Fri.Jan 11, 2019

article thumbnail

Government Shutdown: Experts Fear Deep Cybersecurity Impact

Data Breach Today

Readiness, Morale, Investigations and Recruitment at Risk as Standoff Persists The U.S. government shutdown is impacting agencies integral to the nation's cybersecurity readiness, and experts fear its long-term impact on the country's cyberattack response capabilities, as well as the risk that it will drive away desperately needed new cybersecurity talent from entering public service.

article thumbnail

Germany’s cyber security authority criticised for failing to disclose data breach

IT Governance

Germany’s BSI (Federal Office for Information Security) has come under fire for its alleged mishandling of a security incident in which the personal details of almost a thousand public figures, including Chancellor Angela Merkel, were stolen and published online. . The authority reportedly discovered the leak in December 2018, but didn’t notify the Federal Crime Office until Friday, 4 January 2019. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BEC Scam Leads to Theft of $18.6 Million

Data Breach Today

Chinese Hackers Stole From Indian Unit of Italian Firm In a case of business email compromise, Chinese hackers stole $18.6 million from the Indian arm of Tecnimont SpA, an Italian engineering company, through an elaborate cyber fraud scheme that included impersonating the firm's chief executive.

189
189
article thumbnail

Victims of Pylocky ransomware can decrypt their files for free

Security Affairs

Victims of the PyLocky Ransomware can use a tool released by security researcher Mike Bautista at Cisco Talos group to decrypt their files for free. I have good and bad news for the victims of the PyLocky Ransomware. The good news is that security researcher Mike Bautista at Cisco Talos group released a decryption tool that allows them to decrypt their files for free.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Why Are We So Stupid About Passwords? German Edition

Data Breach Today

Politicians' All-Star Password Picks: '123' and 'ILoveYou' German officials say the suspect behind the mega-leak of politicians' and celebrities' personal details exploited their weak passwords to access email, social media and cloud service accounts. What can the security industry do to help address the password problem?

Passwords 185

More Trending

article thumbnail

Card-Not-Present Fraud Costs Mount

Data Breach Today

A Juniper Research analysis of why card-not-present fraud will continue to grow leads this week's edition of the ISMG Security Report. Also featured: Updates on a Neiman Marcus breach lawsuit settlement and a German hacking incident.

Security 177
article thumbnail

British hacker sentenced to jail for attack on Liberian Telecoms firms

Security Affairs

The British hacker Daniel Kaye has been sentenced to 32 months in prison for the cyberattack on Liberian telecom firms. The British hacker Daniel Kaye (29) has been sentenced to 32 months in prison for the 2016 attack that took down telecommunications services in Liberia. Kaye pleaded guilty in December to two charges under the Computer Misuse Act and one charge of possessing criminal property.

Access 84
article thumbnail

'Right to Be Forgotten' Should Be EU-Only, Adviser Says

Data Breach Today

European Court of Justice Gets Non-Binding Legal Opinion From Advocate General Europe's "right to be forgotten" should not apply worldwide, but only inside the EU, according to a nonbinding opinion issued to the European Court of Justice by one of its advocate generals regarding a case that arose from a dispute between France's data privacy watchdog and Google.

article thumbnail

What is an information security policy?

IT Governance

It’s widely accepted that people are the weakest part of any organisation’s security defences. You can spend months designing flawless processes and you can invest in state-of-the-art technology to detect threats, but these both only work if the people using them know what they’re doing. That’s why information security policies are arguably the most important part of an organisation’s defence.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A Fraud-Fighting Strategy for P2P Payments

Data Breach Today

Customer lifecyle data management can play an important role in cracking down on fraud tied to the growth in real-time P2P payments, says David Barnhardt of the security firm GIACT.

Security 152
article thumbnail

Facebook staff discussed cashing in on user data, reports say

The Guardian Data Protection

Proposals to charge firms for data said to have been revealed by badly redacted court papers Facebook staff discussed charging companies for access to user data, before ultimately deciding against such a policy, according to reports. The internal discussions were revealed due to improperly redacted court documents, released as part of Facebook’s lawsuit against American software developer Six4Three last year.

