Tue.Feb 11, 2020

article thumbnail

WiFi: A New Way to Spread Emotet Malware

Data Breach Today

Researchers Say Trojan's Developers Devising Ways to Spread Trojan to More Devices Security researchers have found that the developers of the Emotet Trojan have created a new way to spread it to more victims - attackers are using unsecured WiFi networks as a way to deliver the malware to more devices.

Security 283
article thumbnail

SnapChat at the Workplace? A Look at Ephemeral Messaging Apps for Business

AIIM

I recently watched a webinar by Jason Baron called " Vanishing Acts: The Challenge of Dealing with Ephemeral and Self-Destructing Messaging Apps in the Workplace. " Jason's a really smart guy and has written about ephemeral messaging in business before. While I agree with him generally, I think information professionals, and especially those in government or highly regulated sectors, really need to think about the risks involved with the use of these apps.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More Phishing Campaigns Tied to Coronavirus Fears

Data Breach Today

Researchers Describe a Wide Variety of Tactics As fears about the coronavirus continue to spread, cybercriminals are using the health crisis to send phishing emails using a variety of tactics to a broader range of targets.

Phishing 281
article thumbnail

5 key things to consider when migrating to the cloud

OpenText Information Management

Cloud computing is now touching all aspects of information technology, and document and data archiving is no exception. When it comes to security, cost savings, reliable services and scalability, there is no bigger advantage than storing your most valuable assets in the cloud. But migrating to the cloud is more complex than simply moving your … The post 5 key things to consider when migrating to the cloud appeared first on OpenText Blogs.

Cloud 131
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

No Surprise: China Blamed for 'Big Data' Hack of Equifax

Data Breach Today

Analysis: Equifax Failed on Security, But Only Governments Can Hold Each Other to Account Who's surprised Chinese military hackers allegedly hacked Equifax? For a foreign power that continues to attempt to amass personal information on its adversaries, targeting a business that gets rich by buying and selling Americans' personal data remains an obvious play.

Big data 236

More Trending

article thumbnail

NIST Privacy Framework: The Implementation Challenges

Data Breach Today

Although NIST's new privacy framework is agnostic toward any particular privacy law, "it gives organizations building blocks to help them meet any obligations under any particular law or jurisdiction" says Naomi Lefkovitz, a NIST senior privacy adviser.

Privacy 188
article thumbnail

440M records found online in unprotected database belonging to Estée Lauder

Security Affairs

A security expert discovered that the Cosmetic firm Estée L auder exposed 440 million records online in a database that was left unsecured. The security expert Jeremiah Fowler discovered an unsecured database belonging to the Cosmetic firm Estée L auder that contained 440,336,852 records. Estée L auder is an American multinational manufacturer and marketer of p restige skincare, makeup, fragrance and hair care p roducts, it owns multiple brands, distributed internationally through both digital

Archiving 104
article thumbnail

Bringing Outsiders Into Your Compliance Team: Four Considerations

Data Breach Today

Hiring third party investigators to bolster your AML and Compliance team? Here's four things to consider before you pick up the phone. Money Laundering investigators are in high demand: banks and other financial institutions have spent almost two decades hiring more and more of them.

article thumbnail

Good Policy Statements Don’t Micro-manage

ARMA International

Instructions in a policy statement that amount to micro-management confuse rather than clarify the requirements. I’m sure you’ve seen them – policy statements so detailed that they list the steps required. Take the following example, excerpted from a real policy (as are the others below): Business areas must set aside time every year to review their classification structure for currency and accuracy.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Crypto AG Was Owned by the CIA

Schneier on Security

The Swiss cryptography firm Crypto AG sold equipment to governments and militaries around the world for decades after World War II. They were owned by the CIA: But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company's devices so they could easily break the codes that countries used to send encrypted messages.

Military 141
article thumbnail

Donating BAT to Have I Been Pwned with Brave Browser

Troy Hunt

I don't know exactly why the recent uptick, but lately I've had a bunch of people ask me if I've tried the Brave web browser. Why they'd ask me that is much more obvious: Brave is a privacy-focused browser that nukes ads and trackers. It also has some cool built-in stuff like the ability to create a new private browsing window in Tor rather than just your classic incognito window that might ditch all your cookies and browsing history but still connect to the internet directly from your own IP ad

Privacy 102
article thumbnail

China's Hacking Spree Will Have a Decades-Long Fallout

WIRED Threat Level

Equifax. Anthem. Marriott. OPM. The data that China has amassed about US citizens will power its intelligence activities for a generation.

IT 111
article thumbnail

Why Ransomware Will Soon Target the Cloud

Dark Reading

As businesses' daily operations become more dependent on cloud services, ransomware authors will follow to maximize profits. The good news: Many of the best practices for physical servers also apply to the cloud.

