Tue.Aug 11, 2020

article thumbnail

Microsoft Patch Tuesday, August 2020 Edition

Krebs on Security

Microsoft today released updates to plug at least 120 security holes in its Windows operating systems and supported software, including two newly discovered vulnerabilities that are actively being exploited. Yes, good people of the Windows world, it’s time once again to backup and patch up! At least 17 of the bugs squashed in August’s patch batch address vulnerabilities Microsoft rates as “critical,” meaning they can be exploited by miscreants or malware to gain complete,

article thumbnail

Snapdragon Chip Flaws Could Facilitate Mass Android Spying

Data Breach Today

1 Billion Devices at Risk; Qualcomm Is Prepping Patches for OEMs to Push to Users Qualcomm is prepping patches for its Snapdragon Digital Signal Processor, used in an estimated 1 billion or more Android devices, after researchers at Check Point counted 400 flaws that attackers could exploit to take control of devices and steal all data they store.

Risk 290
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

[Podcast] Titans of Technology Innovation

AIIM

All around us, technology is changing everything. Many can remember having to go to their local video store to rent a movie. Now, with the click of a button from the comfort of your own living room, you can access an endless amount of streaming movies. Even the simpler things in life, like flipping on a light switch, are being replaced by technology.

article thumbnail

University Investigates Skimming of Credit Card Data

Data Breach Today

Hackers Targeted Michigan State University's Online Store for Months Michigan State University is investigating how hackers were able to steal credit card data from the school's online shopping site over a nine-month period.

276
276
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

TeamViewer flaw can allow hackers to steal System password

Security Affairs

A severe vulnerability impacting TeamViewer for Windows, tracked as CVE 2020-13699, could be exploited by remote attackers to steal the system password. TeamViewer has recently addressed a high-risk vulnerability ( CVE 2020-13699 ), that could be exploited by remote attackers to steal system password and potentially compromise it. TeamViewer is a popular software application for remote control, desktop sharing, online meetings, web conferencing and file transfer between computers.

Passwords 139

More Trending

article thumbnail

Flaws in ‘Find My Mobile’ exposed Samsung phones to hack

Security Affairs

A researcher found multiple flaws in Samsung’s Find My Mobile that could have been chained to perform various malicious activities on Samsung Galaxy Phones. The security researcher Pedro Umbelino from Portugal-based cybersecurity services provider Char49 discovered multiple vulnerabilities in Samsung’s Find My Mobile that could have been chained to perform various malicious activities on Samsung Galaxy Phones. “There are several vulnerabilities in the Find My Mobile package that can ultima

Access 133
article thumbnail

Kaspersky: DDoS Attacks Spike During COVID-19 Pandemic

Data Breach Today

Attacks Increased in Second Quarter as Remote Workforce Grew Researchers at the security firm Kaspersky say distributed denial-of-service attacks increased dramatically in the second quarter, most likely as a result of the shift to a remote workforce because of the COVID-19 pandemic.

Security 213
article thumbnail

Samsung Quietly Fixes Critical Galaxy Flaws Allowing Spying, Data Wiping

Threatpost

Four critical-severity flaws were recently disclosed in the Find My Mobile feature of Samsung Galaxy smartphones, which if exploited could allow attackers to force a factory reset on the phones or spy on users.

Security 123
article thumbnail

CNIL Adopts Its First Sanction as Lead Supervisory Authority, Fining French Online Shoe Retailer

Hunton Privacy

On August 5, 2020, the French Data Protection Authority (the “CNIL”) announced that it has levied a fine of €250,000 on French online shoe retailer, Spartoo, for various infringements of the EU General Data Protection Regulation (“GDPR”). This is the first penalty under the GDPR enforced by the CNIL as the lead supervisory authority (“Lead SA”) in cooperation with other EU supervisory authorities (“SAs”).

Retail 114
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Avaddon ransomware operators have launched their data leak site

Security Affairs

Avaddon ransomware operators, like other cybercrime groups, decided to launch a data leak site where publish data of victims who refuse to pay a ransom demand. Avaddon ransomware operators announced the launch of their data leak site where they will publish the data stolen from the victims who do not pay a ransom demand. The first group to adopt this strategy was the Maze ransomware gang in December 2019, since then other crews adopted the same stratefy, including REvil , Nefilim , and Netwalker

article thumbnail

Zero-Trust Security 101

Dark Reading

What are the tenets and fundamental spirit of zero-trust architecture -- without the marketing speak?

