Wed.Jan 22, 2020

article thumbnail

Apple Addresses iPhone 11 Location Privacy Concern

Krebs on Security

Apple is rolling out a new update to its iOS operating system that addresses the location privacy issue on iPhone 11 devices that was first detailed here last month. Beta versions of iOS 13.3.1 include a new setting that lets users disable the “Ultra Wideband” feature, a short-range technology that lets iPhone 11 users share files locally with other nearby phones that support this feature.

Privacy 216
article thumbnail

BT and Vodafone Reportedly Want Huawei 5G Gear

Data Breach Today

Vodafone CEO Has Warned Huawei Ban Would Delay Britain's 5G Rollout by 2 Years Britain's two largest telecommunications firms - BT and Vodafone - plan to lobby Prime Minister Boris Johnson to not fully ban Huawei hardware from the nation's 5G rollout, warning that doing so could delay their rollouts, the Guardian reports.

181
181
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When Pressing Delete Is OK: Learn How to Eliminate ROT in Your Organization

AIIM

If your organization is like just about every other organization on the planet, you likely have some degree of an information management problem. Most likely, you create too much information, and you keep too much of it for too long. This causes enough problems by itself, but when you then add to the pile all the redundant, obsolete, and trivial (ROT) information you have in your systems, on your file shares, and in every other possible location, it’s a real nightmare.

ROT 119
article thumbnail

Updated FTCODE Ransomware Now Steals Credentials, Passwords

Data Breach Today

Revamped Malware Targets Browsers and Email Clients FTCODE, a ransomware strain that has been active since at least 2013, has recently been revamped to include new features, including the ability to steal credentials and passwords from web browsers and email clients, according to two research reports released this week.

Passwords 166
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Malware attack took down 600 computers at Volusia County Public Library

Security Affairs

System supporting libraries in Volusia County were hit by a cyber attack, the incident took down 600 computers at Volusia County Public Library (VCPL) branches. 600 staff and public access computers were taken down at Volusia County Public Library (VCPL) branches in Daytona Beach, Florida, following a cyberattack. The attack started around 7 AM on January 9, 2020. “The county’s technology staff were immediately notified and coordinated recovery efforts with library staff,” reads the

More Trending

article thumbnail

My Health Record: almost $2bn spent but half the 23m records created are empty

The Guardian Data Protection

The Australian government has spent $1.97bn since the system was introduced as the e-health record in 2009 A decade since it was first announced, the federal government has spent close to $2bn on its troubled My Health Record system, and half of the 23m records created lie empty almost a year after the government made the system opt-out. The former Labor government first proposed the e-health record system in 2009 as a means for patients, doctors and specialists to share patient history, X-rays,

article thumbnail

Documents Describe US Cyber Command's Campaign to Hack ISIS

Data Breach Today

Operation Faced a Number of Challenges, Including Data Storage The U.S. Cyber Command's campaign to hack ISIS and disrupt its media operations faced some challenges, including a lack of data storage, but ultimately proved successful, according to government documents from 2016 that were made public Tuesday.

article thumbnail

Half a Million IoT Device Passwords Published

Schneier on Security

It's a list of easy-to-guess passwords for IoT devices on the Internet as recently as last October and November. Useful for anyone putting together a bot network: A hacker has published this week a massive list of Telnet credentials for more than 515,000 servers, home routers, and IoT (Internet of Things) "smart" devices. The list, which was published on a popular hacking forum, includes each device's IP address, along with a username and password for the Telnet service , a remote access protoco

Passwords 126
article thumbnail

Saudi Arabia Hacked Amazon CEO Jeff Bezos' Phone: Report

Data Breach Today

While Saudis Dismiss Report, United Nations Demands Immediate Investigation The mobile phone of Amazon CEO Jeff Bezos was hacked via a malicious file sent directly from the official WhatsApp account of Saudi Arabia's Crown Prince Mohammed Bin Salman, investigators have concluded. While the Saudis deny involvement, the United Nations has called for an immediate investigation.

135
135
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

To Avoid Disruption, Ransomware Victims Continue to Pay Up

Dark Reading

For all the cautions against doing so, one-third of organizations in a Proofpoint survey said they paid their attackers after getting infected with ransomware.

article thumbnail

Report: Apple Scuttled Encryption Plans for iCloud Backups

Data Breach Today

Technology Giant Didn't Want to 'Poke the Bear,' Sources Tell Reuters Apple previously scuttled plans add end-to-end encryption to iCloud backups, Reuters reports, noting that such a move would have complicated law enforcement investigations. But the apparent olive branch hasn't caused the U.S. government to stop vilifying strong encryption and technology giants who provide it.

article thumbnail

Four technology predictions for public sector in 2020

OpenText Information Management

With the investment in technology and personnel training we are currently seeing, 2020 will be a year of reckoning for digital transformation initiatives in the public sector. Here are the four technology predictions for the public sector in 2020. Governments will look inwards as they approach citizen service modernization Public sector organizations all over the … The post Four technology predictions for public sector in 2020 appeared first on OpenText Blogs.

