Should Healthcare Companies Ever be Data Brokers?

Should Healthcare Companies Ever be Data Brokers? Plus, Consumers Still Don't Connect Dots between PII exposure and Social Networks) • June 29, 2018     10 Minutes    Leading the latest...
Continue reading
0 Comments

Live Webinar | Solving Third-Party Risk at Scale - A True Risk-Based Approach

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use...
Continue reading
0 Comments

Live Webinar: Fortifying Your Organization's Last Layer of Security

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use...
Continue reading
0 Comments

Ticketmaster Breach Traces to Embedded Chatbot Software

Ticketmaster Breach Traces to Embedded Chatbot Software
Breach Notification , Data Breach , Data Loss Hacker Modified JavaScript Chatbot to Scrape Customers' Card Payment Details( euroinfosec ) • June 28, 2018    Source: Ticketmaster website Ticketmaster is...
Continue reading
0 Comments

Feds Crack Down on Darknet Vendors of Illicit Goods

Feds Crack Down on Darknet Vendors of Illicit Goods
image
image
Anti-Money Laundering (AML) , Compliance , Cybercrime as-a-service DHS Agents Posed as Money Launderers, Helping Suspects Cash Out Cryptocurrency( euroinfosec ) • June 28, 2018     Reminder: Using darknet...
Continue reading
0 Comments

Equifax Coder Settles Insider Trading Charges With SEC

Equifax Coder Settles Insider Trading Charges With SEC
Breach Response , Data Breach , Fraud Software Engineer Profited From Breach Knowledge, Regulator Alleges( jeremy_kirk ) • June 29, 2018     An Equifax software engineer has settled an...
Continue reading
0 Comments

8 Highlights: Scottish 'Big Data' Cybersecurity Conference

8 Highlights: Scottish 'Big Data' Cybersecurity Conference
image
image
image
image
image
image
image
image
image
image
image
image
image
image
Breach Preparedness , Cybercrime , Cyberwarfare / Nation-state attacks Cloud Forensics, Fraud, Extortion and Cyber Sociology Dominate Edinburgh Event( euroinfosec ) • June 29, 2018    Napier University's Craiglockhart Campus...
Continue reading
0 Comments

Two Arrested for Hacking 700,000 Accounts

Russian law enforcement this week said two individuals were arrested for compromising accounts of loyalty program members from popular websites. The unnamed cybercriminals allegedly compromised around 700,000 accounts from companies such...
Continue reading
0 Comments

Facebook App Exposed Data of 120 Million Users

A recently addressed privacy bug on Nametests.com resulted in the data of over 120 million users who took personality quizzes on Facebook to be publicly exposed. Patched as part of...
Continue reading
0 Comments

Massive Breach at Data Broker Exactis Exposes Millions of Americans

Security Researcher Vinny Troia has discovered another sensitive database exposed on the internet. This one uses Elasticsearch, which allows easy data searching over the internet. Elasticsearch offers security including authentication...
Continue reading
0 Comments

Researchers Devise Rowhammer Attacks Against Latest Android Versions

A team of researchers from universities worldwide have devised a new set of DMA-based Rowhammer attacks against the latest Android OS, along with a lightweight defense to prevent such attacks...
Continue reading
0 Comments

Google Expands Android's Compiler-Based Mitigations

Google this week announced expanded compiler-based mitigations in Android P, in an attempt to make bugs harder to exploit and prevent specific types of issues from becoming vulnerabilities. One of...
Continue reading
0 Comments

Former Equifax Manager Charged With Insider Trading

US securities regulators announced insider trading charges on Thursday against a former Equifax manager who sold shares in the company before it disclosed a giant data breach. Sudhakar Reddy Bonthu,...
Continue reading
0 Comments

California, Home of Silicon Valley, Ramps Up Online Privacy Law

California on Thursday passed a strict new law aimed at protecting people's privacy online, a move that promised to shift the terrain on which internet firms operate in the wake...
Continue reading
0 Comments

Facebook, Google 'Manipulate' Users to Share Data Despite EU Law: Study

Facebook and Google are pushing users to share private information by offering "invasive" and limited default options despite new EU data protection laws aimed at giving users more control and...
Continue reading
0 Comments

Possible Data Breach at Adidas Could Impact Millions of U.S. Customers

German sportswear company Adidas on Thursday revealed that it launched an investigation after learning of a potential data breach that could impact millions of its U.S. customers. In a notice...
Continue reading
0 Comments

Hackers Plant Malicious Code on Gentoo Linux GitHub Page

Gentoo Linux GitHub account hacked
Developers of the Gentoo Linux distribution warned users on Thursday that one of the organization’s GitHub accounts was compromised and that malicious code had been planted by the attackers. “Today...
Continue reading
0 Comments

Ticketmaster Blames Third Party Over Data Breach

Ticketmaster UK has had thousands of personal customer information compromised. This may include name, address, email address, telephone number, payment details and Ticketmaster login details, the company said. How many...
Continue reading
0 Comments

Russia Expert to Lead Canada's Electronic Eavesdropping Agency

A Russia expert was appointed Wednesday to lead Canada's electronic eavesdropping agency, amid ongoing concerns of Russian hacking and meddling in Western elections. Shelly Bruce moves up from number two...
Continue reading
0 Comments

The Next Big Cyber-Attack Vector: APIs

With cyber-attacks on enterprise networks becoming more sophisticated, organizations have stepped up perimeter security by investing in the latest firewall, data and endpoint protection, as well as intrusion prevention technologies....
Continue reading
0 Comments