Thu.Aug 16, 2018

article thumbnail

Hanging Up on Mobile in the Name of Security

Krebs on Security

An entrepreneur and virtual currency investor is suing AT&T for $224 million, claiming the wireless provider was negligent when it failed to prevent thieves from hijacking his mobile account and stealing millions of dollars in cryptocurrencies. Increasingly frequent, high-profile attacks like these are prompting some experts to say the surest way to safeguard one’s online accounts may be to disconnect them from the mobile providers entirely.

Security 216
article thumbnail

Cyber Warnings About Certain Philips Medical Devices

Data Breach Today

Philips and DHS Issue Alerts Calling Attention to Vulnerabilities That Will Be Patched The Department of Homeland Security and Philips have issued alerts about cyber vulnerabilities that have been identified in some of the company's medical devices. Are device makers becoming more forthcoming about cyber issues?

Security 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

[Podcast] A User's View of GDPR

AIIM

It's hard to believe it has been just about 3 months since the General Data Protection Regulation (GDPR) went into effect on May 25th, 2018. This new regulation was designed to strengthen and unify data protection for individuals within the European Union (EU) and came with a strict set of compliance protocols. And, because GDPR also applies to the export of personal data outside the EU, it's applicable to any entity that uses or exchanges this data - so, there are a lot of us all around the wor

GDPR 81
article thumbnail

AT&T Sued Over $24 Million Cryptocurrency SIM Hijack Attacks

Data Breach Today

Michael Terpin Alleges Carrier Failed to Protect His Phone Number A cryptocurrency investor is suing AT&T for $240 million, alleging he lost $24 million in virtual currency after the carrier failed to stop two separate attacks where his phone number was commandeered by attackers. The incident highlights the dangers of using a phone number as an authentication channel.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

[Podcast] A User's View of GDPR

AIIM

It's hard to believe it has been just about 3 months since the General Data Protection Regulation (GDPR) went into effect on May 25th, 2018. This new regulation was designed to strengthen and unify data protection for individuals within the European Union (EU) and came with a strict set of compliance protocols. And, because GDPR also applies to the export of personal data outside the EU, it's applicable to any entity that uses or exchanges this data - so, there are a lot of us all around the wor

GDPR 80

More Trending

article thumbnail

IBM Puts Data To Work for AI and in the Cloud

IBM Big Data Hub

IBM Hybrid Cloud Marketing VP Scott Hebner speaks with Big Data and Analytics Hub about the bets he’s placing on the offering to evolve into the company’s first AI platform and emulate WebSphere’s success.

Cloud 73
article thumbnail

Cloud Security: Beyond CASB

Data Breach Today

Oracle's Amit Zavery on Taking a Comprehensive Approach Cloud access security brokers are not a panacea for all cloud security problems, says Oracle's Amit Zavery, who advocates an end-to-end approach.

Cloud 100
article thumbnail

Saving Lives With Tech Amid Syria’s Endless Civil War

WIRED Threat Level

A band of activist-entrepreneurs is building a sensor network to warn when and where air strikes will hit—a constant threat under Bashar al-Assad's regime.

article thumbnail

Why Automation Is Essential to Cloud Security

Data Breach Today

Microsoft's Diana Kelley Shares Insights on Bridging Cloud Security Gaps Because of the lack of specialists with the skills needed to run security operations in the cloud, intelligent automation is essential, says Microsoft's Diana Kelley.

Cloud 100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

These 3 GDPR Requirements You Must Support Today are Nothing Compared With What’s Coming

Reltio

Ramon Chen, Chief Product Officer, Reltio. On May 25, 2018 GDPR (General Data Protection Regulation) went into effect. The primary objectives of the GDPR are to give control back to their EU citizens and residents over their personal data, to simplify the regulatory environment for international business, and to unify regulations within the European Union.

GDPR 70
article thumbnail

AT&T Sued Over $24M Cryptocurrency SIM Hijack Attacks

Data Breach Today

Michael Terpin Alleges Carrier Failed To Protect His Phone Number A cryptocurrency investor is suing AT&T for $240 million, alleging he lost $24 million in virtual currency after the carrier failed to stop two separate attacks where his phone number was commandeered by attackers. The incident highlights the dangers of using a phone number as an authentication channel.

article thumbnail

Coalition Groups Weigh In on CCPA Clean Up Legislation

Data Matters

On June 29, the day after California Governor Jerry Brown signed the California Consumer Privacy Act (CCPA) into law, Data Matters provided a summary of the important new legislation. In doing so, we noted that the law was scheduled to go into effect on January 1, 2020 and that, if and when it did, it would be the “broadest privacy law in the United States” and “may well have an outsize influence on privacy laws nationwide.

Privacy 60
article thumbnail

What exactly is an ISO 27001 gap analysis, anyway?

IT Governance

The breadth of applicability of? ISO 27001 ?can make it difficult for organisations to determine how to apply the Standard effectively and economically. As a result, building an? ISMS (information security management system) that meets the requirements of ISO 27001 can be challenging. One solution is to conduct an ISO 27001 gap analysis – a process many organisations consider an important starting point when putting a prioritised plan in place.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Revealing the calm behind the commotion

Jamf

In just over a year, Rituals transitioned from PC to Mac and deployed 650 MacBook, 700 iPad, 650 iPhone and 1,500 iPod devices across the company. See why they made the change and how they made it happen.

