Wed.Aug 22, 2018

article thumbnail

Disrupting the Economics of Cybercrime

Data Breach Today

How the Industry of Cybercrime Works Cybercrime is a business and, like any business, it's driven by profit. But how can organizations make credential theft less profitable at every stage of the criminal value chain, and, in doing so, lower their risk?

Risk 113
article thumbnail

Alleged SIM Swapper Arrested in California

Krebs on Security

Authorities in Santa Clara, Calif. have arrested and charged a 19-year-old area man on suspicion hijacking mobile phone numbers as part of a scheme to steal large sums of bitcoin and other cryptocurrencies. The arrest is the third known law enforcement action this month targeting “SIM swappers,” individuals who specialize in stealing wireless phone numbers and hijacking online financial and social media accounts tied to those numbers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analysis: Anthem Data Breach Settlement

Data Breach Today

Some terms of the recent $115 million settlement in the class action lawsuit against health insurer Anthem tied to a 2015 cyberattack appear underwhelming for the victims, says attorney James DeGraw, who explains why.

article thumbnail

Top Cybersecurity Companies of 2018

eSecurity Planet

These IT security vendors lead the market through their innovative offerings, range of products and services, customer satisfaction and annual revenue

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Facebook, Twitter and Google Suspend 'Inauthentic' Accounts

Data Breach Today

Social Networks Say Separate Influence Operations Trace to Iran and Russia Facebook, Twitter and Google have suspended or removed hundreds of pages and accounts tied to two separate alleged influence operations being run by Iran and Russia. Cybersecurity firm FireEye says the campaigns target the U.S., U.K., Latin America and Middle East.

More Trending

article thumbnail

Superdrug Rebuffs Super Ransom After Supposed Super Heist

Data Breach Today

Pharmacy Chain Quickly Notifies Victims, But Fumbles Password Prescription U.K. health and beauty retailer Superdrug Stores is warning customers that attackers may have compromised some of their personal information, apparently because they'd reused their credentials on other sites that were hacked. While Superdrug quickly notified victims, it stumbled in three notable ways.

Retail 100
article thumbnail

ISO 27001 checklist – a step-by-step guide to implementation

IT Governance

If you’re considering implementing an ISMS (information security management system) that conforms to ISO 27001 – the international standard for information security management – you may be daunted by the scale of the task. Don’t give up, though. Complying with ISO 27001 needn’t be a burden. Most organisations already have some information security measures – albeit ones developed ad hoc – so you could well find that you have many of ISO 27001’s controls in place.

Risk 75
article thumbnail

Banking Malware Targets Mexico; Will It Spread?

Data Breach Today

Kaspersky Lab has discovered a new form of malware it calls Dark Tequila that has been targeting users in Mexico and stealing bank credentials and other personal and corporate data. The malware can move laterally through a computer while it's offline, says Dmitry Bestuzhev, a Kasperksy researcher.

IT 100
article thumbnail

It Takes an Average 38 Days to Patch a Vulnerability

Dark Reading

Analysis of 316 million-plus security incidents uncovers most common types of real-world attacks taking place within in-production Web apps in the AWS and Azure cloud ecosystems.

IT 72
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Australia Battles Fraudulent Online Purchases

Data Breach Today

E-Commerce Payment Card Fraud Is Rising There's bad news in Australia when it comes to payment card fraud: It's growing. The biggest source of that fraud is online payments made without the physical card. But there's a plan to combat it.

IT 100
article thumbnail

Fintech Without Borders: Regulators Consult on Global Financial Innovation Network

Data Matters

On August 7, a group of regulators from 11 jurisdictions published a consultation (the Consultation) on the Global Financial Innovation Network (the GFIN), which aims to promote international cooperation on innovation and the use of technology in financial services (FinTech) and in regulatory processes (RegTech). The group — which includes the U.S.

article thumbnail

Superdrug’s customers affected in data breach

IT Governance

Yesterday evening, Superdrug contacted its customers about a data breach affecting a reported 20,000 individuals. In an email, the company said : “on the evening of the 20 th of August, we were contacted by hackers who claimed they have obtained a number of our customer’s online shopping information. There is no evidence that Superdrug systems have been compromised.”.

article thumbnail

Tech Giants Are Becoming Defenders of Democracy. Now What?

WIRED Threat Level

Microsoft, Facebook, and others are ramping up efforts to thwart attacks on elections—making the US government look woefully underprepared in the process.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Expert discovered a Critical Remote Code Execution flaw in Apache Struts (CVE-2018-11776)

Security Affairs

Maintainers of the Apache Struts 2 open source development framework has released security updates to address a critical remote code execution vulnerability. Security updates released this week for the Apache Struts 2 open source development framework addressed a critical RCE tracked as CVE-2018-11776. The vulnerability affects Struts versions from 2.3 through 2.3.34, Struts 2.5 through 2.5.16, and possibly unsupported versions of the framework.

