for Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service By packetstormsecurity.com Published On :: Mon, 03 Sep 2018 04:44:44 GMT Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability. Full Article
for Visual Voicemail For iPhone IMAP NAMESPACE Use-After-Free By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:44:33 GMT Visual Voicemail for iPhone suffers from a use-after-free vulnerability in IMAP NAMESPACE processing. Full Article
for iPhone iMessage Malformed Message Bricking By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:34:02 GMT An issue exists where a malformed iMessage can brick an iPhone. A method in IMCore can throw an NSException due to a malformed message containing a property with key IMExtensionPayloadLocalizedDescriptionTextKey with a value that is not a NSString. Full Article
for Facebook Uploaded Email Contacts For 1.5m Users Without Consent By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:20 GMT Full Article headline privacy email data loss fraud facebook social
for Texas School District Falls For Email Scam, Hands Over $2.3 Million By packetstormsecurity.com Published On :: Mon, 13 Jan 2020 15:34:23 GMT Full Article headline government email bank usa cybercrime fraud
for Coronavirus: Facebook Blames Bug For Incorrectly Marked Spam By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:37:52 GMT Full Article headline virus spam facebook
for Greenfield FDI Performance Index 2019: Serbia storms to top By www.fdiintelligence.com Published On :: Mon, 12 Aug 2019 16:08:37 +0000 Research by fDi Intelligence reveals which countries receive more than their ‘expected share’ of FDI. Full Article
for Russia most diversified commodity economy for the fourth year By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:45 +0000 Russia remains fDi’s most diversified commodity economy, while second ranked Brazil has displaced Ukraine into third place. Cathy Mullan reports. Full Article
for Top fDi Performers 2019 By www.fdiintelligence.com Published On :: Mon, 09 Dec 2019 08:42:06 +0000 A look at the results of fDi’s rankings throughout 2019 finds that Singapore and New York dominated the year’s league tables, followed by Shanghai, Tokyo and London Full Article
for SpeakUp Linux Backdoor Sets Up For Major Attack By packetstormsecurity.com Published On :: Mon, 04 Feb 2019 15:20:15 GMT Full Article headline hacker linux botnet backdoor
for Outlaw Shellbot Infects Linux Servers To Mine For Monero By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 15:02:47 GMT Full Article headline hacker malware linux botnet fraud cryptography
for Sierra Wireless AirLink ES450 ACEManager Embedded_Ace_Get_Task.cgi Information Disclosure By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 23:44:44 GMT An exploitable Information Disclosure vulnerability exists in the ACEManager EmbeddedAceGet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause an information disclosure, resulting in the exposure of confidential information, including, but not limited to, plaintext passwords and SNMP community strings. An attacker can make an authenticated HTTP request, or run the binary, to trigger this vulnerability. Full Article
for Sierra Wireless AirLink ES450 ACEManager template_load.cgi Information Disclosure By packetstormsecurity.com Published On :: Sat, 27 Apr 2019 17:20:43 GMT An exploitable information disclosure vulnerability exists in the ACEManager template_load.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a information leak, resulting in the disclosure of internal paths and files. An attacker can make an authenticated HTTP request to trigger this vulnerability. Full Article
for Latvia highlights anti-money laundering efforts By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:17 +0000 FDI into Latvia has recovered in recent years as the Baltic state has implemented stricter anti-money laundering procedures. Latvian minister of economics Ralfs Nemiro talks to Alex Irwin-Hunt about the progress made. Full Article
for A green future for Cape Town’s Atlantis By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:10 +0000 Atlantis in South Africa has a new SEZ focused on green manufacturing, which is hoping to turn around the area's fortunes. Annie Hessler reports. Full Article
for Facebook Removes Foreign Interference Operations From Iran And Russia By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:43:12 GMT Full Article headline government privacy russia data loss fraud cyberwar facebook iran
for How Data Intelligence Is Accelerating Innovation for Social Good By feeds.techsoup.org Published On :: Fri, 22 Sep 2017 14:45:00 GMT I am often asked what I see as the biggest potential game-changers in tech — particularly as it relates to social good. Mobile, social, the cloud, and analytics continue to emerge as key themes. However, analytics is emerging as the true game changer — catalyzed by advances in open architecture. Let me unpack what I mean by "open architecture." Open means that anyone can access it, contribute to it, and innovate on top of it. At Blackbaud, where I serve as chief technology officer, one of our core tenets has been to design an open, cloud-based software and data architecture. We're cultivating a technical community of partners, customers, and engineers (inside and outside of the company) who are innovating in different ways and contributing to this ecosystem. From this vantage point, I see the way that openness accelerates the velocity of innovation. Looking at it from a different angle, open ecosystems also yield data and