Tue.Oct 23, 2018

article thumbnail

Where Is the Secret Spying Chip Reported by Bloomberg?

Data Breach Today

Chorus of Criticism Against China Spying Contention Reaches New High Where is the secret spying chip devised by China that Bloomberg reported had worked its way into at least 30 companies, including Amazon and Apple? The report earlier this month alleging supply chain infiltration by China's People's Liberation Army triggered skepticism from the start - and it's growing.

IT 220
article thumbnail

5 tips to keep your data safe and secure

IT Governance

There is no escaping the threat of data breaches. Organisations are being warned about data breaches in the media, regulators are demanding improved information security and the public is getting more vocal when organisations make mistakes. You may well think that staying secure and pacifying all these groups is an expensive and seemingly impossible task.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analysis: Did Anthem's Security 'Certification' Have Value?

Data Breach Today

Insurer Was Certified as HITRUST CSF Compliant Before Its Mega-Breach Health insurer Anthem had earned HITRUST Common Security Framework certification before its mega-breach. Now that the insurer has agreed to a $16 million HIPAA settlement with federal regulators, who spelled out the company's security shortcomings, it's worth scrutinizing the value of adopting a framework.

Insurance 138
article thumbnail

EU Parliament Adopts Blockchain Resolution

Data Matters

On October 3, 2018, the European Parliament passed its long awaited resolution on distributed ledger technologies and blockchains (the “Blockchain Resolution”). The Blockchain Resolution was adopted to protect and empower EU citizens and businesses with respect to the specific issues that arise in relation to the blockchain or “distributed ledger” technology, one of which being the tension with data protection rights and the GDPR in general.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

It Started as an Online Gaming Prank. Then It Turned Deadly

WIRED Threat Level

A $1.50 wager on a "Call of Duty" match led to a fake 911 call reporting a violent hostage situation in Wichita. Here’s how it all went horribly awry.

IT 98

More Trending

article thumbnail

Russian Research Institute Was Actively Involved In TRITON ICS Attack Activity

Dark Reading

Data shows with a high degree of confidence that Moscow-based Central Scientific Research Institute of Chemistry and Mechanics helped develop and refine malware, FireEye says.

83
article thumbnail

Paper and the Case for Going Low-Tech in the Voting Booth

WIRED Threat Level

When considered as a form of tech, paper has a killer feature set: It’s intuitive, it doesn’t crash, and it doesn’t need a power source.

Paper 95
article thumbnail

For the first time Japanese commission ordered Facebook to improve security

Security Affairs

The Japanese government ordered Facebook to improve the protection of users’ personal information following the recent data breaches that exposed data from millions of people. At the end of September, Facebook admitted that attackers exploited a vulnerability in the “View As” feature that allowed them to steal Facebook access tokens of 50 Million Users.

article thumbnail

Open source IBM workflow, Mac authentication with Microsoft Azure Active Directory, and more from JNUC 2018 Keynote

Jamf

JNUC 2018 keynote unveilings: IBM open sourced its provisioning workflow for Mac choice program, Jamf Connect users are now able to authenticate Mac with Microsoft Azure Active Directory, SAP chooses Jamf to manage all Apple devices, and much more!

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

To Secure Medical Devices, the FDA Turns to Ethical Hackers

Security Affairs

The U.S. Food and Drug Administration (FDA) is embracing the work of ethical hackers and their researches to secure medical devices. Hacking is an ever-present concern in today’s highly connected society. People typically shudder to think about their smart speakers or home security systems getting compromised, and indeed, vulnerabilities in those devices would be traumatizing.

article thumbnail

The Countdown to Black Friday Has Begun. Are Retailers and Consumers Ready?

Thales Cloud Protection & Licensing

It’s hard to believe we are just a month away from the “unofficial” kick off of the holiday shopping season—Black Friday. So before the shopping frenzy begins, we thought this would be an opportune time to outline some best practices that both retailers and consumers should follow in order to protect consumer data. Customers are expecting more and more when it comes to their shopping experience, and this holiday season will push the envelope as retailers are making brick-and-mortar stores more d

Retail 70
article thumbnail

Chalubo, a new IoT botnet emerges in the threat landscape

Security Affairs

Security experts from Sophos Labs have spotted a new piece of IoT malware tracked as Chalubo that is attempting to recruit devices into a botnet used to launch DDoS attacks. Security experts from Sophos Labs have spotted a new piece of Linux malware tracked as Chalubo (ChaCha-Lua-bot) that is targeting IoT devices in an attempt to recruit them into a botnet used to launch DDoS attacks.