Paper 76
article thumbnail

Boston Children's Hospital Hacker Gets Long Prison Sentence

Data Breach Today

Hacktivist Martin Gottesfeld Also Ordered to Pay Restitution A hacktivist who launched distributed denial-of-service attacks on Boston Children's Hospital and another local facility in 2014 has received a lengthy prison sentence and must pay restitution. But will the outcome of the case deter other hackers?

152
152
article thumbnail

Using a Fake Hand to Defeat Hand-Vein Biometrics

Schneier on Security

Nice work : One attraction of a vein based system over, say, a more traditional fingerprint system is that it may be typically harder for an attacker to learn how a user's veins are positioned under their skin, rather than lifting a fingerprint from a held object or high quality photograph, for example. But with that said, Krissler and Albrecht first took photos of their vein patterns.

IT 76
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The ‘AVE_MARIA’ Malware

Security Affairs

Ave Maria Malware – Phishing attempts spreading in the last days of the past year against an Italian organization operating in the Oil&Gas sector. The Cybaze -Yoroi ZLab researchers analyzed phishing attempts spreading in the last days of the past year against an Italian organization operating in the Oil&Gas sector. The malicious emails try to impersonate a supplier’s sales office sending invoices and shipping orders confirmations.

article thumbnail

Weekly Update 121

Troy Hunt

Well, it's one more sunny weekly update then snow time again so I've gone particularly beachy today. I'm also particularly breachy , talking about a massive combo list I'm presently pondering for inclusion in HIBP. These lists are frequently used for account takeover attacks against the likes of Spotify which is the subject of this week's blog post.

IT 71
article thumbnail

Who Takes Responsibility for Cyberattacks in the Cloud?

Dark Reading

A new CSA report addresses the issue of breach responsibility as more organizations move ERP application data the cloud.

Cloud 83
article thumbnail

Technology is a team sport

OpenText Information Management

The technology industry, much like technology itself, is full of possibility. Mei Dent, VP Engineering at OpenText™ knows first-hand how varied and inspiring a career in the tech industry can be. Having joined OpenText in 1995, Mei has now become a prominent leader in the company and a big proponent of diversity and inclusion – … The post Technology is a team sport appeared first on OpenText Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

ROI you can expect with Jamf

Jamf

Download the free Hobson & Company return on investment (ROI) report or fill in our ROI calculator to immediately see the time and cost savings you get with a purpose-built Apple device management solution.

65
article thumbnail

U.S. Government Shutdown Leaves Dozens of.Gov Websites Vulnerable

Threatpost

As the shutdown continues into its 21st day, dozens of.gov websites haven't renewed their TLS certificates.

article thumbnail

Government Shutdown Brings Certificate Lapse Woes

Dark Reading

Among the problems: TLS certificates are expiring and websites are becoming inaccessible.

article thumbnail

Yet Another Bypass: Is 2FA Broken? Authentication Experts Weigh In

Threatpost

A penetration testing tool called Modlishka can defeat two-factor authentication in the latest 2FA security issue. We asked a roundtable of experts what it all means.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

NotPetya Victim Mondelez Sues Zurich Insurance for $100 Million

Dark Reading

Mondelez files lawsuit after Zurich rejects claim for damages from massive ransomware attack.

article thumbnail

TA505 Crime Gang Debuts Brand-New ServHelper Backdoor

Threatpost

The latest malware from TA505 has been seen targeting banks, retailers and restaurants with two different versions.

Retail 66
article thumbnail

SCOTUS Says Suit Over Fiat-Chrysler Hack Can Move Forward

Dark Reading

A class-action suit over a 2015 attack demonstration against a Jeep Cherokee can move forward, US Supreme Court rules.

68
article thumbnail

A Worldwide Hacking Spree Uses DNS Trickery to Nab Data

WIRED Threat Level

Security researchers suspect that Iran has spent the last two years pilfering data from telecoms, governments, and more.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

6 Serverless and Containerization Trends CISOs Should Track

Dark Reading

Security leaders must stay on top of a fast-moving world of cloud deployment options.

Cloud 67
article thumbnail

Pre-Installed Android App Impacts Millions with Slew of Malicious Activity

Threatpost

The app was developed by legitimate Chinese manufacturing giant TCL.

article thumbnail

8 trends that will impact data management strategies in 2019

Information Management Resources

As organizations continued to see data volumes explode and an increasing number of employees need access to critical information, data cataloging considerations shifted from being a department level concern to an enterprise critical issue.

Access 47