Tag Archives: oc pr

10Fold – Security Never Sleeps – 41

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to considerTop lawmakers are concerned that the IRS outage might have been caused by a hacker. 20 million accounts on Alibaba’s site have been exposed to potential attackers. According to a new survey, the riskiest mobile users are actually businessmen. University of Central Florida has been hacked and 63,000 student and employee social security numbers have been leaked.

Oversight chairman: IRS outage ‘may be a hack’ – Publication: The Hill – Reporter name: Cory Bennett

A top House lawmaker on Thursday suggested hackers had caused the Internal Revenue Service’s hardware failure. Late Wednesday night, a number of the IRS’s tax processing systems went down because of technical problems, the agency said. “My initial gut reaction is that may be a hack,” said House Oversight Committee Chairman Jason Chaffetz (R-Utah) on Fox Business Network’s “Mornings With Maria.”

“You just don’t have systems collapse and people can’t use the systems online,” he added. “It’s not like they run out of batteries or something. It really does smell like a hack.” The hardware failure rendered several services available, including the IRS’s modernized e-filing system, several taxpayer and practitioner tools and portions of the IRS website.


Hackers attack 20 mln accounts on Alibaba’s Taobao shopping site – Publication: Reuters – Reporter name: Staff

Feb 4 Hackers in China attempted to access over 20 million active accounts on Alibaba Group Holding Ltd’s Taobao e-commerce website using Alibaba’s own cloud computing service, according to a state media report posted on the Internet regulator’s website. Analysts said the report from The Paper led to the price of Alibaba’s U.S.-listed shares falling as much as 3.7 percent in late Wednesday trade. An Alibaba spokesman on Thursday said the company detected the attack in “the first instance”, reminded users to change passwords, and worked closely with the police investigation.


The #1 Riskiest Mobile Users Wear Suits – Publication: Dark Reading – Reporter name: Erick Chickowski

As mobile malware continues to grow into a legitimate threat, some users are proving more prone than others to being subject to attack. According to a new survey out this week, the demographic most likely to routinely engage in risky mobile behavior isn’t youngsters on Snapchat or ‘digitally hooked’ users who consume vast quantities of mobile video and entertainment. Instead, the most risky users are businesspeople.


UCF hack: 63,000 Social Security numbers stolen from students, staff – Publication: Orlando Sentinel – Reporter name: Gabrielle Russon

In an unprecedented data breach at UCF, about 63,000 Social Security numbers and names of former and current students and UCF employees were hacked, officials revealed Thursday. The people whose information has been compromised have not been notified yet. The university will alert them by letters that are expected to be sent Friday, officials said. The school has set up a call-in phone center and a website that went live this morning with details of what happened and what people should do to as a precaution. People who are affected will also receive one year of free credit monitoring and identity-protection services.

10Fold – Security Never Sleeps – 39

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: Twelve Chicago area restaurants have been comprised by a malicious program installed on their payment processing devices. The security firm responsible for finding the ‘cesspit’ vulnerability on eBay’s global sales platform has released a statement saying eBay has yet to fix this vulnerability and makes no plan to in the near future. Melbourn Health Center is still struggling with the QBot that infiltrated the pathology department and drown the system forcing staff to do all processes manually. Lastly, a Forbes insider interview takes a look a what is happening to cybersecurity firm Norse.

12 Chicago Area Restaurants Affected by Massive Credit Card Data Breach – Publication: NBC – Reporter name: Staff

Secure credit card information was compromised at a dozen Chicago area restaurant locations during a massive data breach at Landry’s restaurants and Golden Nugget Casinos nationwide. Findings showed that hackers were able to install a program on payment card processing devices at certain restaurants, food and beverage outlets, spas, entertainment destinations, and managed properties.


Update: eBay ‘cesspit’ has ‘no plans’ to fix severe vulnerability – Publication: SC Magazine – Reporter name: Max Metzger

eBay will apparently not be fixing a ‘severe vulnerability’ on the company’s global sales platform. Check Point Software’s research team apparently disclosed details of just such a vulnerability in mid-December last year.  This ‘severe vulnerability’ allows the bypass of the global bidding platform’s code validation, from which point, any wilful attacker can manipulate the vulnerable code remotely and release malicious javascript code on users. If the vulnerability is left unpatched, Check Point told press in a statement “eBay’s customers will continue to be exposed to potential phishing attacks and data theft.”