IoT 76
article thumbnail

The Browser Is the New Endpoint

Dark Reading

Given the role browsers play in accessing enterprise applications and information, it's time to rethink how we classify, manage, and secure them.

Access 82
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The new Azorult 3.3 is available in the cybercrime underground market

Security Affairs

A new version of the Azorult info-stealer appeared in the wild, it is able to steal more data, including other types of cryptocurrencies. A new version of the Azorult info-stealer appeared in the wild, it is able to steal more data, including other types of cryptocurrencies, and implements new features. The latest version of the Azorult was delivered through the RIG exploit kit as well as other sources, previous variants were mainly distributed via weaponized Office documents as attachment of

article thumbnail

ThreatList: 3 Out of 4 Employees Pose a Security Risk to Businesses

Threatpost

Finance-sector employees fared the worst in an awareness survey, with 85 percent showing some lack of cybersecurity and data privacy knowledge.

article thumbnail

Welcome to JNUC 2018

Jamf

Get the details on this year's Jamf Nation User Conference, and if you're not in the audience, see how you can tune in for the keynote livestreams.

75
article thumbnail

Russian Government-owned research institute linked to Triton attacks

Security Affairs

Security experts from FireEye found evidence that links the development of the Triton malware (aka Trisis and HatMan) to a Russian government research institute. In December 2017, experts from FireEye discovered a new strain of malware dubbed Triton that was specifically designed to target industrial control systems (ICS). The Triton malware has been used in attacks aimed at a critical infrastructure organization in the Middle East, experts speculate the involvement of a state-sponsored actor f

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New online training available for Jamf Pro subscription customers

Jamf

Offered to customers on our Jamf Pro subscription licensing model, the online Training Catalog presents an array of consumable, self-paced online content.

73
article thumbnail

Good Times in Security Come When You Least Expect Them

Dark Reading

Not every cybersecurity endeavor can have a huge impact. But a small percentage of your efforts can still produce results that blow you away.

article thumbnail

Learn workflows to erase and install or trigger in-place macOS upgrades

Jamf

See how you can prepare for and implement an in-place macOS Mojave upgrade, or if your environment calls for it, discover ways to completely erase and install macOS.

IT 68
article thumbnail

Battling Bots: How to Find Fake Twitter Followers

Dark Reading

Duo researchers explain the approach they used to detect automated Twitter profiles and uncover a botnet.

80
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Risk of interference in MEP elections growing, EU governments told

The Guardian Data Protection

Commission says Facebook scandal ‘wake-up call’ as it calls for monitoring network EU governments cannot treat the next year’s European parliamentary elections as “business as usual” given the growing risk of foreign and corporate manipulation, according to the European commission. The scandal over the misuse of Facebook data by Cambridge Analytica and the growing evidence of illegal interference in elections were described by the commission as a “wake-up call” to which national governments had

article thumbnail

Probing the Future of Augmented Reality

Synergis Software

For the past three years, I have been living a double life. No, I’m not a spy or hiding a second family. I gave in to my midlife crisis and went to graduate school in Germany. I didn’t give up my day job writing about engineering software and doing consulting. By the time you read this, I will have defended my thesis — like a mother bear defends a cub — and graduated.

article thumbnail

Identity and Access Management would prevent most of today’s data breaches

OpenText Information Management

This year, worldwide spending on cybersecurity is estimated to be over $120 billion yet research shows over 80% of data breaches are caused by stolen, weak or default passwords. It raises the question as to why some many organizations are investing heavily in protecting their perimeter and then leaving their front door open. A well-implemented … The post Identity and Access Management would prevent most of today’s data breaches appeared first on OpenText Blogs.

article thumbnail

Former HS Teacher Admits to 'Celebgate' Hack

Dark Reading

Christopher Brannan accessed full iCloud backups, photos, and other personal data belonging to more than 200 victims.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Don't Believe Everything You See About the Migrant Caravan

WIRED Threat Level

A migrant caravan traveling through Mexico is the latest news event to be weaponized online.

article thumbnail

Morrisons loses data leak appeal

IT Governance

Supermarket giant Morrisons has lost the latest round in the legal battle for compensation by thousands of its staff whose personal details were leaked on the Internet. The case reached the Court of Appeal on 9 October, and on 22 October Morrisons lost. The background. The 2014 breach saw Andrew Skelton, a disgruntled senior internal auditor, upload the details of 99,998 staff to data sharing websites.

article thumbnail

City Pays $2K in Ransomware, Stirs ‘Never Pay’ Debate

Threatpost

Many municipalities hit with ransomware don't have much of a choice when it comes to paying up, experts say.