Wed.Feb 05, 2020

article thumbnail

When Your Used Car is a Little Too ‘Mobile’

Krebs on Security

Many modern vehicles let owners use the Internet or a mobile device to control the car’s locks, track location and performance data, and start the engine. But who exactly owns that control is not always clear when these smart cars are sold or leased anew. Here’s the story of one former electric vehicle owner who discovered he could still gain remote, online access to his old automobile years after his lease ended.

article thumbnail

FBI Reportedly Says DDoS Attack Targeted Voter Registration

Data Breach Today

State Voter Registration Website Repeatedly Targeted The FBI reportedly warned this week that attackers repeatedly attempted to disrupt a state's voter registration and information website with a distributed denial-of-service attack.

268
268
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Keep the train rolling: partner momentum in the data science market

IBM Big Data Hub

How has the newer data science technology such as Watson Studio, Watson Machine Learning and Watson OpenScale been picked up by the business partner community? I mentioned in our previous blog that I was pleasantly surprised at how many IBM Business Partners have established a Data Science practice. The new data science technology has been very well received by our partner community.

article thumbnail

New Ransomware Targets Industrial Controls: Report

Data Breach Today

Dragos Researchers Describe Potential Threat Posed by Ekans Ransomware Ekans, a recently discovered ransomware variant that's designed to target industrial control systems, appears to have some of the same characteristics found in Megacortex, malware that struck several high-profile targets in 2019, according to the security firm Dragos.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Microsoft detects 77,000 active web shells on a daily basis

Security Affairs

Microsoft published an interesting report that investigates web shell attacks, the IT giant says it detects 77,000 active web shells daily. According to a report published by Microsoft, the company detects an average of 77,000 active web shells, spreading across 46,000 infected servers, on a daily base. A web shell is a code, often written in typical web development programming languages (e.g., ASP, PHP, JSP), that attackers implant on web servers to gain remote access and code execution.

Access 88

More Trending

article thumbnail

Cisco Flaws Put Millions of Workplace Devices at Risk

WIRED Threat Level

Five vulnerabilities in Cisco Discovery Protocol make it possible for a hacker to take over desk phones, routers, and more. .

Risk 103
article thumbnail

Britain's 5G Lesson: Choose or Choice Will Be Made for You

Data Breach Today

Delay in Decision-Making Left Government With Little Room to Maneuver British leaders' failure to more quickly choose and pursue a specific path for the nation's 5G rollout meant that ultimately, the decision got made for them, despite many security concerns persisting over the use of Chinese-built telecommunications gear.

article thumbnail

Expert released PoC exploit code for unpatched backdoor in HiSilicon chips

Security Affairs

Researcher published details about a backdoor mechanism he found in HiSilicon chips, but he did not report it to the vendor due to the lack of trust in it. The Russian security expert Vladislav Yarmak has published technical details about a backdoor mechanism he discovered in HiSilicon chips. The backdoor mechanism could allow attackers to gain root shell access and full control of device.

article thumbnail

Australian Delivery Firm Confirms Ransomware Attack

Data Breach Today

Toll Group Attempts to Restore Systems; Some Deliveries Delayed Australian transportation and logistics firm Toll Group has confirmed that it sustained a ransomware attack earlier this month that has forced the company to shut down several of its systems and led to delays in deliveries.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

European parliament says it will not use facial recognition tech

The Guardian Data Protection

Statement comes after leaked memo on use of technology in security provoked outcry The European parliament has insisted it has no plans to introduce facial recognition technology after a leaked internal memo discussing its use in security provoked an outcry. A page on the European parliament’s intranet, seen by the Guardian, suggested that facial recognition could be used “in the context of biometric-based security and services to members [MEPs]”.

IT 81
article thumbnail

Ireland's Privacy Watchdog Probing Google's Data Use

Data Breach Today

Investigation Comes After Numerous Consumer Complaints Ireland's Data Protection Commission is launching an investigation into how Google uses customer data for its location services after the privacy watchdog received numerous complaints from consumer rights organizations across the European Union.

Privacy 147
article thumbnail

The French data protection authority (CNIL) adopts a new standard on whistleblowing systems

Data Protection Report

At the end of 2019, following a public consultation, the CNIL adopted its much-anticipated “ standard ” on whistleblowing systems. The “standard” is essentially a reference document which serves as guidance for those implementing whistleblowing systems. This new standard replaces the single authorisation AU-004 of 22 June 2017 (as amended) which, since the GDPR came into force, no longer has legal force.

