Tue.Jun 11, 2019

article thumbnail

Unsecured Database Leaves 8.4 TB of Email Metadata Exposed

Data Breach Today

Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4 TB of email metadata. While it's not clear if anyone accessed the data, an attacker could have seen all email being sent or received by a specific person.

Metadata 252
article thumbnail

CNIL Fines French Real Estate Service Provider for Data Security and Retention Failures

Hunton Privacy

On June 6, 2019, the French Data Protection Authority (the “CNIL”) announced that it levied a fine of €400,000 on SERGIC, a French real estate service provider, for failure to (1) implement appropriate security measures and (2) define data retention periods for the personal data of unsuccessful rental candidates. Background. SERGIC provides real estate services through its website, which allows rental candidates to download any supporting documentation that may be required for the allocation of

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Border License Plate and Traveler Photos Exposed

Data Breach Today

Hack Attack Victim May Be Contractor Perceptics; Stolen Data Spotted on Dark Web License plate and traveler photos collected at the U.S. border have been compromised after a federal government subcontractor was hacked. While Customs and Border Protection officials claim the image data hasn't been seen online, security experts say it's already available for download via a darknet site.

article thumbnail

The CCPA Ripple Effect: Nevada Passes Privacy Legislation

Data Matters

With about half a year to go until the California Consumer Privacy Act (CCPA)’s effective date, and with significant amendments still percolating to define the scope and impact of the CCPA come 2020, other states continue to consider whether to adopt new and broader privacy laws of their own, with Nevada recently taking the distinction of being the first to follow the CCPA trend.

Privacy 76
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

UK Man Sentenced for 2015 TalkTalk Hack

Data Breach Today

22-Year-Old Also Attacked His Former School The fallout from the 2015 TalkTalk hack continues as a 22-year-old U.K. man was sentenced to jail Monday for his role in the attack and other cybercrimes, including an attack against his former school.

165
165

More Trending

article thumbnail

No Invitation Required: Hackers Can Phish Evite Users

Data Breach Today

Social-Planning Website Says Pre-2014 User Database Has Been Stolen Online invitation site Evite has been hacked and information on an unspecified number of users stolen. In a data minimization fail, the breach apparently dates from earlier this year, but it's been tied to "an inactive data storage file associated with Evite user accounts" from before 2014.

Phishing 152
article thumbnail

Vulnerability in WordPress Live Chat Plugin allows to steal and hijack sessions

Security Affairs

Security researchers at Alert Logic have discovered a vulnerability in the WordPress Live Chat plugin that could be exploited to steal and hijack sessions. Experts at Alert Logic have discovered a vulnerability in the popular WordPress Live Chat plugin that could be exploited by an unauthorized remote attacker to steal chat logs or manipulate chat sessions.

article thumbnail

Boosting Secure Coding Practices

Data Breach Today

Carlos Pero of Zurich Insurance on Gaining Buy-In Carlos Pero, who heads cyber application security at Zurich Insurance, discusses how to get developers to buy in to secure coding practices.

Insurance 158
article thumbnail

Getting Up to Speed on Magecart

Dark Reading

Greater awareness of how Magecart works will give your company a leg up on the growing threat from this online credit card skimmer. Here are four places to start.

85
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Shifting Sands of Financial Fraud

Data Breach Today

Trace Fooshee of Aite Group on the Top Emerging Trends What are the top trends shaping the rising tide of financial fraud in 2019, and what can security professionals expect in the months and years to come? Trace Fooshee of Aite Group discusses changes in the fraud landscape.

Security 136
article thumbnail

Resourceful Records Managers

The Schedule

Finally… an installment of resourceful records managers! This time we are featuring Holly Dolan, Denton County – Records Management Officer! If you want to be featured, please fill out the form here. (Photo coming soon!). 1. What led you to choose your current career in Records Management? Like so many records managers, I kind of fell into it!

article thumbnail

What Stands Out in Proposed Premera Lawsuit Settlement?

Data Breach Today

What stands out most about a proposed $74 million settlement of a class action lawsuit against Premera Blue Cross in the wake of a 2014 data breach? Technology attorney Steven Teppler offers insights in this interview.

article thumbnail

OpenText Discovery Project Manager Spotlight: Michael LaBrie

OpenText Information Management

Throughout Michael LaBrie’s career he’s had the opportunity to work on all sorts of different projects: Mergers and acquisitions, joint-defense groups (JDG), multi-district litigations (MDL), international antitrust matters, and everything in between. Now working as a Senior Project Manager on OpenText Discovery, Mike has worked with some of the smartest, most innovative lawyers on the … The post OpenText Discovery Project Manager Spotlight: Michael LaBrie appeared first on OpenText

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Cross-Site Scripting Errors Continue to Be Most Common Web App Flaw

Dark Reading

In vulnerability disclosure programs, organizations are paying more in total for XSS issues than any other vulnerability type, HackerOne says.

