasons to start AB testing today appeared first on OpenText Blogs.

article thumbnail

More Cloud Means More Multi-Tenant Environments

Thales Cloud Protection & Licensing

Gartner predicts that the worldwide public cloud services market will grow 17 percent in 2018 to $287.8 billion, up from $246.8 billion in 2017. While the increase in cloud migration is by no means a new trend, we are seeing more and more organizations seeking cloud-like consolidation, whether on-premises or in a private or public cloud. Consolidation is becoming the norm, and it is critical that organizations, whether consolidating internally or externally, have a secure multi-tenant environmen

Cloud 81
article thumbnail

Equifax Breach Victims: UK Count Goes Up

Data Breach Today

15 Million UK Residents' Records Exposed, 860,000 Consumers At Risk Data broker Equifax has released a revised count of U.K. victims of its massive 2017 data breach, now saying 860,000 residents had their personal details exposed. The data broker is offering its own fraud-monitoring services to breach victims, provided they share their personal details.

article thumbnail

Pixek App Encrypts Your Photos From Camera to Cloud

WIRED Threat Level

Pixek, an end-to-end encrypted photo app, could point to the future of searchable cloud data storage.

article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

Regulatory Matters: EU regulatory change is coming fast in Life Sciences

OpenText Information Management

The Life Sciences sector is used to constant regulatory change. However, the next few years are about to see major new legislation in the EU that could result in major disruption to Life Sciences, Pharmaceutical and Healthcare companies – wherever they are. As I mentioned in my previous blog, I’m going to concentrate on two … The post Regulatory Matters: EU regulatory change is coming fast in Life Sciences appeared first on OpenText Blogs.

article thumbnail

As technology develops, so must journalists’ codes of ethics | Paul Chadwick

The Guardian Data Protection

AI is sure to bring many benefits but concerns over its ability to make decisions mean human journalists’ input remains vital Journalism is largely collaboration: reporters with sources, writers and editors, lawyers advising publishers, producers with distributors, and audiences feeding back their knowledge. Rapid development of artificial intelligence means journalists are likely to collaborate more and more with machines that think.

article thumbnail

Aetna Signs $1.15 Million Settlement With NY for Breaches

Data Breach Today

Action Comes After $17.2 Million Lawsuit Settlement After settling a breach lawsuit for $17.2 million, Aetna has signed another large settlement related to privacy breaches involving mailings to its health plan members. The latest settlement with the New York state attorney general's office involves two mailings last year.

Privacy 150
article thumbnail

Android Malware, Free Speech, and More Security News This Week

WIRED Threat Level

False alarms, free speech, and more of the week's top security news.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Cyber attacks are now one of the biggest threats to global society

IT Governance

A recent article about the World Economic Forum’s Global Risks Report 2018 said that “the top five risks to global stability over the next five years are natural disasters, extreme weather, cyberattacks, data fraud, and failure to address climate change”. The past few years have seen an increase in cyber attacks and their associated damages. The report’s findings suggest that this acceleration is unlikely to slow.

Risk 76
article thumbnail

We're Doing an All New Series on Pluralsight: Creating a Security-centric Culture

Troy Hunt

Usually when we talk about information security, we're talking about the mechanics of how things work. The attacker broke into a system due to a reused password, there was SQL injection because queries weren't parameterised or the company got ransomware'd because they didn't patch their things. These are all good discussions - essential discussions - but there's a broader and perhaps even more important one that we need to have and that's about the security culture within organisations.

article thumbnail

Expect More Cybersecurity 'Meltdowns'

Data Breach Today

After Meltdown and Spectre, Researchers Will Pummel Microprocessors for Flaws Technology giants are still struggling to identify what's at risk from the Spectre and Meltdown flaws in modern CPUs, never mind getting working security updates into users' hands. In the meantime, expect a rush by researchers to find more flaws in microprocessor code.