Mon.Nov 16, 2020

article thumbnail

Ticketmaster Fined $1.7 Million for Data Security Failures

Data Breach Today

Following Alerts of Potential Fraud, Ticketmaster Took 9 Weeks to Spot Big Breach Ticketmaster UK has been fined $1.7 million by Britain's privacy watchdog for its "serious failure" to comply with the EU's General Data Protection Regulation. Its failure to properly secure chatbot software led to attackers stealing at least 9.4 million payment card details.

Security 337
article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Most of time we take for granted the degree to which fundamental components of civilization are steeped in mathematics. Everything from science and engineering to poetry and music rely on numeric calculations. Albert Einstein once observed that “pure mathematics is, in its way, the poetry of logical ideas.” Related: How Multi Party Computation is disrupting encrypti on An accomplished violinist, Einstein, no doubt, appreciated the symmetry of his metaphor.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IoT Supply Chains: Where Risks Abound

Data Breach Today

ENISA Releases Guidance on Reducing IoT Supply Chain Risk IoT devices are like sausages: They're full of components of varying quality, and it's invariably disturbing to think about their origins. New guidance helps address how to reduce the risk of potentially vulnerable components in connected devices.

IoT 275
article thumbnail

On Blockchain Voting

Schneier on Security

Blockchain voting is a spectacularly dumb idea for a whole bunch of reasons. I have generally quoted Matt Blaze : Why is blockchain voting a dumb idea? Glad you asked. For starters: It doesn’t solve any problems civil elections actually have. It’s basically incompatible with “software independence”, considered an essential property.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Healthcare Supply Chain Security: Updated Guidance

Data Breach Today

With the escalation of cyberattacks on the healthcare sector during the COVID-19 pandemic, supply chain partners need to strengthen their security controls and defenses, say Vishwas Gadgil of pharmaceutical firm Merck and Ed Gaudet of the consultancy Censinet. They describe updated guidance on the subject.

More Trending

article thumbnail

Unprotected database exposed a scam targeting 100K+ Facebook accounts

Security Affairs

Researchers discovered an ElasticSearch database exposed online that contained data for over 100000 compromised Facebook accounts. Researchers at vpnMentor discovered an ElasticSearch database exposed online that contained an archive of over 100.000 compromised Facebook accounts. The archive was used by crooks as part of a global hacking campaign against users of the social network. “We discovered the scam via an unsecured database used by the fraudsters to store private data belonging to

Archiving 109
article thumbnail

Cybercrime Moves to the Cloud to Accelerate Attacks Amid Data Glut

Threatpost

A report on the underground economy finds that malicious actors are offering cloud-based troves of stolen data, accessible with handy tools to slice and dice what's on offer.

Cloud 114
article thumbnail

Lazarus malware delivered to South Korean users via supply chain attacks

Security Affairs

North Korea-linked Lazarus APT group is behind new campaigns against South Korean supply chains that leverage stolen security certificates. . Security experts from ESET reported that North-Korea-linked Lazarus APT (aka HIDDEN COBRA ) is behind cyber campaigns targeting South Korean supply chains. According to the experts the nation-state actors leverage stolen security certificates from two separate, legitimate South Korean companies. .

article thumbnail

Hacked Security Software Used in Novel South Korean Supply-Chain Attack

Threatpost

Lazarus Group is believed to be behind a spate of attacks that leverage stolen digital certificates tied to browser software that secures communication with government and financial websites in South Korea.

Security 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Global Pandemic Fuels Cyber-Threat Workload for National Cyber Security Centre, Shows Annual Review

Dark Reading

From securing the Nightingale hospitals to tackling threats to vaccine research and production, a large part of the National Cyber Security Centre's (NCSC) recent work in the UK has been related to the coronavirus pandemic, as Ron Alalouff discovered when reporting on its Annual Review.

Security 103
article thumbnail

Exposed Database Reveals 100K+ Compromised Facebook Accounts

Threatpost

Cybercriminals left an ElasticSearch database exposed, revealing a global attack that compromised Facebook accounts and used them to scam others.

Security 119
article thumbnail

DICOM file security: How malware can hide behind HIPAA-protected images via Security Boulevard

IG Guru

Check out this interested article here. Photo by Owen Beard on Unsplash. The post DICOM file security: How malware can hide behind HIPAA-protected images via Security Boulevard appeared first on IG GURU.

article thumbnail

European Commission Releases Draft Standard Contractual Clauses for Article 28 Data Processing Agreements

Hunton Privacy

On November 12, 2020, somewhat in the shadow of the new standard contractual clauses for data transfers to recipients outside the European Economic Area (“EEA”), the European Commission also adopted draft standard contractual clauses to be used between controllers and processors in the EEA (“EEA Controller-Processor SCCs”). The EEA Controller-Processor SCCs are aimed at assisting organizations that rely on third parties in the EEA to perform certain data processing activities on their behalf ( i

GDPR 88
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

US: As expected, California ballot initiative passes, significantly altering the California Consumer Privacy Act

DLA Piper Privacy Matters

As the business community takes stock of (and impatiently waits for) 2020 election results, it should place particular significance on the passage of Proposition 24, the California Privacy Rights Act (CPRA) by about a 12 percent margin. The CPRA makes significant changes to the California Consumer Privacy Act (CCPA), which was originally passed by the California legislature in 2018.