analytics that enable everyone who is part of them to gain more insights and intelligence. This data can power intelligent software solutions, surface actionable events, maintain accurate and current data assets, and generally drive more results for users. In other words, an open cloud-based architecture elevates usage, which in turn generates more and more data and intelligence that make the system even more powerful. With data, analytics, and intelligence in mind, the following capabilities emerge as candidates to have a great positive impact. The Internet of Things Internet of Things (IoT) technology is cheap and accessible and can transform normal household items into network devices that generate data. In my house, the lights, thermostats, appliances, cars, doors, and windows are all connected devices. These connected devices generate data and intelligence (such as trends in usage, optimization of electricity consumption, and so on). Much like a household, there are many IoT possibilities for nonprofits and other players in the social good space to generate valuable, actionable data. Instrumentation Instrumentation provides us with the ability to understand what's happening within our software. As Blackbaud ships features and capabilities within solutions, we monitor usage. We do so to understand if our customers can easily discover the new capability (do they use it the first time they log on?) and to determine if our customers find it valuable (is their use ongoing?). This data-driven approach is an extremely effective way of measuring both the quality of the user experience and the overall value of the work we're doing. We can learn a lot about our customers just by observing what they do. Across the software industry, instrumentation is driving advances in understanding that enable more targeted solutions to users' challenges. Usage Information Like instrumentation, usage data enables us to understand the leading indicators that yield the best, most effective outcomes. For example, through usage data, we were able to understand that nonprofits who proactively thank donors within one week of giving have an advantage. They were much more effective at converting those individuals to longer-term supporters and recurring donors. Predictive Intelligence Predictive analytics showcase some of the most stunning and innovative applications of data. At Blackbaud, we think of predictive analytics as a kind of "self-driving car." It guides and sometimes fully automates tasks for our users, enabling them to gain much greater results. A few examples of predictive analytics scenarios that we're working on include Extending the most compelling message to a specific person at just the right time via the best channel, to keep them engaged, generate a donation, invite them to an event, or simply share a story. Intelligently connecting nonprofits, corporations, individuals, foundations, faith-based organizations, schools, and other stakeholders across the ecosystem we serve. That action enables us to more efficiently coordinate efforts and services and drive greater good together. Leveraging social information, an understanding of a person's network, geographical context, and other analytics to help connect an advocate with a nonprofit, school, or foundation, in just the right way. We leverage the correlation of many different, disparate data sources to drive true intelligence and to power new, predictive user experiences across our applications. Our data platform is what powers this intelligence. This platform drives value across our solutions in other ways, including Correcting, appending, and de-duplicating data across the system Business intelligence and reporting that shows trends in data Real-time data pipelines that spark events across the system based on changes to the data I’ve included only a few examples of technology capabilities we're researching that we believe will have a strong positive impact. The central theme of these capabilities is providing more actionable data and intelligence. Our commitment to delivering a robust, scalable, and flexible data architecture as well as open, cloud-based software enables us to take advantage of this technology. It also enables us to harness these capabilities to drive greater value for the customers we serve. This blog post was written by Mary Beth Westmoreland. spanhidden Full Article nonprofit tech big data artificial intelligence nptech data intelligence
for Symantec Donation Safeguards Computer Labs for Students By feeds.techsoup.org Published On :: Fri, 29 Sep 2017 15:30:00 GMT The Inland Empire, which encompasses 27,000 square miles in Southern California, has one of the highest rates of poverty in the U.S.'s twenty-five largest metropolitan areas. One in five people there live at the poverty level. Smooth Transition, Inc., is a nonprofit educational and vocational training organization that has been working with local at-risk populations since 2009. It aims to provide a gateway towards empowerment, educational, and employment opportunities to lead a fulfilling, prosperous, and purposeful life. Breaking Harmful Cycles Smooth Transition began working to reach at-risk teens early — before they dropped out of high school or left the foster care system. It later expanded its program to include all at-risk populations, including displaced adults, as a means to better help the community. Smooth Transition's life skills development and educational training increase levels of employability. Its mentorship helps prevent its clients from re-entering