Security 140
article thumbnail

Cybersecurity Skills Gap Worsens, Fueled by Lack of Career Development

Threatpost

The fundamental causes for the skill gap are myriad, starting with a lack of training and career-development opportunities.

article thumbnail

Securely managing Apple through a device lifecycle

Jamf

The standard of Apple device management and security has risen a great deal in the past few years. Apple admins should take advantage of this by incorporating current and forward-thinking security measures into the entire lifecycle of the Apple devices they manage.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Two 0-Days Under Active Attack, Among 120 Bugs Patched by Microsoft

Threatpost

One of the two zero-day bugs is rated ‘critical’ and is classified as a remote code-execution bug impacting Microsoft’s Internet Explorer.

117
117
article thumbnail

Microsoft Patches 120 Vulnerabilities, Two Zero-Days

Dark Reading

The August 2020 Patch Tuesday marks the sixth month in a row Microsoft released patches for more than 110 vulnerabilities.

111
111
article thumbnail

Agent Tesla Spyware Adds Fresh Tricks to Its Arsenal

Threatpost

The RAT is surging in 2020, becoming more prevalent than even the infamous TrickBot or Emotet malware.

IT 114
article thumbnail

Zoom Vulnerabilities Demonstrated in DEF CON Talk

Dark Reading

A security researcher demonstrated multiple vulnerabilities, two of which could let an attacker read and steal user data.

Security 106
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Critical Intel Flaw Afflicts Several Motherboards, Server Systems, Compute Modules

Threatpost

A critical privilege-escalation flaw affects several popular Intel motherboards, server systems and compute modules.

Security 103
article thumbnail

Researchers Trick Facial-Recognition Systems

Dark Reading

Goal was to see if computer-generated images that look like one person would get classified as another person.

110
110
article thumbnail

Critical Adobe Acrobat and Reader Bugs Allow RCE

Threatpost

Adobe patched critical and important-severity flaws tied to 26 CVEs in Acrobat and Reader.

115
115
article thumbnail

Developers Need More Usable Static Code Scanners to Head Off Security Bugs

Dark Reading

As companies "shift left" -- pushing more responsibility for security onto developers -- the tools that are available are falling short, usability researchers say.

Security 116
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Collecting and Selling Mobile Phone Location Data

Schneier on Security

The Wall Street Journal has an article about a company called Anomaly Six LLC that has an SDK that's used by "more than 500 mobile applications." Through that SDK, the company collects location data from users, which it then sells. Anomaly Six is a federal contractor that provides global-location-data products to branches of the U.S. government and private-sector clients.

Sales 106
article thumbnail

How to Help Spoil the Cybercrime Economy

Dark Reading

Cybercrime increasingly is turning into a commodity. Stolen PII data and hijacked cloud accounts especially propel the spread, research shows.

Cloud 97
article thumbnail

Guest post – Which generation of Chief Data Officer are you?

Collibra

This blog was originally published on LinkedIn and is featured on Collibra’s blog with the author’s consent. Are you evangelizing or delivering value from data at pace? Are you making change or adding value? How do you build a better Chief Data Officer? Join me for #CDOSummerSchool #DataLiteracy. Recently, I joined Carruthers and Jackson in collaboration with Collibra for the first week of the Chief Data Officer Summer School — pandemic edition!

article thumbnail

17 Essential Stats About the State of Consumer Privacy

Dark Reading

These illuminating numbers offer a glimpse into current consumer attitudes and enterprise readiness for protecting their customers' personal data.

Privacy 89
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

eDiscovery without the headaches

OpenText Information Management

This blog has been co-authored by Natasha Tieman, Rachel Teisch and Duncan Bradley. In any legal matter, the clock is the enemy. When litigation or investigations hit, organizations must quickly find proof of who said or did what. Legal and IT must work together to locate potential evidence and keep it safe to ensure it is … The post eDiscovery without the headaches appeared first on OpenText Blogs.

IT 69
article thumbnail

Symmetry Systems Emerges from Stealth

Dark Reading

Company behind Data Store and Object Security (DSOS) becomes public knowledge following a $3 million seed round of funding.

article thumbnail

Adobe Acrobat and Reader affected by critical flaws

Security Affairs

Adobe has released security updates to address twenty-six vulnerabilities in the Adobe Acrobat, Reader, and Lightroom products. Adobe has released security updates to address tens of vulnerabilities in Adobe Acrobat, Reader, and Lightroom products. Eleven out of twenty-six flaws are rated as ‘Critical’ because they could be exploited by attackers to remotely execute arbitrary code or bypass security features on vulnerable computers.