Privacy 84
article thumbnail

Citrix SD-WAN Bugs Allow Remote Code Execution

Threatpost

The bugs tracked as CVE-2020–8271, CVE-2020–8272 and CVE-2020–8273 exist in the Citrix SD-WAN Center.

Cloud 114
article thumbnail

Breakdown of a Break-in: A Manufacturer's Ransomware Response

Dark Reading

The analysis of an industrial ransomware attack reveals common tactics and proactive steps that businesses can take to avoid similar incidents.

article thumbnail

International: Data protection compensation claims, Webinar, 2 December 2020

DLA Piper Privacy Matters

Data protection compensation claims are on the rise. Buoyed by front page press coverage of high profile data incidents, claims management companies and lawyers are looking to develop their practices in this area and are actively seeking out individuals who may have been affected. But it is not just the headline grabbing incidents that challenge businesses – cyber security and data protection incidents occur on a daily basis.

GDPR 75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

You are what you eat, so what are you feeding your VIM?

OpenText Information Management

Are you getting the most from your Vendor Invoice Management (VIM) solution? Many businesses that have invested in a VIM solution to manage their cashflow are making strategic decisions based on an incomplete picture. In today’s world, anything less than a 100% digital B2B partner community increases the risk of lost invoices, bad data from … The post You are what you eat, so what are you feeding your VIM?

B2B 75
article thumbnail

Zoom Debuts New Tools to Fight Meeting Disruptions

Dark Reading

Two new capabilities in version 5.4.3 let hosts and co-hosts pause Zoom meetings to remove and report disruptive attendees.

99
article thumbnail

Important Changes to the Singapore Data Privacy Regime

Data Matters

On November 2, 2020, Singapore’s legislature finally approved amendments to the Personal Data Protection Act (PDPA). The changes become law once a government gazette is passed (possibly before the end of 2020). If you operate in Singapore, handle Singapore data, or maintain a server in Singapore, it is crucial that you have protocols in place to guide employees on what to do when a data breach occurs and consider doing a data breach tabletop exercise.

article thumbnail

A Call for Change in Physical Security

Dark Reading

We're at an inflection point. The threats we face are dynamic, emerging, and global. Are you ready?

Security 107
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Crooks use software skimmer that pretends to be a security firm

Security Affairs

Security experts from Sucuri analyzing a software skimmer that is abusing its brand name in order to evade detection. Researchers at Sucuri analyzed a software skimmer that is using their brand name in order to evade detection. The e-skimmer is a base64-encoded JavaScript blob that attackers inject into target webpages. During a routine investigation, the researchers found the web skimmer that pretends to be related to Sucuri , the malicious code was injected into the database of a Magento site

article thumbnail

Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment

Thales Cloud Protection & Licensing

Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment. sparsh. Tue, 11/17/2020 - 06:44. Healthcare providers are at the epicenter of the fight against coronavirus. While the pandemic accelerated their digital transformation initiatives, it also expanded their threat surface and opened up opportunities for cybercriminals.

article thumbnail

What Did Ediscovery pros say in the Benchmark Collaboration Data Survey?

Hanzo Learning Center

Does your organization use a collaboration platform like Slack to keep employees connected and coordinated as they work remotely? If so, you may have found that it’s largely replaced email for internal communications. But those communications are still discoverable. Are you prepared to preserve and collect the data within your collaboration app if it becomes relevant to a potential litigation issue?

article thumbnail

“We are experiencing longer than normal wait times”

OpenText Information Management

Recent events have resulted in increasingly difficult conditions in which to run a business, disrupting even the most efficient and well-prepared company’s ability to operate and deliver products and services. Despite the challenges of our current reality, compromising customer responsiveness should be avoided at all costs. Whether it be a customer order, delivery inquiry, or … The post “We are experiencing longer than normal wait times” appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CGI Client Global Insights: Six ways retail and consumer organizations can accelerate their digital journey

CGI

CGI Client Global Insights: Six ways retail and consumer organizations can accelerate their digital journey. In this blog, Jean offer recommendations to accelerate digitization to deliver growth, strengthen market position and build resilience. ravi.kumarv@cgi.com. Mon, 11/16/2020 - 08:04.

Retail 52
article thumbnail

What’s new in OpenText Enterprise Applications CE 20.4

OpenText Information Management

OpenText™ Cloud Editions (CE) 20.2 focused heavily on the cloud centric architecture of our Enterprise Application solutions. As we move into CE 20.4, there are key launches for several of our Enterprise Application solutions. These can be loosely categorized into new capabilities and new integration options as follows. Extended ECM for SAP OpenText™ Extended ECM … The post What’s new in OpenText Enterprise Applications CE 20.4 appeared first on OpenText Blogs.

ECM 57
article thumbnail

A timely Christmas gift ? librarians and knowledge specialists in health

CILIP

A timely Christmas gift ? librarians and knowledge specialists in health. When in October this year, the BMA published its statistics on the impact of COVID-19 on the capacity of the NHS, they made for sobering reading. The figures show a decline in outpatient attendances of nearly 13.4m for August and September as the NHS re-focused on critical care for people with coronavirus symptoms.