IT 63
article thumbnail

Is the Department of Homeland Security’s cybersecurity strategy up to the task?

Thales Cloud Protection & Licensing

On May 16, the Department of Homeland Security (DHS) released a new cybersecurity strategy to keep pace with the evolving cyber risk landscape. As we inch closer to the mid-term elections in November, I wanted to share what I hope (expect) to see as part of this strategy going forward. A wide scope of topics – With any cybersecurity strategy, it is important to ensure all stakeholders, pieces and potential battlefronts are included in the scope and that it is understandable to everyone.

article thumbnail

Cosmos Bank – Hackers stole Rs 94 crore ($13.5 million) in just in 2 days

Security Affairs

Cosmos Bank, one of the largest Indian cooperative banks, confirmed it was the victim of a cyberheist, over the weekend hackers stole over 940 million rupees ($13.5 million) in three days. Hackers stole over 940 million rupees ($13.5 million) in three days from the Indian cooperative Cosmos bank. The Cosmos bank publicly disclosed the attacks in a press conference on Tuesday, according to the financial institution, the hackers stole the funds in three attacks using a malware. “Hackers mana

article thumbnail

Imposter 'Fortnite' Android Apps Are Already Spreading Malware

WIRED Threat Level

New analysis from mobile security firm Lookout shows that malware authors are taking full advantage of 'Fortnite' ditching the Google Play Store.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

SAP Security Notes August 2018, watch out for SQL Injection

Security Affairs

SAP released security notes for August 2018 that address dozens patches, the good news is that there aren’t critical vulnerabilities. SAP issues 27 Security Notes, including 14 Patch Day Notes and 13 Support Package Notes. Seven notes are related to previously published patches. “On 14th of August 2018, SAP Security Patch Day saw the release of 12 Security Notes.

article thumbnail

Companies may be fooling themselves that they are GDPR compliant

Information Management Resources

The superficial compliance strategies deployed to date are inadequate and more holistic data management is needed.

GDPR 67
article thumbnail

Cyber Defense Magazine – August 2018 has arrived. Enjoy it!

Security Affairs

Cyber Defense Magazine August 2018 Edition has arrived. Sponsored by: Bosch. We hope you enjoy this month’s edition…packed with 130+ pages of excellent content. InfoSec Knowledge is Power. We have 6 years of eMagazines online with timeless content. Visit our online library by clicking here. Please tell your friends to. FLIPBOOK. [link].

IT 50
article thumbnail

FTC Approves Changes to Video Game Industry’s Safe Harbor Program Under COPPA

Hunton Privacy

On August 13, 2018, the Federal Trade Commission approved changes to the video game industry’s safe harbor guidelines under the Children’s Online Privacy Protection Act (“COPPA”) Rule. COPPA’s “safe harbor” provision enables industry groups to propose self-regulatory guidelines regarding COPPA compliance for FTC approval. . The Entertainment Software Ratings Board (“ESRB”)’s proposed modifications were opened to a comment and notice period between April and May of this year.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Delivering the Intelligent and Connected Enterprise

OpenText Information Management

It is a new world. The Latin term for this is Mundus Novus. In the new world, industries are facing a series of challenging macro-trends as they transform into Intelligent and Connected Enterprises. The demands of a Millennial workforce, the relentless threat of cyberattack, changing modes of work and complex regulatory environments are changing the … The post Delivering the Intelligent and Connected Enterprise appeared first on OpenText Blogs.

article thumbnail

Open MQTT Servers Raise Physical Threats in Smart Homes

Threatpost

Misconfigured DIY smart-home hubs for home automation could allow attackers to track owners’ movements, see if smart doors and windows are opened or closed, and even open garage doors.

IoT 43
article thumbnail

Oracle Autonomous Database – is it truly self-driving?

IBM Big Data Hub

Oracle generated a lot of buzz prior to Oracle OpenWorld 2017 last September with their announcement of the world’s first self-driving database - Oracle Autonomous Database. However, not many details were released at announcement time. Now that the first Oracle Autonomous Database service, Autonomous Data Warehouse Cloud, was finally released in March 2018 let’s take a look at what Oracle provides.

IT 42
article thumbnail

Highly Flexible Marap Malware Enters the Financial Scene

Threatpost

A new downloader, which has been spotted in an array of recent email campaigns, uses anti-analysis techniques and calls in a system fingerprinting module.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Necurs Botnet Goes Phishing for Banks

Dark Reading

A new Necurs botnet campaign targets thousands of banks with a malicious file dropping the FlawedAmmyy remote-access Trojan.

article thumbnail

‘China’s MIT’ Linked to Espionage Campaign Against Alaska, Economic Partners

Threatpost

The targets were scanned millions of times, and are all in some way linked to China's ongoing economic development activities, according to Recorded Future.

article thumbnail

UX in Libraries: Affinity Mapping ? Bringing your research to life

CILIP

core technique for processing the research data you gather, because as I never tire of saying: there?s no point in gathering data if you are not going to do anything with it. Known as affinity mapping, or affinity diagramming, this highly tactile and visual method involves the theming of sticky notes on a wall or other flat surface in order to identify data concentrations, groupings and relationships.