Wed.Aug 15, 2018

article thumbnail

HHS OIG Finds Security Flaws in Maryland's Medicaid System

Data Breach Today

Findings by Watchdog Agency Similar to Problems Previously Cited in Other States Maryland's Medicaid system has "numerous significant" security weaknesses that need to be addressed, according to a federal watchdog agency.

Security 154
article thumbnail

Q&A: Here’s how Google’s labeling HTTP websites “Not Secure” will strengthen the Internet

The Last Watchdog

In a move to blanket the Internet with encrypted website traffic, Google is moving forward with its insistence that straggling website publishers adopt HTTPS Secure Sockets Layer (SSL). Related: How PKI can secure IoT. Google’s Chrome web browser commands a 60% market share. So the search giant has been leading the push to get 100% of websites to jettison HTTP and replace it with HTTPS.

Security 152
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Intel Has A New Speculative Execution Issue: Foreshadow

Data Breach Today

Vulnerability Poses Special Risks For Virtualized Environments The Meltdown and Spectre attacks from earlier this year showed how the quest to make CPUs run faster inadvertently introduced serious security vulnerabilities. Now, researchers have unveiled a new attack called Foreshadow that builds on those findings, affecting millions of Intel processors made over the past five years.

Risk 140
article thumbnail

Patch Tuesday, August 2018 Edition

Krebs on Security

Adobe and Microsoft each released security updates for their software on Tuesday. Adobe plugged five security holes in its Flash Player browser plugin. Microsoft pushed 17 updates to fix at least 60 vulnerabilities in Windows and other software, including two “ zero-day ” flaws that attackers were already exploiting before Microsoft issued patches to fix them.

Paper 111
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The government is ratcheting up its surveillance powers. But we can stop this | Scott Ludlam

The Guardian Data Protection

The people demanding these new powers have proven that they cannot be trusted with the powers they already have The good news is, the war on maths is postponed, because maths won. The government appears to have given up on its ambition of undermining the global encryption standards that underpin secure communications on the internet. That’s the only good news, because there’s very little positive to be said about the government’s latest lunge for intrusive powers embodied in the Telecommunicatio

More Trending

article thumbnail

Data breaches: the financial cost of poor planning

IT Governance

Data breaches can have a wide-reaching impact. Not only can a data breach affect your organisation’s ability to fulfil its business objectives for at least a little while, but there is a significant financial cost associated with a breach of data, whether malicious or accidental. Ponemon Institute’s 2018 Cost of a Data Breach Study considers the financial impact associated with a breach.

article thumbnail

BlackIoT Botnet: Can Water Heaters, Washers Bring Down the Power Grid?

Threatpost

In testing, an Internet of Things (IoT) botnet of large, power-consuming appliances was used to carry out coordinated attacks on the energy grid.

IoT 61
article thumbnail

Hacking Police Bodycams

Schneier on Security

Suprising no one, the security of police bodycams is terrible. Mitchell even realized that because he can remotely access device storage on models like the Fire Cam OnCall, an attacker could potentially plant malware on some of the cameras. Then, when the camera connects to a PC for syncing, it could deliver all sorts of malicious code: a Windows exploit that could ultimately allow an attacker to gain remote access to the police network, ransomware to spread across the network and lock everythin

Mining 54
article thumbnail

PhishPoint Phishing Attack – A new technique to Bypass Microsoft Office 365 Protections

Security Affairs

Security experts from the cloud security firm Avanan have discovered a new technique dubbed PhishPoint, that was used by hackers to bypass Microsoft Office 365 protections. PhishPoint is a new SharePoint phishing attack that affected an estimated 10% of Office 365 users over the last 2 weeks. The experts are warning of the new technique that was already used in attacks by scammers and crooks to bypass the Advanced Threat Protection (ATP) mechanism implemented by most popular email services, Micr

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Special offer: save 10% on ISO 27001 distance learning

IT Governance

Special offer: save 10% on ISO 27001 distance learning. To celebrate the launch of our ISO 27001 Certified ISMS Lead Implementer (Distance Learning) training course in September, we are offering 10% off if you pre-order the course before the end of August. This distance learning course is a modular recording of our popular three-day ISO 27001 Certified ISMS Lead Implementer classroom course , and covers all nine key steps involved in planning, implementing and maintaining an ISO 27001-compli

article thumbnail

Hundreds of Instagram accounts were hijacked in a coordinated attack

Security Affairs

Hundreds of Instagram accounts were hijacked in what appears to be the result of a coordinated attack, all the accounts share common signs of compromise. Alleged attackers have hijacked Instagram accounts and modified personal information making impossible to restore the accounts. The number of Instagram accounts that was hacked has increased since the beginning of August, all the victims were logged out of their accounts, their personal and contact information were deleted, personal email addre

article thumbnail

Why Facebook Enlisted This Research Lab to Track Its Trolls

WIRED Threat Level

What can the 14-person Digital Forensics Research Lab discover about fake news on Facebook that the billion-dollar company doesn't already know?

IT 51
article thumbnail

What have the ICO said about data breach?

Privacy and Cybersecurity Law

The ICO have been discussing data breach reporting under GDPR in a new webinar. Here are the key points: GDPR […].