Cloud 98
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Repudiation Now Live on Linkedin Learning

Adam Shostack

My course, “ Repudiation in Depth ” is now live on Linkedin Learning. This is the fourth course I’ve created, starting with “ Learning Threat Modeling “, and courses on “ spoofing “, “ tampering “, and now, repudiation. (You can probably see where this is going, and I’m making great strides towards the goal.

IT 90
article thumbnail

Estée Lauder Exposes 440M Records, with Email Addresses, Network Info

Threatpost

Middleware data was exposed, which can create a secondary path for malware through which applications and data can be compromised.

article thumbnail

OT attacks increased by over 2000 percent in 2019, IBM reports

Security Affairs

According to IBM, OT attacks increased by over 2000 percent in 2019, most of them involved the Echobot IoT malware. IBM’s 2020 X-Force Threat Intelligence Index report analyzes the threat landscape in 2019, the experts observed a spike in the number of OT attacks. According to IBM X-Force, attacks targeting operational technology (OT) infrastructure increased by over 2000 p ercent in 2019 compared to 2018, and most of them involved the Echobot malware.

IoT 85
article thumbnail

Hindsight is 2020. Looking back so we can move forward

Thales Cloud Protection & Licensing

2020 ends a decade, and the new year prompted me to think “Wow it’s been two decades since we started Vormetric.” And the mission we started then still applies now. Data security is still a problem. I remember when we were pioneering our first use case to prevent “root or administrator” from seeing data they weren’t cleared to see, yet be able to do their job.

Cloud 113
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

South Korean Woori Bank is accused of unauthorized use of customer data

Security Affairs

Unauthorized use of customer information by Woori Bank, ‘crime act’ for customers. The bank changed 23,000 passwords in 2018 without consent. It is controversial that Woori Bank changed the p assword s of 23,000 customer dormant accounts without consent in July 2018. The accounts are deactivated if there is no transaction for one year after their opening.

article thumbnail

Conservative News Sites Track You Lots More Than Left-Leaning Ones

WIRED Threat Level

One analysis of news outlets found that the median popular right-wing site planted 73 percent more cookies than its left-wing counterpart.

IT 96
article thumbnail

Adobe addresses 42 flaws in its five products

Security Affairs

Adobe February 2020 Patch Tuesday updates address a total of 42 vulnerabilities in five products, dozens of them rated as critical severity. Adobe February 2020 Patch Tuesday updates address a total of 42 vulnerabilities in Framemaker, Acrobat and Reader, Flash Player, Digital Editions and Experience Manager products. Most of the vulnerabilities (21) affect the Windows version of the Framemaker document processor.

IT 80
article thumbnail

Introducing Jamf Pro 10.19

Jamf

Continued investment in our platform and partners rings in latest version of Jamf Pro.

105
105
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Safer internet day – Cybercrime facts Infographic

Security Affairs

Dear readers, I decided to create a simple Infographic that shows Cybercrime facts in 2019, I’ve done it for Safer Internet Day 2020. Enjoy it! ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. ~ Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini. ( SecurityAffairs – cybercrime, hacking).

article thumbnail

The US Fears Huawei Because It Knows How Tempting Backdoors Are

WIRED Threat Level

US officials allege that Huawei has backdoors in its technology. The US knows firsthand how powerful those can be.

IT 91
article thumbnail

Dell SupportAssist flaw exposes computers to hack, patch it asap!

Security Affairs

Dell addresses a flaw in the Dell SupportAssist Client software that could allow local attackers to execute arbitrary code with Administrator privileges. Dell released a security update to address a vulnerability, tracked as CVE-2020-5316 , in its SupportAssist Client software. The flaw could be exploited by local attackers to execute arbitrary code with Administrator privileges on affected systems.

IT 76
article thumbnail

Intel Patches High-Severity Flaw in Security Engine

Threatpost

The high-severity vulnerability could enable denial of service, privilege escalation and information disclosure.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

CIA's Secret Ownership of Crypto AG Enabled Extensive Espionage

Dark Reading

Crypto AG made millions selling encryption devices to more than 120 countries, which unknowingly transmitted intel back to the CIA.

article thumbnail

The Altsbit exchange will exit in May following a hack

Security Affairs

The Italy-based cryptocurrency exchange Altsbit announced that it has suffered a security breach that led to the theft of its customer’s funds. Crypto-currency exchange Altsbit recently disclosed a security breach, the company claimed that hackers have stolen almost all its customers’ deposits. . Dear users, Unfortunately we have to notify you with the fact that our exchange was hacked during the night and almost all funds from BTC, ETH, ARRR and VRSC were stolen.

article thumbnail

Cybercriminals Swap Phishing for Credential Abuse, Vuln Exploits

Dark Reading

Infection vectors were evenly divided among phishing, vulnerability exploitation, and unauthorized credential use in 2019.