Thu.Jul 04, 2019

article thumbnail

Automated Peril: Researchers Hack 'Smart Home' Hubs

Data Breach Today

Vulnerabilities Found in APIs Controlling Croatia-Based Zipato's IoT Devices Findings from researchers who hacked Croatia-based vendor Zipato's smart hub controllers, which can manage networked locks, lights and security cameras, underscore the risks that can accompany home automation devices. "Smart home" vendor Zipato says it's fixed the flaws.

IoT 223
article thumbnail

US Journalist Detained When Returning to US

Schneier on Security

Pretty horrible story of a US journalist who had his computer and phone searched at the border when returning to the US from Mexico. After I gave him the password to my iPhone, Moncivias spent three hours reviewing hundreds of photos and videos and emails and calls and texts, including encrypted messages on WhatsApp, Signal, and Telegram. It was the digital equivalent of tossing someone's house: opening cabinets, pulling out drawers, and overturning furniture in hopes of finding something -- any

Mining 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacker who disrupted Sony gaming gets a 27-months jail sentence

Security Affairs

Austin Thompson (23) from Utah, the hacker who carried out massive DDoS attacks on Sony, EA, and Steam gets a 27-months prison sentence. The hacker who brought offline with massive DDoS attacks online gaming networks between December 2013 and January 2014 has been sentenced to 27 months in prison. Austin Thompson (23) from Utah hit the principal gamins networks in 2013 and 2014, including Sony Online Entertainment. “Austin Thompson of Utah was sentenced in federal court today to 27 months

article thumbnail

7 tips for preventing ransomware attacks

IT Governance

The threat of r ansomware isn ’ t going away – in fact, it’s worse than ever, with 28 reported attacks in the past three months. . That’s not a surprise, given how often victims pay fraudsters to free their infrastructure from the crippling malware. Experts urge organisations not to negotiate with criminal hackers , yet many – like t he governments of Riviera Beach, Flo rida , and nearby Lake City – feel compelled to meet their demands. .

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Tens of VMware Products affected by SACK Panic and SACK Slowness flaws

Security Affairs

Tens of VMware products are affected by recently discovered SACK Panic and SACK Slowness Linux kernel vulnerabilities. At least 30 VMware products are affected by recently discovered SACK Panic and SACK Slowness Linux kernel vulnerabilities. The vulnerabilities could be exploited by a remote unauthenticated attacker to trigger a denial-of-service (DoS) condition and reboot vulnerable systems.

Access 90

More Trending

article thumbnail

Godlua backdoor, the first malware that abuses the DNS over HTTPS (DoH)

Security Affairs

Researchers at Network Security Research Lab of Qihoo 360 discovered a Lua-based backdoor dubbed Godlua that targets both Linux and Windows systems. The peculiarity of this new piece of malware is the ability to communicate with C2 servers via DNS over HTTPS ( DoH ). The DoH protocol was a new standard proposed in October 2018 and it is currently supported by several publicly available DNS servers.

article thumbnail

UK: ICO PUBLISHES SIGNIFICANT NEW GUIDANCE ON COOKIES AND SIMILAR TECHNOLOGIES

DLA Piper Privacy Matters

The Information Commissioner’s Office (“ ICO “) has published its eagerly awaited guidance on the use of cookies and similar technologies. In it, the UK’s data protection authority has formally recognised the stricter standards of consent and transparency required for cookie usage in the world of the GDPR. Organisations are advised to take prompt action to review their use of web-based technologies and make the necessary remedial changes.

GDPR 61
article thumbnail

Sodin Ransomware includes exploit for Windows CVE-2018-8453 bug

Security Affairs

Kaspersky experts discovered that Sodinokibi, aka Sodin, Ransomware currently also exploits the CVE-2018-8453 vulnerability to elevate privileges in Windows. The Sodinokibi Ransomware (aka Sodin, REvil) appeared in the threat landscape in April when crooks were delivering it by exploiting a recently patched Oracle WebLogic Server vulnerability. Now the threat is evolving, the Sodinokibi ransomware includes fresh code to elevate its privileges on a target machine by exploiting a vulnerability in

article thumbnail

Death by a Thousand Clicks: Where Electronic Health Records Went Wrong

IG Guru

The U.S. government claimed that turning American medical charts into electronic records would make health care better, safer, and cheaper. Ten years and $36 billion later, the system is an unholy mess: Inside a digital revolution gone wrong. A joint investigation by Fortune and Kaiser Health News. The post Death by a Thousand Clicks: Where Electronic Health Records Went Wrong appeared first on IG GURU.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Magento fixed security flaws that allow complete site takeover

Security Affairs

Magento addressed flaws that could be exploited by unauthenticated attackers to hijack administrative sessions and completely take over online stores. Magento addressed security vulnerabilities that could be chained by an unauthenticated attacker to hijack administrative sessions and completely take over online stores. The attacker would first exploit a Stored Cross-Site Scripting (XSS) vulnerability to inject a JavaScript payload into the administrator backend of a Magento store.

article thumbnail

BC Gay and Lesbian Archives photographs now online!

Archives Blogs

Thanks to funding from the National Heritage Digitization Strategy (NHDS), we are happy to announce that over 5,400 photographs from the BC Gay and Lesbian Archives (BCGLA) collection are now available online in time for Pride. Fantasy and Freedom, Diana Rose does Diana Ross (1990’s). Reference code: AM1675-S4-F15-: 2018-020.3712. The BCGLA Photograph series contains about 7,500 photographs.

article thumbnail

DDoS Attacker Austin 'DerpTrolling' Thompson Gets Sentenced

Data Breach Today

Defendant Pleaded Guilty to Disrupting Sony Online Entertainment and Others A distributed denial-of-service attacker who crashed a popular gaming service at Christmas has been sentenced to serve 27 months in prison. Austin Thompson has also been ordered to pay $95,000 in damages to Daybreak Games and upon his release, to register as a sex offender.

221
221
article thumbnail

Affordable digital preservation of government records with Preservica on G-Cloud 11

Preservica

Preservica’s cloud-hosted active digital preservation platform enables government organisations to protect long-term digital records, increase transparency with greater public access and meet GDPR compliance. Oxford, UK 4th July 2019: Digital preservation specialist Preservica is pleased to announce that its market-leading cloud hosted active digital preservation solution is now available through the UK government’s G-Cloud 11 Digital Marketplace.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Unanimous Declaration of the Thirteen United States of America

Adam Shostack

(Reading the declaration of independence is a useful reminder of why we chose to dissolve the political bands that connected us to another. It’s not about jingoism, or the results of a plebiscite, but about a “long train of abuses and usurpations, pursuing invariably the same Object,” and the proper response to such acts.). In CONGRESS, July 4, 1776.