Melbourne Health still grappling with Qbot malware – Publication: IT News – Reporter name: Allie Coyne

Melbourne Health is still working to contain a dangerous strain of malware that attacked its systems more than two weeks ago due to the virus’ ability to mutate and hide itself from discovery. On January 18 the health network revealed malicious software had infected Windows XP computers through Royal Melbourne Hospital’s pathology department. The malware downed the hospital’s pathology systems and forced staff into manual workarounds.


Norse Founder Doesn’t Know Whether His Cybersecurity Business Is Still Alive – Publication: Forbes – Reporter name: Thomas Fox-Brewster

The company website is down and a report claiming the firm is imploding might well have hammered down the final nail in the coffin for an information security startup that appeared to be on the up with more than $40 million in VC investment to date. Such is the chaos at Norse, even co-founder and current CTO Tommy Stiansen is in the dark, telling FORBES today he didn’t know whether the firm he set up in 2011 would continue to operate. When asked if the company was still alive, Stiansen responded: “I currently don’t have any view over what’s going on… I haven’t heard anything.”

10Fold – Security Never Sleeps – 37

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: HSBC has been hit by a cyber attack causing its personal banking website and mobile application to shut down, only weeks after a systems failure that left thousands of its customers without access to digital services. Researchers at Kaspersky Lab spotted attackers using malicious Microsoft Word documents distributed via spearphishing emails to spread the Black Energy Trojan in Ukraine. Last year was a record year for malware, according to a new report from Panda Security, with more than 84 million new malware samples collected over the course of the year. A bug exposed an Uber driver’s tax information including her name and social security number to all drivers who logged onto their dashboard in what the company calls, a ‘bug.’

HSBC cyber attack brings Internet banking to its knees – Publication: Financial Times – Reporter name: Emma Dunkley

HSBC has been hit by a cyber attack causing its personal banking website and mobile application to shut down, only weeks after a systems failure that left thousands of its customers without access to digital services. The bank said in a statement that it had “successfully defended against the attack, and customer transactions were not affected.” However by early afternoon on Friday its online banking services were still unavailable to some customers. Alex Kwiatkowski, a senior strategist at software group Misys, said the attack was “very concerning” and “shines a bright spotlight” upon HSBC’s systems weaknesses.


BlackEnergy malware deployed using malicious Word docs – Publication: SC Magazine – Reporter name: Robert Abel

Researchers at Kaspersky Lab spotted attackers using malicious Microsoft Word documents distributed via spearphishing emails to spread the Black Energy Trojan in Ukraine. Russian-speaking threat actors in the BlackEnergy APT group have been using malicious Excel and PowerPoint files to spread the group’s malware since last year but Kaspersky’s Global Research and Analysis Team Director Costin Raiu claimed this was the first time Word documents have been used. The BlackEnergy APT group has been actively targeting energy, government and media in Ukraine, and industrial controls systems supervisory control and data acquisition (ICS/SCADA) and energy companies worldwide.


 27% of all malware variants in history were created in 2015 – Publication: CSO Online – Reporter name: Maria Korolov

Last year was a record year for malware, according to a new report from Panda Security, with more than 84 million new malware samples collected over the course of the year. Trojans continued to account for the main bulk of malware, at 51.45 percent, followed by viruses at 22.79 percent, worms at 13.22 percent, potentially unwanted programs such as adware at 10.71 percent and cases of spyware at 1.83 percent.


‘Bug’ Exposes Uber Driver’s Tax Information, Including Name and Social Security Number – Publication: Forbes – Reporter name: Kelly Phillips

It was an über bad day for one driver who had her personal tax information, including her Social Security number, exposed due to what the drive on demand company is calling a “bug.” When Uber drivers logged on to the Uber partner dashboard to check their own 1099 information for 2015, they instead received information relating to someone else: a Florida woman who also drives for the company. The form in question was a federal form 1099-K, Merchant Card and Third Party Network Payments. Technically, drivers for Uber are not employees which is why they fill out the 1099-MISC. The driver’s 1099-K information remained on the Uber dashboard for a short time and it’s not known how many other drivers might have viewed it during that time. When made aware of the error, the company removed the tax tab on the dashboard altogether while the mistake was corrected.

10Fold – Big Data Business Insights – 22

Your daily digest of “All Things Big Data” gathered, collected and researched by your very own 10Fold Big Data Practice team.