article thumbnail

Archives Records 2018 RMS Annual Meeting

The Schedule

Nearly 200 peers came together last Friday in Washington, DC, for the joint meeting of the Acquisitions & Appraisal and Records Management Sections. I’ll leave A&A to report on their part of the meeting; here’s a summary of the RMS portion of business along with notes on the speakers that were invited by these groups. Outgoing section chair Eira Tansey reported on RMS activities for the year: 20 blog posts, including a series by committee member Jessika Drmacich on Resourcef

article thumbnail

Six Big Questions After the Cohen and Manafort Bombshells

WIRED Threat Level

Two close advisers to the president are now convicted felons. Here are six big questions about where this all goes next.

article thumbnail

Good Primer on Two-Factor Authentication Security

Schneier on Security

Stuart Schechter published a good primer on the security issues surrounding two-factor authentication. While it's often an important security measure, it's not a panacea. Stuart discusses the usability and security issues that you have to think about before deploying the system.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

P3iD to Demo TWAIN Direct Capture Platform

Info Source

We’ve been writing about TWAIN Direct in DIR for more than four years now. It’s the driverless scanning initiative launched by the TWAIN Working Group (TWG) in 2013 designed to bring document scanning into the 21st century when it comes to connectivity [see DIR 12/20/13]. However, adoption of TWAIN Direct has faced a chicken-and-egg type of challenge.

article thumbnail

A critical remote code execution flaws in Ghostscript could allow to completely take over affected system

Security Affairs

The popular Google Project Zero white hat hacker Tavis Ormandy has found a critical remote code execution (RCE) vulnerability in Ghostscript. Ghostscript is an open source suite of software based on an interpreter for Adobe Systems’ PostScriptand Portable Document Format (PDF) page description languages. Ghostscript is a multiplatform software written in C language, it allows to convert PostScript language files (or EPS) to several raster formats (i.e.

article thumbnail

GDPR, Digital Transformation, Capture and xECM

OpenText Information Management

It’s been a busy year for the OpenTextTM ecosystem team, with a number of ASUG (Americas’ SAP® Users’ Group) Webinars and SAP Radio events taking place. If you missed any, the following are available on-demand. Effective Capture is the first step in Digital Transformation Working with Harvey Spencer Associates, OpenText developed a great whitepaper on … The post GDPR, Digital Transformation, Capture and xECM appeared first on OpenText Blogs.

article thumbnail

Supply chain failure – the impact on the patient

IT Governance

For most industries, protecting your supply chain against cyber attacks is beneficial to business operations, profits and consumers. In healthcare, however, securing the supply chain can also be a matter of life and death. Risks to consider. One of the most concerning supply chain issues we currently face is how therapies can be transported across countries in the event of post-Brexit supply disruptions.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Records Management Annual Report Released

National Archives Records Express

We are pleased to announce the publication of NARA’s Federal Agency Records Management Annual Report, 2017. It is now available on our website. . In 2017, we required Federal agencies to submit three annual reports: the Senior Agency Official for Records Management (SAORM) Report, the Records Management Self-Assessment (RMSA), and a supplemental Federal Email Management Report.

article thumbnail

Adobe security updates address 2 critical code execution flaws in Photoshop

Security Affairs

Yesterday Adobe released security updates for two critical code execution vulnerabilities affecting Windows and macOS versions of Photoshop CC. Adobe released updates to address two critical code executions flaws that affect Photoshop for Windows and macOS versions of Photoshop CC. The vulnerabilities, tracked as CVE-2018-12810 and CVE-2018-12811, are memory corruption issues that could be exploited by a remote attacker to execute arbitrary code in the context of the targeted user. “Adobe

article thumbnail

Attackers Using 'Legitimate' Remote Admin Tool in Multiple Threat Campaigns

Dark Reading

Researchers from Cisco Talos say Breaking Security's Remcos software allows attackers to fully control and monitor any Windows system from XP onward.

article thumbnail

Crooks claim to have stolen 20k customer records from Superdrug cosmetics retailer

Security Affairs

Hackers claim to have stolen the personal details of almost 20,000 Superdrug customers who shopped online at the cosmetics retailer. The British Superdrug is the last victim of a security breach, hackers claim to have stolen the personal details of almost 20,000 people who shopped online at the cosmetics retailer. Hackers accessed customers’ names, addresses and in some cases dates of birth, phone number and points balances.

Retail 43
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

ARMA 2018: What to Expect

IG Guru

ARMA International 2018 is likely the most popular InfoGov event throughout the world. With a rich history and long-standing members, 2018 is slated to not disappoint. Highlights of the conference are below found ARMA website: More featured sessions that are hand-picked by industry experts Adding additional “in the moment” interactions More opportunities […].

40
article thumbnail

Operation Red Signature – South Korean Firms victims of a supply chain attack

Security Affairs

Supply Chain Attack Hits South Korean Firms. Security researchers from Trend Micro have uncovered a supply chain attack, tracked as Operation Red Signature, against organizations in South Korea. The Operation Red Signature aimed at delivering a remote access Trojan (RAT) used by attackers to steal sensitive information from the victims. Threat actors compromised update server of a remote support solutions provider, using this attack scheme hackers infected the victims with the 9002 RAT backdoor.

article thumbnail

Researchers Blame ‘Monolithic’ Linux Code Base for Critical Vulnerabilities

Threatpost

With an OS design based on a verified microkernel, researchers contend almost all Linux OS flaws could be mitigated to less than critical severity.

45