Tue.Aug 07, 2018

article thumbnail

Florida Man Arrested in SIM Swap Conspiracy

Krebs on Security

Police in Florida have arrested a 25-year-old man accused of being part of a multi-state cyber fraud ring that hijacked mobile phone numbers in online attacks that siphoned hundreds of thousands of dollars worth of bitcoin and other cryptocurrencies from victims. On July 18, 2018, Pasco County authorities arrested Ricky Joseph Handschumacher , an employee of the city of Port Richey, Fla, charging him with grand theft and money laundering.

article thumbnail

The Art of the Steal: FIN7's Highly Effective Phishing

Data Breach Today

Cybercrime Gang Phoned Victims to Increase Phishing Attack Success Rates The FIN7 cybercrime gang regularly phoned victims, posing as buyers, to trick victims into opening phishing emails and attachments with malware, federal prosecutors allege. The group's success - 15 million stolen payment cards and counting - is one measure of how difficult these types of attacks are to block.

Phishing 172
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Measuring the Rationality of Security Decisions

Schneier on Security

Interesting research: " Dancing Pigs or Externalities? Measuring the Rationality of. Security Decisions ": Abstract: Accurately modeling human decision-making in security is critical to thinking about when, why, and how to recommend that users adopt certain secure behaviors. In this work, we conduct behavioral economics experiments to model the rationality of end-user security decision-making in a realistic online experimental system simulating a bank account.

article thumbnail

WannaCry Outbreak Hits Chipmaker, Could Cost $170 Million

Data Breach Today

Factories Crippled After WannaCry Variant Infects Unpatched Windows 7 Machines A WannaCry outbreak has hit unpatched Windows 7 systems at Taiwan Semiconductor Manufacturing Co., crippling its factories. The world's largest chipmaker, which traced the infection to a new software tool that it failed to scan for malware before installation, says the outbreak could cost it $170 million.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to become a certified DPO

IT Governance

The EU GDPR (General Data Protection Regulation) requires certain organisations to appoint a DPO (data protection officer) to help them comply with the Regulation. However, a shortage of DPOs means many organisations are appointing staff to act as DPOs without the proper level of expertise, experience or qualifications. The GDPR stipulates that DPOs should have appropriate experience and qualifications to fulfil the role.

GDPR 74

More Trending

article thumbnail

When It Comes to a Data Breach, How Do You Want to Be Notified?

Thales Cloud Protection & Licensing

August is two-thirds of the way through year, and we have already seen a number of serious, far-reaching data breaches making headlines, some occurred in 2018, and some from 2017 that are now being disclosed. This underscores the harsh realities of the state of cybersecurity today. If you have looked at our recently released annual Data Threat Report: Retail Edition , you understand this is not just hyperbole.

article thumbnail

AI-Augmented Security: Can Cyberattackers Counter It?

Data Breach Today

XM Cyber's Adi Ashkenazy on the Latest Trends Are cyberattackers working on ways to counter artificial intelligence-augmented security? And will the bad guys ever use AI-driven attacks? Adi Ashkenazy of XM Cyber offers an analysis.

article thumbnail

The benefits of outsourcing your DPO

IT Governance

Since the EU’s GDPR (General Data Protection Regulation) came into effect in May 2018, the international shortage of DPOs (data protection officers) has increased. The Regulation stipulates that certain organisations must appoint a DPO to monitor data protection compliance and act as a contact point for data subjects and supervisory authorities. The appointed person must have data protection expertise, but the GDPR doesn’t specify what level of experience or qualifications are required.

GDPR 63
article thumbnail

Duo Security created open tools and techniques to identify large Twitter botnet

Security Affairs

Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be used to identify large Twitter botnet. Security experts from Duo Security have developed a collection of open source tools and disclosed techniques that can be useful in identifying large Twitter botnet. The experts developed the tools starting from the analysis of 88 million Twitter accounts and over half-a-billion tweets, one of the largest random datasets of Twitter account

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Shadow IT: Every Company's 3 Hidden Security Risks

Dark Reading

Companies can squash the proliferation of shadow IT if they listen to employees, create transparent guidelines, and encourage an open discussion about the balance between security and productivity.

IT 50
article thumbnail

Group-IB experts record a massive surge of user data leaks form cryptocurrency exchanges

Security Affairs

Group-IB researchers have investigated user data leaks from cryptocurrency exchanges and has analyzed the nature of these incidents. Security experts from Group-IB, an international company specializing in preventing cyberattacks and developing information security solutions, has investigated user data leaks from cryptocurrency exchanges and has analyzed the nature of these incidents.

article thumbnail

OpenText Qfiniti named back-to-back WFO Provider of the Year

OpenText Information Management

It’s not easy to stand out in a competitive contact center and customer experience market, but every once in while you’re able to separate from the rest. For the past three years OpenText™ Qfiniti has been a IQPC CCW Excellence Awards finalist for Workforce Optimization (WFO) Provider of the Year and the winner for the … The post OpenText Qfiniti named back-to-back WFO Provider of the Year appeared first on OpenText Blogs.

