data Irish Data Protection Authority Rules On Facebook By packetstormsecurity.com Published On :: Thu, 22 Dec 2011 19:57:14 GMT Full Article headline privacy facebook social ireland
data Facebook Updates Data Use Policy To Appease Irish Government By packetstormsecurity.com Published On :: Mon, 14 May 2012 15:19:22 GMT Full Article headline government privacy facebook social ireland
data Microsoft Must Release Email Data Held On Dublin Server By packetstormsecurity.com Published On :: Mon, 28 Apr 2014 21:55:59 GMT Full Article headline government privacy microsoft email usa ireland
data Microsoft Fights US Warrant For Customer Data Stored Overseas By packetstormsecurity.com Published On :: Wed, 11 Jun 2014 23:49:27 GMT Full Article headline government privacy microsoft usa ireland
data Microsoft Refuses To Hand Over Foreign Data, Held In Contempt Of Court By packetstormsecurity.com Published On :: Fri, 12 Sep 2014 23:17:13 GMT Full Article headline government privacy microsoft usa data loss spyware ireland
data Irish Data Watchdog Is Probing Facebook Transfers To US By packetstormsecurity.com Published On :: Tue, 20 Oct 2015 15:43:57 GMT Full Article headline government privacy usa data loss facebook social ireland
data Major Win For Microsoft In 'Free For All' Data Case By packetstormsecurity.com Published On :: Fri, 15 Jul 2016 04:51:36 GMT Full Article headline government privacy microsoft usa spyware ireland
data Facebook Data Transfers To Be Examined By EU Court By packetstormsecurity.com Published On :: Thu, 12 Apr 2018 15:51:48 GMT Full Article headline government facebook social ireland
data Irish Supreme Court Rejects Facebook Bid To Block ECJ Data Case By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:08:52 GMT Full Article headline government privacy data loss facebook ireland
data 2015 UniCredit Data Breach Affects 3 Million Italian Clients By packetstormsecurity.com Published On :: Mon, 28 Oct 2019 16:58:05 GMT Full Article headline hacker privacy data loss italy
data Evernote Critical Flaw Opened Personal Data Of Millions To Attack By packetstormsecurity.com Published On :: Fri, 14 Jun 2019 16:08:21 GMT Full Article headline privacy flaw chrome
data Chrome 79 Checks Your Passwords Against Public Data Breaches By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 15:07:12 GMT Full Article headline hacker data loss google password chrome
data Chrome 79 Update On Android Kills Local Data By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:18:03 GMT Full Article headline phone data loss flaw google chrome
data Russia Opens Case Against Facebook, Twitter Over Data Laws By packetstormsecurity.com Published On :: Tue, 22 Jan 2019 14:26:52 GMT Full Article headline government privacy russia spyware facebook twitter
data Twitter Accidentally Shares User Location Data By packetstormsecurity.com Published On :: Tue, 14 May 2019 00:48:30 GMT Full Article headline privacy phone data loss twitter
data FBI Seeks To Monitor Facebook, Oversee Mass Social Media Data Collection By packetstormsecurity.com Published On :: Mon, 12 Aug 2019 16:45:16 GMT Full Article headline government privacy usa facebook social twitter fbi
data Federal Data Privacy Bill Takes Aim At Tech Giants By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 16:03:10 GMT Full Article headline government privacy usa facebook social twitter
data NPS Datastore Server DLL Hijacking By packetstormsecurity.com Published On :: Thu, 11 Feb 2016 13:02:22 GMT A DLL side loading vulnerability was found in the NPS Datastore server DLL that ships with Windows Vista. This issue can be exploited by loading the affected DLL as an embedded OLE object. When instantiating the object Windows will try to load the DLL iasdatastore2.dll from the current working directory. If an attacker convinces the user to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. Full Article
data HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
data Hacker Selling Data Of 538 Million Weibo Users By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:53 GMT Full Article headline hacker china cybercrime data loss fraud
data Zoom Remove Data-Mining LinkedIn Feature By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:22 GMT Full Article headline privacy data loss
data 14 Million Key Ring Users Exposed In Open Database By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:25 GMT Full Article headline privacy database data loss
data Small Businesses Tapping COVID-19 Loans Hit With Data Exposure By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:05:07 GMT Full Article headline government privacy usa virus data loss
data Investors Sue LabCorp Over Security Failures In Light Of Data Breach By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:46 GMT Full Article headline hacker privacy virus data loss