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

August 2018 Microsoft Patch Tuesday fixes two flaws exploited in attacks in the wild

Security Affairs

Microsoft Patch Tuesday update for August 2018 addresses a total of 60 vulnerabilities, two of which are actively exploited in attacks in the wild. After Adobe, also Microsoft released the Patch Tuesday update for August 2018 that addresses a total of 60 vulnerabilities in Microsoft Windows, Edge Browser, Internet Explorer, Office, ChakraCore,NET Framework, Exchange Server, Microsoft SQL Server and Visual Studio. 19 remote code execution vulnerabilities are rated as critical and two flaws are be

article thumbnail

Identity and Access Management is pivotal for GDPR compliance

OpenText Information Management

GDPR is finally with us, and within just hours of it becoming law Google and Facebook were hit with privacy complaints that could lead to fines up to $9.3 billion. This is a clear demonstration that the European Union (EU) is very willing to take action and that companies everywhere have to be prepared for GDPR … The post Identity and Access Management is pivotal for GDPR compliance appeared first on OpenText Blogs.

GDPR 45
article thumbnail

What have the ICO said about data breach?

Privacy and Cybersecurity Law

The ICO have been discussing data breach reporting under GDPR in a new webinar. Here are the key points: GDPR introduces mandatory breach reporting. This applies to accidental breaches and internal breaches – not just those that are deliberate or are about losing personal data externally. Don’t forget about integrity and availability breaches (e.g. damage to records due to fire or flood as well as ransomware).

article thumbnail

Intel Reveals New Spectre-Like Vulnerability

Dark Reading

A new side-channel speculative execution vulnerability takes aim at a different part of the CPU architecture than similar vulnerabilities that came before it.

IT 47
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Adobe August 2018 Patch Tuesday addresses 11 vulnerabilities in its products

Security Affairs

Adobe released the August 2018 Patch Tuesday updates that address 11 vulnerabilities in Flash Player, the Creative Cloud Desktop Application, Experience Manager, and Acrobat and Reader. Adobe August 2018 Patch Tuesday updates have addressed eleven vulnerabilities in eleven products, five of them in Flash Player. Below vulnerability details: Vulnerability Category.

IT 43
article thumbnail

Check Your Fax: Hackers Find New Entry to Networks

Adam Levin

It’s long been known that organizations need to exercise extreme caution when jettisoning old office equipment, especially if it has built-in memory—and that it’s even more crucial to bear in mind that hackers can utilize digital or carbon-based memory. An Israeli-based company recently found another way older communication devices—and new versions of older technology—provide hackers entree into office networks—in this case an all-in-one, network-connected device that faxes, scans and copies.

article thumbnail

The Trouble with Tribbles

IG Guru

by Vicki Pratt Are there any Star Trek fans out there? I mean for the original television show that aired in the late 60s. I can’t believe how a 60’s science fiction show has managed to impact our lives technologically. Shoot – we even can thank that show for bringing us the germination of ComicCon! […]. The post The Trouble with Tribbles appeared first on IG GURU.

article thumbnail

Microsoft Cortana Flaw Allows Web Browsing on Locked PCs

Threatpost

The tricky Cortana flaw, CVE-2018-8253, was addressed by Microsoft during Patch Tuesday.

Privacy 60
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Open Source Software Poses a Real Security Threat

Dark Reading

It's true that open source software has many benefits, but it also has weak points. These four practical steps can help your company stay safer.

article thumbnail

What is the 3-2-1 Rule for Data Backups?

Armstrong Archives

It’s no secret that backing up your data is important, but how exactly does one do so with 100% confidence in its security? One tried-and-true method experts employ is the “3-2-1 rule.” In an ever-evolving Information Technology (IT) world, the 3-2-1 data backup method has remained a constant for its simplicity and high effectiveness. When it comes time to back up your most valuable data, follow these guidelines.

article thumbnail

5 Major Reasons Document Storage Still Matters

Archive Document Data Storage

In an age where digital information rules, it’s easy to dismiss hard copy documents, even though they play a critical role in your business. Key documents help your organisation document compliance, ensure due diligence, and support ongoing business operations. In this blog, we review four major reasons to have a document storage strategy. Reason 1: Office Space is Expensive.

GDPR 40
article thumbnail

From Mainframes to Connected Cars: How Software drives the Automotive Industry

The Security Ledger

Automakers must pay as much attention to the integrity and security of the software running modern vehicles as they pay to areas such as metallurgy, impact protection, seat belts, and materials science argues Gary Mcgraw, the Vice President of Security Technology at the firm Synopsis. Software is a relatively new human artifact that grows more. Read the whole entry. » Related Stories Opinion: With Internet of Things, Devices become Insider Threat IoT, Machine Learning and AI in the Security

IoT 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Kofax Announces Two Additions to Executive Management Team

Info Source

Irvine, CA, Aug. 15, 2018 – Kofax ® , a leading supplier of software to automate and digitally transform information intensive processes, today announced the addition of Kathleen Delaney and Chris Huff to the company’s executive management team. Delaney will serve as Chief Marketing Officer (CMO) and Huff assumes the newly created role of Chief Strategy Officer (CSO), with both reporting to Reynolds C.

article thumbnail

Link – What happens when you reply to spam email (Veitch)

Roger's Information Security

There are people who enjoy messing with scammers by replying to scam, or implementing the Jolly Roger Telephone company. While its a few years old, I just watched a couple of James Veitch Ted Talks on what happens when you reply to spam email. Its hilarious. Watch this video on YouTube. The post Link – What happens when you reply to spam email (Veitch) appeared first on Roger's Information Security Blog.

article thumbnail

Instagram Hack: Hundreds Affected, Russia Suspected

Dark Reading

Affected users report the email addresses linked to their Instagram accounts were changed to.ru domains.

54