GDPR 76
article thumbnail

The Iowa Caucus: No Hacking, But a Bungled Risk Matrix

Data Breach Today

In 2020, Best to Play It Safe With Technology and Elections If Iowa's experiment with a new tabulation app during the Democratic caucuses is the warmup for the 2020 presidential election process, then we're in for a bumpy ride. But what happened there isn't a technology problem. It's a human problem rooted in a failure to properly evaluate risk.

Risk 113
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Behind the scenes work is key to CPOE success

OpenText Information Management

When a clinical lab places a key part of their business operation in another company’s “hands“, they trust that the partner’s entire team understands the importance of tailoring a lab integration solution to meet the specific needs of each lab or imaging client. As one of the people present at the start of OpenText™ EMR-Link™, … The post Behind the scenes work is key to CPOE success appeared first on OpenText Blogs.

Cloud 70
article thumbnail

WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE

Threatpost

A high-severity vulnerability could allow cybercriminals to push malware or remotely execute code, using seemingly innocuous messages.

article thumbnail

Dropbox paid more than $1 Million via its bug bounty program

Security Affairs

File hosting service company Dropbox paid out $1 million for vulnerabilities reported by researchers through its bug bounty program. Since the launch of its bug bounty program in 2014, the file-hosting company Dropbox has paid out $1 million to date for vulnerabilities reported by researchers. “Our bug bounty program recently passed a significant milestone.

IT 70
article thumbnail

Vixie: The Unintended Consequences of Internet Privacy Efforts

Dark Reading

Paul Vixie says emerging encryption protocols for endpoints could 'break' security in enterprise - and even home - networks.

Privacy 85
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Gamaredon APT Improves Toolset to Target Ukraine Government, Military

Threatpost

The Gamaredon advanced persistent threat (APT) group has been supercharging its operations lately, improving its toolset and ramping up attacks on Ukrainian national security targets. Vitali Kremez, head of SentinelLabs, said in research released on Wednesday that he has been tracking an uptick in Gamaredon cyberattacks on Ukrainian military and security institutions that started in […].

article thumbnail

Department of Energy Adds Attivo Decoys for Critical Infrastructure Security

Dark Reading

The decoys and lures will help redirect attacks away from devices that can't be protected through traditional means.

article thumbnail

New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers

Threatpost

Malware campaign targets global manufacturers that are still dependent on Windows 7 subsystems to run fleets of IoT endpoints.

article thumbnail

IoT Malware Campaign Infects Global Manufacturing Sites

Dark Reading

The infection uses Lemon_Duck PowerShell malware variant to exploit vulnerabilities in embedded devices at manufacturing sites.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Thank you, City of Port Arthur!

The Texas Record

Last week, Bonnie Zuber and I were given the opportunity to speak to various local entities about managing electronic records. To say it was lively would be an understatement! Thank you all for being engaged with our material and thinking of innovative solutions to managing electronic records. Bonnie and I felt more than welcome by every Port Arthur official in attendance.

article thumbnail

CamuBot Banking Trojan Returns In Targeted Attacks

Threatpost

The malware is back in targeted attacks against Brazilian banking customers, this time using a new technique that involves mobile app authorization.

article thumbnail

Top AI trends to expect in manufacturing, agriculture and government

Information Management Resources

While it’s impossible to predict the future with certainty, technologies that incorporate AI and automation are maturing at an incredibly rapid rate across some industries.

article thumbnail

What is a Privileged Access Workstation (PAW)?

Dark Reading

Ask the Experts -- about a technological game of keep-away that protects the most precious resources from the greatest dangers.

Access 58
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Maryland Court Finds Coverage for Lost Data and Slow Computers After Ransomware Attack

Hunton Privacy

As previously posted on our Hunton Insurance Recovery blog , a Maryland federal court awarded summary judgment to policyholder National Ink in National Ink and Stitch, LLC v. State Auto Property and Casualty Insurance Company , finding coverage for a cyber attack under a non-cyber insurance policy after the insured’s server and networked computer system were damaged as a result of a ransomware attack.

article thumbnail

Emotet Preps for Tax Season with New Phishing Campaign

Dark Reading

Malicious emails in a new attack campaign contain links and attachments claiming to lead victims to W-9 forms.

article thumbnail

Tree Code

Schneier on Security

Artist Katie Holten has developed a tree code (basically, a font in trees), and New York City is using it to plant secret messages in parks.

IT 77