Big Data

10 FOLD ICON 15x15 Within the last couple of years, every industry is starting to look to big data to help add business value. Colleges and universities, have begun to link disparate information from across campus. However, big questions still remain: how will schools use big data for existing privacy and security policies? and how will big data help with a more diverse student population?

Big Data’s Coming Of Age In Higher Education – Forbes

IoT

10 FOLD ICON 15x15 The next wave of automation is here and it involves making the Internet invisible and ubiquitous. One of the more famous applications for IoT whas been innovation in home appliances like the thermostat, which can now be turned on remotely. Surprisingly, retail IoT products like ovens, door locks and baby monitors have yet to find a firm ground among consumers perhaps due to security concerns. At hospitals, IoT will allow a patient’s vital signs to be monitored via a sensor in her hospital bed, and trigger medication and outreach to doctors and nurses at programmed intervals, as well as provide updates to family members. The floodgates to the machine-to-machine (M2M) market have opened up and will only be accelerated going forward.

IoT Ushers In A New Wave Of Automation – PYMNTS

eCommerce

10 FOLD ICON 15x15 eCommerce around the world is growing quickly- in France especially. eCommerce in France was worth 64.9 billion euros last year and could reach the 70 billion euro milestone this year. For 2016, Fevad expects consumers to make nearly 1 billion transactions this year. It is also believed that there will be more than 200,000 eCommerce platforms for the French to choose from by the end of 2016.

10 FOLD ICON 15x15 The Chinese eCommerce powerhouse, Alibaba, is hoping its good third-quarter report will help reassure investors worried about the state of the Chinese economy. Alibaba is benefiting from a shift to mobile spending and a growth in users. Mobile spending accounted for 65 per cent of total China retail revenue, up from 30 per cent last year. Annual active buyers rose 22 per cent to 407 million.

Ecommerce in France was worth €65 billion in 2015 – eCommerce News

Alibaba’s profit jumps on strong eCommerce sales – The Star Business

NFV/ SDN

10 FOLD ICON 15x15 Telecom operators are expected to increase their reliance on software technologies based on NFV and SDN to reduce costs and compete with well established providers. The TBR report claims telecom operators over the next year will look to focus on consolidation and cost-cutting initiatives “to improve the profitability of their enterprise business,” citing recent moves by CenturyLink and Verizon Communications in looking to divest their data centers. Another influences was IBM’s recent acquisition of AT&T’s managed application and hosting service business. TBR also noted carriers were adopting NFV and SDN to reduce costs and gain agility in service offerings.

NFV and SDN core to telecom operators service positioning – RCR Wireless

10Fold – Security Never Sleeps – 36

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: Israel’s Electricity Authority experienced a serious hack attack that officials are still working to repel- though they have identified the virus and the software to neutralize it. A security breach discovered at software Juniper Networks has U.S. Officials worried that foreign hackers have been reading the encrypted communications of U.S. Government agencies for the past three years. Independent security researcher Michael Stepankin has reported a since-patched remote code execution hole in Paypal that could have allowed attackers to hijack production systems. The FBI discussed one if its top attacks based in the UK which offered a terse defense of those sometimes-controversial tactics and described how innocents on the Tor anonymizing network were protected from digital exploits with a human “wall” that sifted hacked data before it landed in the hands of investigators.

Israel’s electric authority hit by “severe” hack attack Publication: ARS Technica Reporter name: Dan Goodin

Israel’s Electricity Authority experienced a serious hack attack that officials are still working to repel, the country’s energy minister said Tuesday. The virus was already identified and the right software was already prepared to neutralize it according to the Israeli Energy Minister, Yuval Steinitz- but the computer systems of the Israeli Electricity Authority are still not working as they should. There’s no indication Israel’s power grid was attacked, though the attack followed five weeks after Ukraine’s power grid was disrupted in what is believed to be the world’s first known hacker power outage.


The Data Breach You Haven’t Heard About Publication: The Wall Street Journal Reporter name: Will Hurd

A security breach recently discovered at software Juniper Networks has U.S. Officials worried that foreign hackers have been reading the encrypted communications of U.S.government agencies for the past three years. On Dec. 17 the California-based Juniper Networks announced that an unauthorized backdoor had been placed in its ScreenOS software, and a breach was possible since 2013. This allowed an outside actor to monitor network traffic, potentially decrypt information, and even take control of firewalls. Days later the company provided its clients—which include various U.S. intelligence entities—with an “emergency security patch” to close the backdoor. The federal government has yet to determine which agencies are using the affected software or if any agencies have used the patch to close the backdoor.