data Hacker Finds Old Tesla Parts On eBay Full Of User Data By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:31:22 GMT Full Article headline hacker privacy data loss
data Turkish Hacker Receives Record 334 Years In Prison Over Data Theft By packetstormsecurity.com Published On :: Wed, 13 Jan 2016 02:42:42 GMT Full Article headline hacker cybercrime fraud identity theft turkey
data Turkey's Entire Citizenship Database May Have Been Leaked By packetstormsecurity.com Published On :: Mon, 04 Apr 2016 14:25:45 GMT Full Article headline government privacy cybercrime data loss fraud identity theft turkey
data Turkey Fines Facebook $282,000 Over Data Breach By packetstormsecurity.com Published On :: Thu, 03 Oct 2019 14:13:35 GMT Full Article headline government privacy data loss turkey facebook
data DNS Resolver 9.9.9.9 Will Check Requests Against IBM Threat Database By packetstormsecurity.com Published On :: Mon, 20 Nov 2017 15:19:58 GMT Full Article headline malware dns
data British Airways E-Ticketing Flaw Exposes Passenger Flight, Personal Data By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:29:35 GMT Full Article headline privacy britain data loss terror
data Royals Sue Daily Mail Over U.K. Data Protection Act Violation By packetstormsecurity.com Published On :: Thu, 03 Oct 2019 14:13:31 GMT Full Article headline government privacy britain data loss
data UK Financial Watchdog Leaked Confidential Consumer Data By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:10 GMT Full Article headline government privacy britain data loss
data British Rail Station Wi-Fi Provider Exposed Traveler Data By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:21:04 GMT Full Article headline privacy britain wireless data loss
data German Politicians Targeted In Mass Data Attack By packetstormsecurity.com Published On :: Fri, 04 Jan 2019 16:11:49 GMT Full Article headline hacker government privacy data loss germany
data 20 Year Old Man Confesses In German Data Leak By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 15:08:41 GMT Full Article headline hacker government privacy data loss germany
data Facebook Ordered By Germany To Gather And Mix Less Data By packetstormsecurity.com Published On :: Thu, 07 Feb 2019 16:31:21 GMT Full Article headline government privacy germany facebook social
data German Police Storm Bulletproof Data Center In Former NATO Bunker By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:50:06 GMT Full Article headline government germany
data Anonymous Leaks Paris Climate Summit Officials' Private Data By packetstormsecurity.com Published On :: Sat, 05 Dec 2015 02:08:03 GMT Full Article headline government data loss france anonymous
data Breached Airbus Employee Data Gets Released On The Dark Web By packetstormsecurity.com Published On :: Fri, 01 Feb 2019 16:21:50 GMT Full Article headline hacker privacy data loss france
data Yves Rocher Cosmetic Company Leaks Data On Millions By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 15:58:43 GMT Full Article headline hacker privacy data loss france
data Shanghai Jiao Tong University Exposed 8.4TB Of Email Data By packetstormsecurity.com Published On :: Mon, 10 Jun 2019 19:57:39 GMT Full Article headline privacy email china data loss
data UNICEF Leaks Personal Data Of 8,000 Users Via Email Blunder By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 14:30:26 GMT Full Article headline privacy email data loss
data IBM Data Risk Manager 2.0.3 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:12:14 GMT IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed by a command injection as the server user, and finally abuse of an insecure default password. This module exploits all three vulnerabilities, giving the attacker a root shell. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
data How Data Intelligence Is Accelerating Innovation for Social Good By feeds.techsoup.org Published On :: Fri, 22 Sep 2017 14:45:00 GMT I am often asked what I see as the biggest potential game-changers in tech — particularly as it relates to social good. Mobile, social, the cloud, and analytics continue to emerge as key themes. However, analytics is emerging as the true game changer — catalyzed by advances in open architecture. Let me unpack what I mean by "open architecture." Open means that anyone can access it, contribute to it, and innovate on top of it. At Blackbaud, where I serve as chief technology officer, one of our core tenets has been to design an open, cloud-based software and data architecture. We're cultivating a technical community of partners, customers, and engineers (inside and outside of the company) who are innovating in different ways and contributing to this ecosystem. From this vantage point, I see the way that openness accelerates the velocity of innovation. Looking at it from a different angle, open ecosystems also yield data and analytics that enable everyone who is part of them to gain more