Wed.Aug 28, 2019

article thumbnail

Police Trick Malware Gang Into Disinfecting 850,000 Systems

Data Breach Today

Retadup Gang's Malware Scheme Disrupted by French Police and Security Firm Avast French police say they've disrupted the operations of the Retadup malware gang by subverting attackers' command-and-control infrastructure to delete the malicious code from 850,000 infected PCs and servers worldwide. The move came after police received a tip and technical assistance from security firm Avast.

Security 214
article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. Yet that's not possible, because there is no longer any difference between those categories of devices. Consumer devices are critical infrastructure. They affect national security. And it would be foolish to weaken them, even at the request of law enforcement.

Military 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sizing Up Impact of U.S. Cyberattack Against Iran

Data Breach Today

New York Times: Database Used to Plot Attacks on Oil Tankers Wiped Out The United States' June cyberattack against Iran wiped out a critical database used by the nation's paramilitary arm to plan attacks against oil tankers and at least temporarily degraded Iran's ability to covertly target Persian Gulf shipping traffic, the New York Times reports.

184
184
article thumbnail

18 Cyber Security Startups to Watch in 2019

eSecurity Planet

Here are 18 hot IT security startups addressing everything from IoT security and blockchain to artificial intelligence and machine learning.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Facial Recognition Use Triggers GDPR Fine

Data Breach Today

Sweden Issues Penalty After School Tests the Technology Sweden's Data Protection Authority has issued its first fine for violations of the European Union's General Data Protection regulation after a school launched a facial recognition pilot program to track students' attendance without proper consent.

GDPR 200

More Trending

article thumbnail

AMCA Breach Tally Grows; Other Health Data Breaches Revealed

Data Breach Today

Here's a Roundup of Latest Security Incident Reports The list of victims affected by the American Medical Collection Agency data breach continues to grow, with four more organizations recently identified. Meanwhile, other significant data breach reports have emerged from Presbyterian Healthcare Services in New Mexico and Massachusetts General Hospital.

article thumbnail

French Police remotely disinfected 850,000 PCs from RETADUP bot

Security Affairs

The French police force, National Gendarmerie, announced to have neutralized the Retadup malware on over 850,000 computers taking over its C2 server. The French police force, National Gendarmerie, announced the successful takedown of a huge RETADUP botnet after it has taken the control of its command and control (C2) server. The operation allowed the France law enforcement agency to remotely disinfect more than 850,000 computers worldwide with the help of Avast malware researchers.

Mining 85
article thumbnail

Imperva Alerts Customers About 'Security Incident'

Data Breach Today

Data for Certain Users of Cloud Web Application Firewall Exposed Security firm Imperva is notifying some of its Cloud Web Application Firewall customers about a "security incident" that exposed certain data, CEO Chris Hylen reports in a blog post. What risks does the exposure create?

Security 148
article thumbnail

Apple ends contracts for hundreds of workers hired to listen to Siri

The Guardian Data Protection

At least 300 contractors in Europe sent home after ‘grading’ project suspended Hundreds of Apple workers across Europe who were employed to check Siri recordings for errors have lost their jobs after the company announced it was suspending the programme earlier this month. More than 300 employees have had their contracts ended in the company’s Cork facility alone, according to former employees, with more sent home from other sites across Europe.

IT 79
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

German Court Lifts Order Limiting Facebook Data Aggregating

Data Breach Today

But Germany's Cartel Office Plans to Appeal Facebook won a victory in Germany after a court suspended an order from the Federal Cartel Office that sought to prohibit the social network from aggregating personal data from other services and sources. The Cartel Office plans to appeal the ruling.

article thumbnail

Securing Our Infrastructure: 3 Steps OEMs Must Take in the IoT Age

Dark Reading

Security has lagged behind adoption of the Internet of Things. The devices hold much promise, but only if a comprehensive security model is constructed.