article thumbnail

P3iD Technologies, Inc. Joins TWAIN Working Group as an Associate Member

Info Source

Raleigh, NC – August 7, 2018 – The TWAIN Working Group (TWG), a not-for-profit organization designed to provide and foster a universal public standard which links applications and image acquisition devices, today announced that P3iD Technologies, Inc. has joined the Group as an Associate member. P3iD Technologies, the developer of the Business Efficiency Center, a highly secure document and data platform for capture, extraction, and storage, has gained early development access to t

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

TSMC Chip Maker confirms its facilities were infected with WannaCry ransomware

Security Affairs

TSMC shared further details on the attack and confirmed that its systems were infected with a variant of the infamous WannaCry ransomware. Early in August, a malware has infected systems at several Taiwan Semiconductor Manufacturing Co. (TSMC) factories , the plants where Apple produces its devices. TSMC is the world’s biggest contract manufacturer of chips for tech giants, including Apple and Qualcomm Inc.

article thumbnail

Cybersecurity Certifications: Why They Matter and How to Know Which Ones To Pursue

Threatpost

Here is why security professionals need to understand the merits of obtaining certification in today's job market and how it can give them a leg up over their competition.

article thumbnail

How to configure a Hak5 WiFi Pineapple NANO for Internet access in “Client Mode” using a USB WiFi adapter

Architect Security

This post will explain how to setup Internet Access for a Hak5 WiFi Pineapple using a USB WiFi adapter connected directly to the Pineapple. By connecting a USB WiFi adapter, you add “wlan2” to the ports available for connections. The new “wlan2” port you gain will allow your Pineapple to operate in WiFi “Client Mode” on […].

Access 45
article thumbnail

Unixiz Agrees to Settle Charges Under COPPA and the New Jersey Consumer Fraud Act

Hunton Privacy

On August 3, 2018, California-based Unixiz Inc. (“Unixiz”) agreed to shut down its “i-Dressup” website pursuant to a consent order with the New Jersey Attorney General, which the company entered into to settle charges that it violated the Children’s Online Privacy Protection Act (“COPPA”) and the New Jersey Consumer Fraud Act. The consent order also requires Unixiz to pay a civil penalty of $98,618.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Expect API Breaches to Accelerate

Dark Reading

APIs provide the digital glue that binds apps, cloud resources, app services and data all together - and they're increasingly an appsec security threat.

Cloud 49
article thumbnail

Pentagon Bans Soldiers from Using GPS Apps and Devices

Threatpost

This includes physical fitness aids, applications in phones that track locations, and other devices and apps that could pinpoint and track the location of individuals in active combat zones.

article thumbnail

Why IBM Analytics adopted big-bet thinking: an interview with Rob Thomas

IBM Big Data Hub

Rob Thomas, general manager of IBM Analytics, discusses the principles that guide the IBM Analytics business and have led to its latest major offering: IBM Cloud Private for Data, a platform for high-performance analytics that powers cloud-based applications so companies can be ready for AI.

article thumbnail

A Ph.D versus a Doctorate Degree? A journey towards a Doctorate in Information Assurance

IG Guru

My educational journey has been a long and interesting one. But this little vignette concerns my experience with researching and starting my Ph.D. I have to thank friends, educators, teachers, and colleagues who had shared many of their own experiences with me, both good and bad because without them, I would not be as close […]. The post A Ph.D versus a Doctorate Degree?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Risks to long-term access of digital government records is focus of new Preservica CoSA collaboration

Preservica

Boston, MA and Oxford, UK | Day August 7, 2018 | Preservica, a world leader in digital preservation, has announced its support for the Council of State Archivists’ (CoSA) 2018-19 research initiative into the risks to electronic state government records from file format and technology obsolescence. Having worked closely on this issue in the past both CoSA and Preservica share a commitment to proactive digital preservation as well as broader access to government records.

article thumbnail

Persistent privacy powers professional businesses

CGI

Persistent privacy powers professional businesses. pallavi.m@cgi.com. Tue, 08/07/2018 - 11:16. How a policy of privacy by design sets your business up for the long term. While for some GDPR was BAU, others a huge effort, and a bit of a panic for a minority, one of the most significant outcomes is the perception that cyber security is no longer just ‘an IT thing’.

Privacy 40
article thumbnail

Podcast: Black Hat USA 2018 Preview

Threatpost

Threatpost editors Tom Spring, Lindsey O'Donnell and Tara Seals preview Black Hat USA and DEF CON 2018, which both take place this week in Las Vegas.

41
article thumbnail

The biggest ‘technology disruptor’ will be the consumer

CGI

The biggest ‘technology disruptor’ will be the consumer. pallavi.m@cgi.com. Tue, 08/07/2018 - 23:17. Insurers should stop focussing on digital engagement with customers and instead focus on developing their role as an important provider of services to and with those organisations that have a daily role in customer lives. I hear a lot from Insurance executives about the need for the development of a rich digital experience for customers but much of this ambition seems to me to forget the reality

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Microsoft Adds Direct Trust for Let’s Encrypt

Threatpost

Let’s Encrypt certificates can now stand on their own for almost all newer versions of operating systems, browsers and devices.

article thumbnail

Even 'Regular Cybercriminals' Are After ICS Networks

Dark Reading

A Cybereason honeypot project shows that ordinary cybercriminals are also targeting weakly secured environments.

article thumbnail

Threatlist: Financial Services Firms Lag in Patching Habits

Threatpost

Half of breached firms say they were compromised due to a vulnerability for which a patch was available but not applied.