insights and intelligence. This data can power intelligent software solutions, surface actionable events, maintain accurate and current data assets, and generally drive more results for users. In other words, an open cloud-based architecture elevates usage, which in turn generates more and more data and intelligence that make the system even more powerful. With data, analytics, and intelligence in mind, the following capabilities emerge as candidates to have a great positive impact. The Internet of Things Internet of Things (IoT) technology is cheap and accessible and can transform normal household items into network devices that generate data. In my house, the lights, thermostats, appliances, cars, doors, and windows are all connected devices. These connected devices generate data and intelligence (such as trends in usage, optimization of electricity consumption, and so on). Much like a household, there are many IoT possibilities for nonprofits and other players in the social good space to generate valuable, actionable data. Instrumentation Instrumentation provides us with the ability to understand what's happening within our software. As Blackbaud ships features and capabilities within solutions, we monitor usage. We do so to understand if our customers can easily discover the new capability (do they use it the first time they log on?) and to determine if our customers find it valuable (is their use ongoing?). This data-driven approach is an extremely effective way of measuring both the quality of the user experience and the overall value of the work we're doing. We can learn a lot about our customers just by observing what they do. Across the software industry, instrumentation is driving advances in understanding that enable more targeted solutions to users' challenges. Usage Information Like instrumentation, usage data enables us to understand the leading indicators that yield the best, most effective outcomes. For example, through usage data, we were able to understand that nonprofits who proactively thank donors within one week of giving have an advantage. They were much more effective at converting those individuals to longer-term supporters and recurring donors. Predictive Intelligence Predictive analytics showcase some of the most stunning and innovative applications of data. At Blackbaud, we think of predictive analytics as a kind of "self-driving car." It guides and sometimes fully automates tasks for our users, enabling them to gain much greater results. A few examples of predictive analytics scenarios that we're working on include Extending the most compelling message to a specific person at just the right time via the best channel, to keep them engaged, generate a donation, invite them to an event, or simply share a story. Intelligently connecting nonprofits, corporations, individuals, foundations, faith-based organizations, schools, and other stakeholders across the ecosystem we serve. That action enables us to more efficiently coordinate efforts and services and drive greater good together. Leveraging social information, an understanding of a person's network, geographical context, and other analytics to help connect an advocate with a nonprofit, school, or foundation, in just the right way. We leverage the correlation of many different, disparate data sources to drive true intelligence and to power new, predictive user experiences across our applications. Our data platform is what powers this intelligence. This platform drives value across our solutions in other ways, including Correcting, appending, and de-duplicating data across the system Business intelligence and reporting that shows trends in data Real-time data pipelines that spark events across the system based on changes to the data I’ve included only a few examples of technology capabilities we're researching that we believe will have a strong positive impact. The central theme of these capabilities is providing more actionable data and intelligence. Our commitment to delivering a robust, scalable, and flexible data architecture as well as open, cloud-based software enables us to take advantage of this technology. It also enables us to harness these capabilities to drive greater value for the customers we serve. This blog post was written by Mary Beth Westmoreland. spanhidden Full Article nonprofit tech big data artificial intelligence nptech data intelligence