the foster and judicial system or repeating poverty and homelessness cycles. The nonprofit provides flexible and relevant programs that are accredited through the Western Association of Schools and Colleges. Its programs are directly tied to career pathways and provide students with vocational certifications at little or no cost to them. Graduates have a high completion rate as compared with other programs that serve at-risk populations. But students also come away with significant increases in their perceived self-value and a decrease in perceived barriers to success. Keeping the Computer Labs Secure In 2016, Smooth Transition served roughly 2,800 people with just four full-time staff members. Many of its programs are computer-based and require that its computer labs serve multiple uses and multiple users. One of the organization's board members manages its IT needs on a volunteer basis. He recommended Symantec's Norton Small Business, and the organization has been using it on its systems since it was founded. Symantec's donation of antivirus protection — through TechSoup — has enabled the nonprofit to safely use its computer labs and has increased the number of programs and services it can offer to its students. According to Dr. Robin Goins, president and executive director of Smooth Transition, "The donations we receive are the foundation of our success, and we cannot express enough the generational and community impact the Symantec donations provide us. Smooth Transition is an appreciative recipient of the donations we received from Symantec and we look forward to providing even more impactful community programs as a result." Goins goes on to describe how Smooth Transition's testing centers are networked, with students taking roughly 250,000 different kinds of exams. She worried that without security in the testing centers, the tests would be disrupted, causing a very serious problem. "If we have things disrupting our classes it costs us money. It also costs students the ability to complete their work. Having viruses attack us would be catastrophic for us." Goins points out that Norton Small Business also helps protect confidential information. "As a school, we're required to protect the identity of our students and a lot of their demographic information," she said. Smooth Transition will continue to work throughout the Inland Empire to provide flexible training and resources for those who don't fit the traditional education model. Though it faces many challenges in providing students with real, relevant work tools and skills, its staff is relieved, knowing that its systems and data are protected. spanhidden Full Article symantec
for 5 Data Security Risks for Nonprofits (and How to Fix Them) By feeds.techsoup.org Published On :: Fri, 13 Oct 2017 19:56:00 GMT Many nonprofits handle sensitive personal information belonging to community members — whether it's names or email addresses or payment information. But are you handling this data properly to prevent a data breach? This post is by no means exhaustive — after all, every nonprofit handles different sorts of data, and each organization has different security needs. That said, these are some practical things to think about when you review your handling of sensitive personal information. #1 Risk: Malware and Software Vulnerabilities The Problem This one may seem obvious, but with so many other security risks out there, it's easy to forget that malware still poses a major threat to your organization's data. How You Can Mitigate It To start, make sure you have antivirus software installed, and that it's up to date. In addition, you'll want to make sure your operating system and any software installed are also up to date, with all security patches installed. Beyond that, be careful what you click on. Don't download and install software from sites you don't trust. Be careful of the email attachments and links you click on — even from people you know. If you aren't expecting a file or link, click with caution. #2 Risk: Ransomware The Problem Ransomware is an especially insidious form of malware that holds your computer or data hostage unless you pay a sum of money to a criminal actor. Oftentimes, ransomware will encrypt your data, preventing you from accessing it. And according to Symantec's Director of Security Response Kevin Haley, some forms of ransomware will threaten to publicly release your data. How You Can Mitigate It Aside from up-to-date antivirus software and taking steps to avoid infection in the first place, there isn't a ton you can do to deal with a ransomware attack once your data's been encrypted. In that case, according to Haley, keeping up-to-date backups of your data is your best bet. That way, you'll be able to get back up and running quickly with minimal data loss. (TechSoup offers backup and recovery solutions from Veritas.) #3 Risk: Public Wi-Fi The Problem Public Wi-Fi is generally fine for some things, such as browsing cat videos on YouTube, or catching up on the headlines. However, for anything involving sensitive personal information, it's a security disaster waiting to happen. Bad actors could potentially eavesdrop on what you're doing while using public Wi-Fi, leaving your data and work open to prying eyes. How You Can Mitigate It First off, avoid using public, unsecured Wi-Fi when handling sensitive information — whether it's internal organizational data or your own personal banking information. Using a wireless hotspot, like those from Mobile Beacon (offered through TechSoup), instead of public Wi-Fi