-
December 6, 2019
Google’s Patient Record Sharing Is Legal, but Is It Right? – Governing
Google’s Patient Record Sharing Is Legal, but Is It Right? Governing Refer Here for Original Post and Source https://www.governing.com/news/headlines/Googles-Patient-Record-Sharing-Is-Legal-but-Is-It-Right.html
Read Post -
December 6, 2019
Fake Elder Scrolls Online developers go phishing on PlayStation
A player of popular gaming title Elder Scrolls Online recently took to Reddit to warn users of a phish via Playstation messaging. This particular phishing attempt is notable for ramping…
Read Post -
December 6, 2019
KnowBe4 Content Updates and New Resources – December 2019
-
December 5, 2019
Apple Explains Mysterious iPhone 11 Location Requests
KrebsOnSecurity ran a story this week that puzzled over Apple‘s response to inquiries about a potential privacy leak in its new iPhone 11 line, in which the devices appear to…
Read Post -
December 5, 2019
Report: Organizations remain vulnerable to increasing insider threats
The latest data breach at Capital One is a noteworthy incident not because it affected over 100 million customer records, 140,000 Social Security numbers (SSNs), and 80,000 linked bank accounts….
Read Post -
December 4, 2019
Explained: What is containerization?
Containerization. Another one of those tech buzzwords folks love to say but often have no idea what it means. A better way to organize children’s toys? The act of bringing…
Read Post -
December 4, 2019
There’s an app for that: web skimmers found on PaaS Heroku
Criminals love to abuse legitimate services—especially platform-as-a-service (Paas) cloud providers—as they are a popular and reliable hosting commodity used to support both business and consumer ventures. Case in point, in…
Read Post -
December 4, 2019
Spotting the Gaps: Is Your Traditional Security Stack Giving You a False Sense of Security?
Endpoint security, firewalls, VPNs, authentication systems… we’ve all got them. But do they really provide the comprehensive level of security your organization needs to keep the bad guys out? The unfortunate reality is that each of these security layers can provide hackers with a back-door to attempt a phishing attack. And we’re going to show you how.
-
December 4, 2019
Failure to Properly Assess Breach Risk Results in $2.175 Million Fine to Affiliated Covered Entity – Lexology
Failure to Properly Assess Breach Risk Results in $2.175 Million Fine to Affiliated Covered Entity Lexology Refer Here for Original Post and Source https://www.lexology.com/library/detail.aspx?g=967cf318-e8d8-4042-b620-b7c3f357b4f9
Read Post -
December 3, 2019
The iPhone 11 Pro’s Location Data Puzzler
One of the more curious behaviors of Apple’s new iPhone 11 Pro is that it intermittently seeks the user’s location information even when all applications and system services on the…
Read Post -
December 3, 2019
New version of IcedID Trojan uses steganographic payloads
This blog post was authored by @hasherezade, with contributions from @siri_urz and Jérôme Segura. Security firm Proofpoint recently published a report about a series of malspam campaigns they attribute to…
Read Post -
December 2, 2019
A week in security (November 25 – December 1)
Last week on Malwarebytes Labs, we discussed why the notion of “data as property” may potentially hurt more than help, homed in on sextortion scammers getting more creative, and explored…
Read Post