data 5 Data Security Risks for Nonprofits (and How to Fix Them) By feeds.techsoup.org Published On :: Fri, 13 Oct 2017 19:56:00 GMT Many nonprofits handle sensitive personal information belonging to community members — whether it's names or email addresses or payment information. But are you handling this data properly to prevent a data breach? This post is by no means exhaustive — after all, every nonprofit handles different sorts of data, and each organization has different security needs. That said, these are some practical things to think about when you review your handling of sensitive personal information. #1 Risk: Malware and Software Vulnerabilities The Problem This one may seem obvious, but with so many other security risks out there, it's easy to forget that malware still poses a major threat to your organization's data. How You Can Mitigate It To start, make sure you have antivirus software installed, and that it's up to date. In addition, you'll want to make sure your operating system and any software installed are also up to date, with all security patches installed. Beyond that, be careful what you click on. Don't download and install software from sites you don't trust. Be careful of the email attachments and links you click on — even from people you know. If you aren't expecting a file or link, click with caution. #2 Risk: Ransomware The Problem Ransomware is an especially insidious form of malware that holds your computer or data hostage unless you pay a sum of money to a criminal actor. Oftentimes, ransomware will encrypt your data, preventing you from accessing it. And according to Symantec's Director of Security Response Kevin Haley, some forms of ransomware will threaten to publicly release your data. How You Can Mitigate It Aside from up-to-date antivirus software and taking steps to avoid infection in the first place, there isn't a ton you can do to deal with a ransomware attack once your data's been encrypted. In that case, according to Haley, keeping up-to-date backups of your data is your best bet. That way, you'll be able to get back up and running quickly with minimal data loss. (TechSoup offers backup and recovery solutions from Veritas.) #3 Risk: Public Wi-Fi The Problem Public Wi-Fi is generally fine for some things, such as browsing cat videos on YouTube, or catching up on the headlines. However, for anything involving sensitive personal information, it's a security disaster waiting to happen. Bad actors could potentially eavesdrop on what you're doing while using public Wi-Fi, leaving your data and work open to prying eyes. How You Can Mitigate It First off, avoid using public, unsecured Wi-Fi when handling sensitive information — whether it's internal organizational data or your own personal banking information. Using a wireless hotspot, like those from Mobile Beacon (offered through TechSoup), instead of public Wi-Fi is an easy way to keep your data more secure. If you can't avoid public Wi-Fi, a virtual private network (VPN) is a good option — VPNs secure data between your computer and the website you're visiting. Not all VPNs provide the same level of security, though, and you'll need to make sure your VPN of choice conforms to any data security regulations that your organization may be subject to. See our previous overview of VPNs for more. #4 Risk: Inappropriate Sharing of Sensitive Information The Problem Sharing sensitive information via email, messaging apps, or similar means is a risky proposition. Email is a notoriously insecure method of communication. Email accounts are often the target of data breaches and phishing attacks. (A phishing attack is where an attacker tries to steal your account information by tricking you to enter your account information on a phony login page.) And whether it's through email or messaging app, it's all too easy to accidentally leak data by sharing it with the wrong person. How You Can Mitigate It Avoid sending sensitive information to colleagues via email. It's easier said than done, we know. Maybe you need to share a list of donor contact information with your marketing department, for example. Consider uploading it to a secure file server on your network that can only be accessed by others in the office. If your organization uses a cloud storage service like Box, consider using that instead — so long as it meets your organization's security needs. These cloud storage services usually encrypt data you upload to prevent it from getting stolen. You may also want to consider using constituent relationship management (CRM) software, a tool designed specifically to store and manage your organization's contacts. In addition, pay attention to access permissions. If you can, restrict access to sensitive information to only those who need it. Revisit your permissions settings regularly and update them as needed. To prevent your user accounts from being compromised in the first place, practice good account security hygiene. Use strong passwords and require your staff to use two-factor authentication. #5 Risk: Handling Credit Card Data The Problem A breach involving credit card data can be embarrassing for your organization, but it could wreak financial havoc on your members and supporters. All it takes is for hackers to grab a few pieces of information to rack up credit card debt in your supporters' names. How You Can Mitigate It Securing credit card information is important, but you don't have to make it up as you go. Make sure your organization conforms to payment card security standards. The Payment Card Industry Security Standards Council, as well as banks and credit card issuers, provide guidelines on how to best handle credit card information to prevent breaches. Has your nonprofit recently encountered any other notable risks? Tell us about it in the comments! spanhidden Full Article security symantec2017 privacy databases