is an easy way to keep your data more secure. If you can't avoid public Wi-Fi, a virtual private network (VPN) is a good option — VPNs secure data between your computer and the website you're visiting. Not all VPNs provide the same level of security, though, and you'll need to make sure your VPN of choice conforms to any data security regulations that your organization may be subject to. See our previous overview of VPNs for more. #4 Risk: Inappropriate Sharing of Sensitive Information The Problem Sharing sensitive information via email, messaging apps, or similar means is a risky proposition. Email is a notoriously insecure method of communication. Email accounts are often the target of data breaches and phishing attacks. (A phishing attack is where an attacker tries to steal your account information by tricking you to enter your account information on a phony login page.) And whether it's through email or messaging app, it's all too easy to accidentally leak data by sharing it with the wrong person. How You Can Mitigate It Avoid sending sensitive information to colleagues via email. It's easier said than done, we know. Maybe you need to share a list of donor contact information with your marketing department, for example. Consider uploading it to a secure file server on your network that can only be accessed by others in the office. If your organization uses a cloud storage service like Box, consider using that instead — so long as it meets your organization's security needs. These cloud storage services usually encrypt data you upload to prevent it from getting stolen. You may also want to consider using constituent relationship management (CRM) software, a tool designed specifically to store and manage your organization's contacts. In addition, pay attention to access permissions. If you can, restrict access to sensitive information to only those who need it. Revisit your permissions settings regularly and update them as needed. To prevent your user accounts from being compromised in the first place, practice good account security hygiene. Use strong passwords and require your staff to use two-factor authentication. #5 Risk: Handling Credit Card Data The Problem A breach involving credit card data can be embarrassing for your organization, but it could wreak financial havoc on your members and supporters. All it takes is for hackers to grab a few pieces of information to rack up credit card debt in your supporters' names. How You Can Mitigate It Securing credit card information is important, but you don't have to make it up as you go. Make sure your organization conforms to payment card security standards. The Payment Card Industry Security Standards Council, as well as banks and credit card issuers, provide guidelines on how to best handle credit card information to prevent breaches. Has your nonprofit recently encountered any other notable risks? Tell us about it in the comments! spanhidden Full Article security symantec2017 privacy databases
for Investors mobilise $40bn for African infrastructure By www.fdiintelligence.com Published On :: Thu, 21 Nov 2019 09:47:13 +0000 Twenty-five countries attracted high-ticket investment deals at the Africa Investment Forum Full Article
for Egypt planning minister strives for sustainable economic growth By www.fdiintelligence.com Published On :: Mon, 20 Jan 2020 09:50:08 +0000 Egypt is well on the way to establishing a diversified economy, claims Hala El Saeed, minister of planning and economic development Full Article
for Kenya Treasury chief ramps up reforms to grow investment By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:24:07 +0000 Kenya’s cabinet secretary for the national treasury and planning, Ukur Yatani, discusses the country’s agenda of fiscal reforms and the importance of constructing an east-west Africa highway. Full Article
for A Crypto-Mining Botnet Has Been Hijacking MSSQL Servers For Almost Two Years By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:26:20 GMT Full Article headline hacker microsoft database fraud flaw cryptography
for Coronavirus: Facebook Alerts Users Exposed To Misinformation By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:30:39 GMT Full Article headline virus fraud facebook social
for Nintendo Accounts Are Getting Hacked To Buy Fortnite Currency By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:43:05 GMT Full Article headline hacker cybercrime fraud nintendo password
for DForce Hacker Returns $25m In Stolen Cryptocurrency By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:43:11 GMT Full Article headline hacker cybercrime fraud cryptography
for Bradford ‘most improved UK city for growth’ By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:38:06 +0000 Bradford has been rated as the most improved city by the Good Growth for Cities 2019 index, while Oxford remained the highest performing UK city. Full Article
for Gulf region loosens foreign investment laws By www.fdiintelligence.com Published On :: Mon, 06 Jan 2020 10:49:06 +0000 The Gulf region is making extensive reforms to its foreign investment landscape in an effort to attract foreign investors to sectors outside oil and gas, according to a recent report by PwC. Full Article
for Climate concerns top long-term WEF risks for first time By www.fdiintelligence.com Published On :: Thu, 16 Jan 2020 12:59:12 +0000 Severe threats to the environment accounted for all of the five most likely long-term risks in the WEF’s Global Risks Report 2020. Full Article