87
article thumbnail

Think you’re not susceptible to phishing? Think again

IT Governance

A version of this blog was originally published on 8 January 2018. On average, one in ten emails is a phishing scam. With all that experience, you’d think we’d be pretty good at spotting malicious messages by now. According to a PhishMe survey , many of us think that’s the case. Very few respondents said they were likely to be lured by the most common pitfalls of phishing scams: Urgency: 10.7%.

article thumbnail

The New Next Level Certifications from Cisco: An Overview

ITPro.TV

As you may have heard, this week, Cisco announced their new Next Level IT certifications during the Cisco Live event. In this blog, resident Cisco and networking edutainer Ronnie Wong walks you through what’s new, what to study now, and what the announcement means to you. The New Kids on the Block: The new Cisco … Continue reading The New Next Level Certifications from Cisco: An Overview → The post The New Next Level Certifications from Cisco: An Overview appeared first on ITPr

IT 75
article thumbnail

Suppliers Spotlighted After Breach of Border Agency Subcontractor

Dark Reading

Attackers increasingly use third-party service providers to bypass organizations' security. The theft of images from US Customs and Border Protection underscores the weakness suppliers can create.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How Ursnif Evolves to Keep Threatening Italy

Security Affairs

For months the Italian users have been targeted by waves of malspam delivering infamous Ursnif variants, Yoroi-Cybaze ZLab detailed its evolution. Introduction. For months the Italian users have been targeted by waves of malspam delivering infamous Ursnif variants. Yoroi-Cybaze ZLab closely observed these campaigns and analyzed them to track the evolution of the techniques and the underlined infection chain, noticing an increasing sophistication.

article thumbnail

'Have I Been Pwned' Is Up for Sale

Dark Reading

Troy Hunt, who has been running HIBP solo for six years, launched "Project Svalbard" so the site can evolve with more resources, funding, and support.

Sales 81
article thumbnail

Radiohead Dropped 18 Hours of Unreleased Music to Screw Pirates

WIRED Threat Level

You can listen to the _OK Computer_–era tracks right here.

Security 111
article thumbnail

Leicester City FC fans’ financial details stolen in cyber attack

IT Governance

A troubled season for Leicester City FC just got worse, with the club announcing that a cyber criminal has broken into the club’s online shop and stolen fans’ financial details. The breach occurred between 23 April and 4 May 2019, potentially affecting anyone who has made a purchase through shop.lcfc.com. Cardholder names, card numbers, expiry dates and CVV numbers were all compromised.

GDPR 66
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

FBI Warns of Dangers in 'Safe' Websites

Dark Reading

Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.

88
article thumbnail

CIPL Responds to ICO Draft Code of Practice for Age Appropriate Design

Hunton Privacy

On May 31, 2019, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP submitted comments to the UK Information Commissioner’s Office (the “ICO”) public consultation on its draft code of practice for age appropriate design for online services (the “Code”). As we previously reported , the Code was published in accordance with the ICO’s obligation under section 123 of the Data Protection Act 2018 to prepare a code of practice on standards of age appropriate design of on

article thumbnail

Troy Hunt Looks to Sell Have I Been Pwned

Threatpost

"Project Svalbard" has commenced, as Hunt looks for the right company to take over the password-focused service.

article thumbnail

Workshop on the Economics of Information Security

Schneier on Security

Last week, I hosted the eighteenth Workshop on the Economics of Information Security at Harvard. Ross Anderson liveblogged the talks.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Data Breach Exposes 100K U.S. Traveler Photos, License Plates

Threatpost

A recent breach of U.S. Customs and Border Protection traveler photo and license plate data has led experts to condemn the collection and storage of facial recognition data.

article thumbnail

Adobe Patch Tuesday updates fix code execution issues in Campaign, ColdFusion, and Flash

Security Affairs

Adobe Patch Tuesday updates for June 2019 address several critical arbitrary code execution flaws in Flash Player, ColdFusion and Campaign products. Adobe Patch Tuesday security updates for June 2019 address some critical arbitrary code execution vulnerabilities in Flash Player, ColdFusion and Campaign products. Adobe fixed critical command injection, file extension blacklist bypass and deserialization vulnerabilities in ColdFusion.

Risk 54
article thumbnail

Critical Adobe Flash, ColdFusion Vulnerabilities Patched

Threatpost

Adobe issued patches for 11 vulnerabilities overall across its Flash, ColdFusion and Campaign products.

IT 77