Thu.Nov 22, 2018

article thumbnail

US Postal Service Plugs API Flaw - One Year Later

Data Breach Today

Flaw Exposed Personal Data For 60 Million 'Informed Visibility' Accounts A vulnerability in a U.S. Postal Service application for tracking mail in real-time reportedly allowed anyone logged into the service to view personal data, and persisted for more than a year after USPS failed to heed a warning from an anonymous security researcher.

article thumbnail

Flaw allowing identity spoofing affects authentication based on German eID cards

Security Affairs

The authentication process via German eID cards with RFID chips is flawed, an attacker could impersonate any other citizen. The nightmare comes true, the authentication process via German eID cards with RFID chips is flawed and a flaw could allow an attacker to allow identity spoofing and changing the date of birth. The situation is very serious, the new cards are accepted as an ID document in most countries in Europe and allow the German citizens to access online government services (i.e. tax s

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Germany: First data protection authority issues GDPR fine

DLA Piper Privacy Matters

The State Commissioner for Data Protection and Freedom of Information Baden-Wuerttemberg (LfDI) was the first German data protection authority to impose a fine under the GDPR. The fine of € 20,000 sanctions the violation by a social media company of its obligation to ensure data security of processing of personal data pursuant to Art. 32 (1) (a) GDPR (obligation to pseudonymise and encrypt personal data).

GDPR 97
article thumbnail

Chaining 3 zero-days allowed pen testers to hack Apple macOS computers

Security Affairs

Dropbox team disclosed three critical zero-day vulnerabilities in Apple macOS, chaining them it is possible to take over a Mac computer. Dropbox team disclosed three critical zero-day vulnerabilities (CVE-2017-13890, CVE-2018-4176, CVE-2018-4175) affecting the Apple macOS operating system, an attacker could chain them to remotely execute arbitrary code on a targeted Mac computer.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Weekly podcast: Amazon, TalkTalk and City of York

IT Governance

This week, we discuss Amazon’s exposure of customer names and addresses, jail sentences for two TalkTalk hackers, and a data breach affecting a City of York rubbish app. Hello and welcome to the IT Governance podcast for Friday, 23 November. Here are this week’s stories. Just days before Black Friday, Amazon suffered a data breach in which an undisclosed number of customers’ names and email addresses were accidentally exposed on its website.

More Trending

article thumbnail

Scotland’s SMEs – how much should be invested in cyber security?

IT Governance

With only 40% of organisations confident that they can prevent cyber attacks and 42% of micro/small businesses identifying at least one breach or attack in the last 12 months, it is only too clear why businesses need to invest more in cyber security. The Scottish Government launched its Public Sector Action Plan on Cyber Resilience in November 2017, which outlines how Scottish public bodies can improve cyber security and be more secure online.

article thumbnail

How to make diversity the norm in technology

OpenText Information Management

Technology is changing the world around us at an unprecedented rate. From 3D printing of organs to AI-powered grocery stores, technological advances are making incredible things possible. But what happens to technology when diverse voices and experiences aren’t represented at the design table? At the OpenTextâ„¢ Women in Technology Summit at Enterprise World 2018, this … The post How to make diversity the norm in technology appeared first on OpenText Blogs.

article thumbnail

TalkTalk data breach: two criminal hackers jailed

IT Governance

Two Tamworth men have been jailed for their part in the 2015 cyber attack on TalkTalk that saw the personal information of 156,959 customers compromised. Matthew Hanley, 23, and Conner Douglas Allsopp, 21, both of Tamworth in Staffordshire, received prison sentences of 12 and 8 months respectively for offences under the Computer Misuse Act 1990. Detective Constable Rob Burrows, the investigating officer, said : “Hanley hacked into TalkTalk’s database with the sole intention to steal customer per

article thumbnail

Weekly Update 114

Troy Hunt

It's a no-blog week, but that doesn't mean any less is happening! This week, I've finally wrapped up the Lego Bugatti, got myself into the new iPad, connected my washing machine (I know, I know, I didn't plan it this way!) and then isolated it on a separate IoT network. What a time we live in. Oh - and speaking of times we live in, our data is getting thrown around the place like never before thanks to data aggregators and their constant breaches and frankly, I'm a bit fed up with it.

IoT 67
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Top cyber security courses for 2018

IT Governance

Find out how to pick the best training course and qualification to advance your cyber security career. The cyber security industry has boomed in the past decade, providing fantastic opportunities for those interested in rewarding work that pays well and gives you room to grow. But with so many cyber security qualifications to choose from, it’s hard to decide which is most appropriate.

article thumbnail

As Black Friday Looms, IoT Gadgets Take the Risk Spotlight

Threatpost

Ahead of the holiday shopping bonanza, the security community is talking to consumers about IoT security.

IoT 74
article thumbnail

What are the best qualifications for a career in cyber security?

IT Governance

In common with all IT professionals, information security specialists are very aware of the importance of qualifications in demonstrating competence to their current and future employers. Information security is a complex, multidisciplinary field, though, and choosing a learning path that will deliver qualifications to support a 30-year career can be daunting.

article thumbnail

Podcast: Breaking Down the Magecart Threat (Part One)

Threatpost

In the first part of our podcast series, we talked to Rapid7's chief data scientist about how Magecart has changed.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

NAID Releases 2019 Buyer’s Guide

IG Guru

Make sure that your business has plenty to bring to the table by selecting trusted vendors using the NAID Buyer’s Guide. The NAID Buyer’s Guide serves as a directory of information destruction product and service suppliers. Buy using the NAID Buyer’s Guide you are supporting vendors who support the industry. The post NAID Releases 2019 Buyer’s Guide appeared first on IG GURU.

article thumbnail

The Archives’ Pre-move project: an inside look through the conservation lens

Archives Blogs

The James Skitt Matthews building has been home to the Archives since 1972 and after more than four decades of service, the Vanier Park site has reached its full capacity. In response, the Archives plans to move to a larger space where we can continue to serve the public for many more years to come. Prior to the move, many of the records in our holdings will require conservation before they can safely travel.

article thumbnail

An Awfully Big Adventure! Books for Boys and Girls

Archives Blogs

We are delighted to be hosting an exhibition of children’s literature from the Library of Innerpeffray, Perthshire. You can see a selection of 19th century books in the stairwell of the University Library. The Library of Innerpeffray holds books from the 16 th century onwards on a wide variety of topics. The borrowing registers reveal a wealth of information about the people who used the library.