data Keep Your Data Safe: The Joy of Locking Your Computer By feeds.techsoup.org Published On :: Fri, 27 Oct 2017 17:36:00 GMT Here's a simple way to keep your data safe from potential bad actors in one easy step. Are you ready? Here it is: Log out and lock your computer whenever you're not in front of it. That's right, it's so simple it can almost be seen as an analog approach to cybersecurity. But make no mistake, all those in-depth disk encryption efforts can be rendered pointless. If you step away from your computer while it's on and unlocked, anyone passing by can access it. Working Remotely Promotes Data Vulnerability What's perhaps most insidious about someone gaining physical access to your computer is the fact that the attacker doesn't need any advanced technical know-how to steal sensitive information. A momentary lapse in vigilance at work or a coffee shop can result in a data breach of epic proportions. Let's say you're working remotely at your favorite café down the street from your apartment and you get up to put in an order for a late breakfast, forgetting to lock your laptop. During that brief moment, a low-key cybervillian could easily stick a USB drive into your computer and copy any sensitive files about you — or your organization — and leave undetected. Furthermore, if you were logged in to Gmail, your medical records, or your bank account, that malefactor could wreak havoc on your personal and professional life in a matter of minutes. Tips for Protecting Yourself The good news about all of this is that warding off these types of would-be data plunderers is really, really easy — it's simply a matter of using your operating system's screen locking functionality. If you don't want to do this, then at the very least you should log out of any sensitive online accounts whenever you step away from your machine. For each of the following options, be sure you are aware of the password connected to your user login before locking yourself (or anyone else) out. Screen Locking in Microsoft Windows Press Ctrl+Alt+Delete and select Lock this computer Press Windows+L Either of these will lock your computer and require a password to log back in. You can choose Control Panel > Personalization > Screen Saver Settings and set up a screen saver that provides a login screen to get back in once it's been initiated. Screen Locking in macOS On an external keyboard or older laptops, press Ctrl+Shift+Eject On a MacBook Air or Pro Retina, press Ctrl+Shift+Power You can also go to System Preferences > Security & Privacy > General and select Require password immediately after sleep or screen saver begins (provided you have already set up a screen saver by clicking System Preferences > Desktop & Screen Saver). Additional Cybersecurity Resources Find out how to recognize suspicious emails and protect yourself against malware through better password security Check out our recent post on the future of security threats Get more security tips from the National Cyber Security Alliance. National Cyber Security Awareness Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved. Image: National Cyber Security Alliance spanhidden Full Article security symantec2017 privacy
data Millions Of Guests Impacted In Marriott Data Breach, Again By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:26:34 GMT Full Article headline hacker privacy bank cybercrime data loss fraud
data OpenSSH Chink Bares Encrypted Data Packets By packetstormsecurity.com Published On :: Tue, 19 May 2009 09:13:21 GMT Full Article ssh
data FERC's data shows US renewable generating capacity has surpassed coal By feedproxy.google.com Published On :: 2019-06-10T13:43:07Z According to an analysis by the SUN DAY Campaign of data just released by the Federal Energy Regulatory Commission (FERC), U.S. electrical generating capacity by renewable energy sources (i.e., biomass, geothermal, hydropower, solar, wind) has now - for the first time - surpassed that of coal. Full Article News Hydropower Energy Efficiency Bioenergy Wind Power Solar Geothermal
data Google spending billions on data centers in renewable energy rich regions By feedproxy.google.com Published On :: 2019-06-25T13:10:43Z Alphabet Inc.’s Google said it would invest 1 billion euros ($1.1 billion) to expand its data center infrastructure in the Netherlands. Full Article Energy Efficiency News Hydropower Wind Power