article thumbnail

Tips on Protecting Hospitals From Nation-State Attacks

Data Breach Today

In light of rising tensions between the U.S. and Iran, the Association of Executives in Healthcare Information Security recently issued new data security guidance to help the healthcare sector prepare for potential nation-state attacks, says CISO Christopher Frenz, one of the document's authors.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

The California Consumer Privacy Act: What Happened and What’s to Come

Data Matters

Last year ended with businesses scrambling to be ready for the California Consumer Privacy Act’s January 1 deadline. The CCPA’s entry into force did not, however, resolve implementation complexities or answer myriad questions about how the Act will be interpreted. Moreover, the California Attorney General will finalize regulations during 2020 that are likely to expand compliance obligations and narrow flexibility.

Privacy 79
article thumbnail

Break barriers in the data maturity curve with IBM Cloud Pak for Data and MongoDB

IBM Big Data Hub

As IBM’s leading platform for data and AI, Cloud Pak for Data integrates seamlessly with MongoDB to help data scientists and developers quickly scale the ladder to AI.

Cloud 79
article thumbnail

Everything We Know About the Jeff Bezos Phone Hack

WIRED Threat Level

A UN report links the attack on Jeff Bezos' iPhone X directly to Saudi Arabian Crown Prince Mohammed bin Salman.

article thumbnail

Cybersecurity Lessons Learned from 'The Rise of Skywalker'

Dark Reading

They're especially relevant regarding several issues we face now, including biometrics, secure data management, and human error with passwords.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hong Kong’s Reform of the Personal Data (Privacy) Ordinance (the “PDPO”): Bridging Troubled Waters

HL Chronicle of Data Protection

On Monday 20 January, the Constitutional and Mainland Affairs Bureau (“CMAB”), jointly with the Privacy Commissioner for Personal Data (“PCPD”), presented a paper outlining topics for review of the PDPO to the members of the Legislative Council Panel on Constitutional Affairs (“PDPO Review Paper”). The CMAB and the PCPD are expected to take panel members’ feedback on the PDPO Review Paper and undertake further in-depth study of the issues with a view to making specific proposals for

article thumbnail

New Muhstik Botnet Attacks Target Tomato Routers

Threatpost

Palo Alto Networks’ Unit 42 researchers observed a variant of the wormlike botnet that adds scanner technology to brute-force Web authentication.

article thumbnail

Threat Model Thursday: Files

Adam Shostack

There’s a fascinating talk by Dan Luu, “ Files are Fraught With Peril. ” The talk itself is fascinating, in a horrifying, nothing works, we’re going to give up and raise goats now sort of way. He starts from the startling decision of Dropbox to drop support for all Linux filesystems except Ext4. This surprising decision stems from the fact that a filesystem is a leaky abstraction, The interaction between performance and reliability means that fsync behaves strangely.

article thumbnail

Why DPOs and CISOs Must Work Closely Together

Dark Reading

Recent data protection laws mean that the data protection officer and CISO must work in tandem to make sure users' data is protected.

82
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propaganda

Security Affairs

US military claims to have disrupted the online propaganda activity of the Islamic State (ISIS) in a hacking operation dating back at least to 2016. In 2016, the US Cyber Command carried out successful operations against the online propaganda of the Islamic State (ISIS), this is what emerged from declassified national security top-secret documents released on Tuesday.

article thumbnail

For Mismanaged SOCs, The Price Is Not Right

Dark Reading

New research finds security operations centers suffer high turnover and yield mediocre results for the investment they require.

article thumbnail

Amazon executive challenges Facebook’s Clegg on user data privacy

Information Management Resources

Facebook has come under fire for giving third-parties access to user data, particularly in the wake of the Cambridge Analytica scandal.

article thumbnail

Elections Globally Are Under Threat. Here's How to Protect Them

WIRED Threat Level

A new report calls for safeguards to reduce the dangers posed by misinformation, online extremism, and social media manipulation.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

PoC Exploits Do More Good Than Harm: Threatpost Poll

Threatpost

More than half of security experts think that the good outweighs the bad when it comes to proof-of-concept exploits, according to a recent Threatpost poll.

article thumbnail

ICO Publishes Final Version of Its Age Appropriate Design Code

Hunton Privacy

On January 21, 2020, the UK Information Commissioner’s Office (“ICO”) published the final version of its Age Appropriate Design Code (“the code”), which sets out the standards that online services need to meet in order to protect children’s privacy. It applies to providers of information services likely to be accessed by children in the UK, including applications, programs, websites, social media platforms, messaging services, games, community environments and connected toys and devices, where t

IT 54
article thumbnail

Vivin Nets Thousands of Dollars Using Cryptomining Malware

Threatpost

A newly discovered threat actor named Vivin is raking in Monero from cryptomining malware, showing that this type of attack isn't going away anytime soon.