PayPal is the latest victim of Java deserialization bugs in the Web apps Publication: PC World Reporter name: Lucian Constantin

PayPal has fixed a serious vulnerability in its back-end management system that could have allowed attackers to execute arbitrary commands on the server and potentially install a backdoor. Independent security researcher Michael Stepankin has reported a since-patched remote code execution hole in Paypal that could have allowed attackers to hijack production systems. The critical vulnerability affecting manager.paypal.com revealed overnight was reported December 13th and patched soon after disclosure. After determining that the PayPal site was vulnerable to Java deserialization, Stepankin was able to exploit the flaw in order to execute arbitrary commands on its underlying Web server. After he reported the issue to PayPal and it got fixed, the company gave him a reward through its bug bounty program, even though his report was marked as a duplicate.


FBI: A ‘Human Wall’ Protects Innocents From Our Hacking Exploits Publication: Forbes Reporter name: Thomas Fox-Brewster

The FBI doesn’t often publicly discuss its use of Network Investigative Techniques, a catch-all term for digital attacks on suspect computers. But one of its top attaches based in the UK offered FORBES a terse defense of those sometimes-controversial tactics and described how innocents were protected from digital exploits with a human “wall” that sifted hacked data before it landed in the hands of investigators. TorMail was compromised by law enforcement back in 2013 and used to hack customers suspected of involvement in child abuse, according to a Washington Post report. Investigator Michael Driscoll explained to FORBES that, the “wall” was predominantly human, one consisting of people trained to determine what data could be used in an investigation. As the FBI continues to test the waters with fresh hacking techniques, it can expect more of those questions about its activities.

10Fold – Big Data Business Insights – 19

Your daily digest of “All Things Big Data” gathered, collected and researched by your very own 10Fold Big Data Practice team.

Big Data

10 FOLD ICON 15x15  Every industry has been affected by big data in one way, or another. The hotel and hospitality sector caters to millions of travellers daily which has sparked their operators to turn to advanced analytics solutions for guidance about how to keep their customers happy. Many customers are seeking different experiences with different spending habits, and big data analytics has helped operators quickly make this distinction. Analytics has also helped hotels with yield management, or the process of ensuring each room attracts the optimal price, as well as improving overall customer satisfaction.

10 FOLD ICON 15x15  Last week at the World Economic Forum in Switzerland, Vice President Joe Biden moderated a panel of scientists from around the world regarding cures for cancer. During the panel, they discovered to find a cure, they need better ways to collect, harness and analyze Big Data. Biden said, “Tapping this treasure trove of information is vital to speeding the pace of progress towards cancer cures.” One of the panelists, David Agus provided an example for which Big Data can be vital: the ongoing effort to understand a gene P53, which promotes cancer resistance. However, some of the major issues oncology researchers face in using Big Data are that medical data is not standardized platforms and patients are concerned with privacy and security issues surrounding their personal data. Biden acknowledged that solving the Big Data challenge may require cooperation between professionals across many disciplines, but he is hopeful that this will help find the cure.

 

How Big Data And Analytics Are Changing Hotels And The Hospitality Industry – Forbes

Here Are The Sticking Points For Biden, Big Data And Cancer Moonshots – Forbes

IoT

10 FOLD ICON 15x15  Seebo, an Israeli startup that offers an IoT end-to-end platform to help companies launch smart products faster, has closed $8.5 million in Series A funding. Seebo’s platform is aimed at helping smaller companies  build and support connected products. Seebo’s clientele industries include toys, children’s products, health, wellness, sports equipment, furniture, electronics, travel equipment, baby products and fashion.

10 FOLD ICON 15x15  Another Israel-based company, Altair Semiconductors, has been acquired by Sony for $212 million. Altair owns modem chip technology and related software for LTE mobile devices. Sony hopes this move will strengthen its presence in the IoT market, as more devices and appliances are coming equipped with chipsets and connection to the web. The chipset incorporates elements such as an on-chip power management unit, integrated DDR memory, and a low-power MCU subsystem with security framework for customer-developed applications. With this acquisition, Sony is hoping to make component devices that have sensing and communication capabilities, as well as LTE solutions.