for India invites foreign capital By www.fdiintelligence.com Published On :: Thu, 20 Feb 2020 10:41:47 +0000 India’s 2020 budget continues the process of opening up to overseas investment. Full Article
for UK regions fight for a share of inward investment By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:23:13 +0000 The UK’s prime minister has pledged to rebalance the UK economy away from a dominant London. However, this might require greater incentives for foreign investment in the regions outside of the capital, which are underperforming. Full Article
for FDI screening moves to the fore as protectionism takes hold By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:26:58 +0000 Authorities in the US, the EU and across the developed world are stepping up efforts to scrutinise foreign investment on the grounds of both national security and tech sovereignty. Full Article
for CEE ‘key for automotive R&D’ By www.fdiintelligence.com Published On :: Thu, 30 Jan 2020 16:28:39 +0000 Western European carmakers should consider an R&D footprint in CEE, says McKinsey. Full Article
for fDi’s European Cities and Regions of the Future 2020/21 - London leads LEP ranking while Oxfordshire makes rapid rise By www.fdiintelligence.com Published On :: Mon, 10 Feb 2020 16:26:07 +0000 London LEP and Thames Valley Berkshire LEP hold on to their respective first and second places in the Local Enterprise Partnership rankings, while Oxfordshire LEP jumps up eight places to third. Full Article
for Mayor outlines Warsaw's winning formula By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:12:30 +0000 Warsaw already offers a skilled workforce and has improved its infrastructure – now it must focus on climate change and reducing congestion, mayor Rafał Trzaskowski tells fDi. Full Article
for FBI Re-Sends Alert About Supply Chain Attacks For The Third Time In Three Months By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:18:01 GMT Full Article headline hacker government malware usa cyberwar spyware fbi
for Judge Rules Against Twitter Transparency Effort By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:43 GMT Full Article headline government privacy usa spyware twitter
for Minister for ICT hails Bangladesh's approach to Industry 4.0 By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:14 +0000 Bangladesh minister for ICT Zunaid Ahmed Palak talks to Jacopo Dettoni about the government’s ambitious Digital Bangladesh programme designed to reach village level. Full Article
for How US rust belt has been revived by foreign investment By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:03:48 +0000 Once the powerhouse of the industrial US, the rust belt states have revived their economies with the help of foreign investment. Full Article
for Latin America prepares for sharp drop in FDI amid coronavirus pandemic By www.fdiintelligence.com Published On :: Wed, 08 Apr 2020 12:03:41 +0000 The fallout from the pandemic looks set to stall trade and investment to Latin America. Full Article
for Reforms could unlock African development, reports McKinsey By www.fdiintelligence.com Published On :: Mon, 11 Nov 2019 10:34:15 +0000 Continued African development could hinge on public finance reforms. Full Article
for Group effort helps The Fresh Market stay local By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:20 +0000 Financial incentives from two different cities persuaded US grocery chain The Fresh Market to stay headquartered in its home state of North Carolina. Full Article
for End of the road for Vodafone India? By www.fdiintelligence.com Published On :: Wed, 18 Mar 2020 16:48:27 +0000 A government bailout for the ailing subsidiary of the telecoms powerhouse has fallen through. Full Article
for Where now for Hong Kong? By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:01:01 +0000 The social turmoil in Hong Kong has triggered an economic crisis, raising questions over the special administrative region’s future as a major financial hub on mainland China’s doorstep. Full Article
for Kyrgyzstan ramps up efforts to improve image By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:13:50 +0000 Kyrgyzstan is trying to stabilise a volatile business environment by diversifying its economy away from gold and remittances, and employing an ombudsman to reassure investors. Full Article
for Admins Warned Of Brute-Force SSH Attacks By packetstormsecurity.com Published On :: Wed, 14 May 2008 10:33:15 GMT Full Article ssh
for Brute Force SSH Attack Confounds Defenders By packetstormsecurity.com Published On :: Mon, 08 Dec 2008 21:09:02 GMT Full Article ssh
for Zonamerica looks beyond Latin America for expansion opportunities By www.fdiintelligence.com Published On :: Mon, 16 Dec 2019 10:05:06 +0000 Uruguay-based Zonamerica has successfully expanded into Colombia and China, and is now looking to export its model to other parts of Asia and Africa. Full Article
for ECCB governor hopes for digital currency boost By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:26:42 +0000 The Eastern Caribbean Central Bank is to launch a digital currency for the benefit of its dispersed island economies – essential to a region that has been disproportionately affected by climate change-induced disasters, governor Timothy Antoine tells fDi. Full Article
for View from the Americas: time for action on SDGs By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:24:16 +0000 Giant investment firm BlackRock throwing its weight behind sustainability issues is sending a signal to the corporate world to respond urgently to global calls for action, writes Gregg Wassmansdorf. Full Article