IoT 81
article thumbnail

TA505 group updates tactics and expands the list of targets

Security Affairs

Recent campaigns show t hreat actors behind the Dridex and Locky malware families , the TA505 group, have updated tactics and expanded its target list. Trend Micro revealed that the TA505 group that is behind the Dridex and Locky malware families continue to make small changes to its operations. TA505 hacking group has been active since 2014 focusing on Retail and banking sectors.

article thumbnail

TrickBot Targets Verizon, T-Mobile, Sprint Users to Siphon PINs

Threatpost

TrickBot malware targets users of U.S. mobile carriers Verizon, T-Mobile and Sprint via web injects to steal their PIN codes; enabling SIM swapping attacks.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Vital documents: How one biopharma company protected theirs against water damage

TAB OnRecord

Most companies have a plan in place to protect their vital documents in the event of a fire. But what if the same devices used to protect against fire, caused significant damage? Download our case study for a complete list of solutions » 1.0 The Challenge A large biopharmaceutical company was faced with this very [.] Read More. The post Vital documents: How one biopharma company protected theirs against water damage appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Malware Found in Android App with 100M Users

Dark Reading

CamScanner, a legitimate app used to scan and manage documents, was found executing payloads on Android devices.

82
article thumbnail

Tropical Storm Dorian Approaches U.S. Virgin Islands, Puerto Rico, and Florida

National Archives Records Express

Tropical Storm Dorian is quickly strengthening and a hurricane watch is now in effect for the U. S. Virgin Islands and the Commonwealth of Puerto Rico. According to the National Hurricane Center tracking information, near hurricane conditions are possible in Puerto Rico and the U.S. Virgin Islands today. Heavy rainfall could produce flash flooding during the next couple of days.

article thumbnail

Protecting your data in a zero-trust world

OpenText Information Management

Recently, Netflix released The Great Hack, the much-anticipated documentary that examines the Cambridge Analytica scandal and explores how companies can use the vast amounts of online data individuals and organizations create every day. The documentary begins with a simple question: set in a classroom, David Carroll, Associate Professor at Parsons School of Design asks his … The post Protecting your data in a zero-trust world appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Fuzzing 101: Why Bug-Finders Still Love It After All These Years

Dark Reading

Fuzzing is one of the basic tools in a researcher's arsenal. Here are the things you should know about this security research foundational tool.

IT 68
article thumbnail

Keeping your software and systems integration ahead of the curve

Information Management Resources

The best integration plans contain system level standards, practices and enhancements of continuous improvement, continuous delivery and non-CI /CD system software.

61
article thumbnail

Facebook Patches Second Account-Takeover Flaw in Instagram

Dark Reading

The password-recovery mechanism once again puts users of the photo- and video-sharing platform at risk.

article thumbnail

Magecart Hits 80 Major eCommerce Sites in Card-Skimming Bonanza

Threatpost

Mainly motorsports and luxury apparel sites, all of them were running outdated versions of the Magento eCommerce platform.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Magecart Shops for Victims as E-Commerce Market Grows

Dark Reading

In 2.5 hours of research, one security expert uncovered more than 80 actively compromised ecommerce websites.

article thumbnail

Elderly China Chopper Tool Still Going Strong in Multiple Campaigns

Threatpost

Multiple actors in multiple campaigns are using the web shell for remote access, even though it's almost a decade old and hasn't been updated.

Access 58
article thumbnail

TrickBot Comes to Cellular Carriers

Dark Reading

A new malicious campaign seeks cell account PINs from victims.

83
article thumbnail

Cost comparison of Windows PC and Mac

Jamf

Strictly looking at the upfront cost of a Windows PC and Mac can be deceiving.

72
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Fuzzing 101: Why Bug-Finders Still Love It After All These Years

Dark Reading

Fuzzing is one of the basic tools in a researcher's arsenal. Here are the things you should know about this security research foundational tool.

IT 55
article thumbnail

Cost comparison of Windows PC and Mac

Jamf

Strictly looking at the upfront cost of a Windows PC and Mac can be deceiving.

72
article thumbnail

Google Squashes High-Severity Blink Browser Engine Flaw

Threatpost

The bug could enable remote code-execution, information-siphoning or denial-of-service attacks.