Seebo Raises $8.5M To Help Bring Your IoT Product To Life – TechCrunch

Sony Acquires IoT Chipmaker Altair For $212M – InformationWeek

Self Service and Enterprise

10 FOLD ICON 15x15 UK based communications company, BT Group is pitching a new SDN-based service to business customers, which serves as a stepping stone in the transition to full SDN and NFV capabilities. The operator claims the SDN-based service will allow customers to benefit from better network performance, and give them insight into the performance of their applications, without having to spend more on bandwidth. BT is also working on developing a self-service capability that will allow customers to control their SD-WAN through BT’s portal.

BT Enters SD-WAN Fray With Cisco – Light Reading

eCommerce

10 FOLD ICON 15x15  A major exploit was found in the Open Source eCommerce platform, Magento, that allows hackers to take control of both the admin and the server. It is unknown if this exploit was used prior to the disclosure, but now that it is published,  users are encouraged to update their platform immediately.

Major Vulnerability in Magento eCommerce, Update Immediately – The Sem Post

SDN

10 FOLD ICON 15x15 Big Switch Networks is seeking to build success by making its products free. The SDN company is rolling out a free edition of its Big Monitoring and Big Cloud fabric software to encourage upgrades to their “beefier” and commercial versions. The company has also revealed new releases of paid versions of its products. These updates come on the heels of the company’s $48.5 million in Series C funding. Big Switch also announced two additions to its board and claims it is growing 300% annually, closing multiple deals in excess of $1 million. The company hopes to keep that momentum up by offering a free version of $25,000 worth of its software.

Big Switch frees up its SDN – Network World

10Fold – Big Data Business Insights – 18

Your daily digest of “All Things Big Data” gathered, collected and researched by your very own 10Fold Big Data Practice team.

Big Data

10 FOLD ICON 15x15 InfoWorld highlights big-data vendor, Talend, which is following in the footsteps of two of the hottest  open-source technologies in big data — Hadoop and Apache Spark. Talend provides integration technologies for big data, cloud and applications based on the open-source software model. Because of this, the company  has placed a significant bet of its own on Hadoop, Spark, and open source in general.

10 FOLD ICON 15x15 With modern humanity continuing to generate large sets of data, machine learning has become a relevant tool to help researchers interpret all of this information.. These machines have been helpful in analyzing complex networks, yet some supercomputers still present problems. Now, a new approach that would use quantum computers to streamline these problems has been developed by researchers at MIT, the University of Waterloo, and the University of Southern California. They believe this approach, which uses algebraic topology, will help reduce the impact of distortions that arise.

Why open source is the ‘new normal’ for big data – InfoWorld

A new quantum approach to big data – MIT News

Cybercom: OPM Hack Highlights China Big Data Spying – The Washington Free Beacon

Hadoop

10 FOLD ICON 15x15 Splice Machine has secured $9m in C-round funding to continue its efforts in connecting Hadoop and relational database management systems (RDBMS) technologies together. Splice Machine aims to have an RDBMS running on top of Hadoop and Spark and aims to increase performance over traditional RDBMS, such as Oracle and MySQL, at a lower cost.

10 FOLD ICON 15x15 Cloud-scale data processing software, Qubole, raised $30 million to aid its mission in simplifying Hadoop by allowing users to manipulate information in their cloud-based analytics clusters without writing any code. The additions aim to make Qubole’s Hadoop distribution more viable for sensitive workloads, such as healthcare information and financial records.

Splice Machine bags $9m to fund RDBMS on Hadoop and Spark – The Register

What you missed in Big Data: Hadoop is the star of the show – SiliconAngle

IoT

10 FOLD ICON 15x15 Because IoT is all about connectivity, there have been many alternatives rising for getting data from “here to there.” A new breed of low-power, long-range wireless networks have arisen and are now being used by several companies. But there is also a new option: LPWANs. These networks are designed to work at distances measured in kilometers and have power consumption figures that allow for years of battery power. Another option is LTE-M, which is designed to work with existing equipment installed in LTE networks. Although neither technology is a fool-proof solution for IoT devices, they still provide newer options for carriers and companies to chose from.

10 FOLD ICON 15x15 As most organizations now embrace the IoT, they still need to process and analyze the subsequent, large quantities of data in real-time, which can increase security, capacity and analytics challenges.One way to address these would be to put automated, intelligent analytics at the edge — near where the data is generated to reduce the amount of data and networking communications overhead. The questions of what data can be collected, what data should be collected, and how long the data should be retained still apply. The difference is the physical point at which the data should be analyzed and acted upon, which depends on the use-case and on what an organization is trying to achieve.

Does The Internet Of Things Really Need Dedicated Low-Power WANs? – Forbes

Edge Analytics An Antidote To IoT Data Deluge  – Informationweek

eCommerce

10 FOLD ICON 15x15 Salesforce saw growth like never before in 2015 with an estimated 1 million jobs projected by 2018 that will be directly enabled by the Salesforce ecosystem. That being said, CloudCraze, Salesforce’s only enterprise-class eCommerce partner, is poised to lead the forefront of cloud innovation for 2016. CEO Chris Dalton provides insight for how he believes eCommerce will be effected in the future with the use of CloudCraze.

CloudCraze Has Changed The Face of eCommerce For Salesforce: An Interview With CEO Chris Dalton – Forbes

NFV

10 FOLD ICON 15x15  According to a recent  report from the OpenStack Foundation, Accelerating NFV Delivery with OpenStack, NFV is changing the game for telcos because it helps them quickly develop and deploy new applications while reducing their reliance on proprietary hardware from traditional network suppliers, and eases the strain on their data centers. Although adoption of NFV remains in its infancy, it is already projected to grow rapidly by the end of the decade.

More telcos turning to NFV to cut costs and provision services – Computer Weekly

10Fold – Security Never Sleeps – 33

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: A company that supplies audio-visual and building control equipment to the US Army, the White House, and other security-conscious organizations built a deliberately concealed backdoor into dozens of its products that could be used to hack or spy on users. An Austrian airplane component maker for Boeing and Airbus said earlier this week a cybercrime-related fraud has caused $54 million in damages. Security experts are warning corporates to redouble their efforts to guard against the insider threat after federal prosecutors indicted five people including two scientist at GlaxoSmithKline on charges of stealing trade secrets. The battle between CISA and Safe Harbor continues as both governments debate whether a universal law could apply to both US and EU citizens. The European union is set to meet on Feb. 2nd to determine how data transfers to the US should continue, meanwhile the US government debates over what is actually considered personally identifiable information and what information they can legally collect.

Baffling ‘Batman’ Backdoor Busted In Comms Used By Global Governments

Researchers from Austrian firm SEC Consult have uncovered what they claim are deliberately hidden backdoors in products from AMX, a provider of conference room communications to private firms and government organizations the world over, including the White House and US military bodies. The researchers first became suspicious after encountering a function called “setUpSubtleUserAccount” that added an highly privileged account with a hard-coded password to the list of users authorized to log in. Unlike most other accounts, this one had the ability to capture data packets flowing between the device and the network it’s connected to.


Aircraft part manufacturer says cybercrime incident cost it $54 million

An Austrian airplane component maker for Boeing and Airbus said earlier this week a cybercrime-related fraud has caused $54 million in damages. It characterized the incident as an “outflow” of $54 million of “liquid funds.” The loss does not pose an economic threat to the company. FACC did say the attack did not affect its IT infrastructure, data security, or intellectual property rights, and its production and engineering units are operating normally.


Insider Threat Warning as Scientists Steal Pharma Secrets

Security experts are warning corporates to redouble their efforts to guard against the insider threat after federal prosecutors indicted five people including two scientist at GlaxoSmithKline on charges of stealing trade secrets. The two research scientists, Yu Xue and Lucy Xi, are said to have emailed and downloaded information on around a dozen products to co-conspirators who wanted to “market and sell” the trade secrets through a newly formed Chinese company they set up: Renopharma. Many of the products targeted were designed to treat cancer or other serious diseases.UK managing director at access management firm 8MAN, argued that managers need to exercise vigilance round-the-clock – especially in industries which generate valuable IP like pharmaceuticals.


No Safe Harbor Is Coming — CISA Made Sure Of It

European Union privacy regulators will meet in Brussels Feb. 2, and hope to decide at that time whether and how data transfers to the United States should continue. The U.S. also didn’t improve matters when they delayed action this week on the proposed Judicial Redress Act, which would allow European citizens to sue the U.S. if law enforcement agencies misused their personal data. The US Attorney General and the Department of Homeland Security have been given 60 days from the passage of the law to issue more guidelines on how precisely cyber threat indicators must be shared. The details of those rules will provide a clearer picture of what data government agencies may and may not obtain.