Wed.Sep 05, 2018

article thumbnail

Why the Midterm Elections Are Hackable

Data Breach Today

With the midterm elections just around the corner, Barbara Simons, author of the election security book "Broken Ballots," explains why some voting computers remain inherently flawed.

Security 167
article thumbnail

Browser Extensions: Are They Worth the Risk?

Krebs on Security

Popular file-sharing site Mega.nz is warning users that cybercriminals hacked its browser extension for Google Chrome so that any usernames and passwords submitted through the browser were copied and forwarded to a rogue server in Ukraine. This attack serves as a fresh reminder that legitimate browser extensions can and periodically do fall into the wrong hands, and that it makes good security sense to limit your exposure to such attacks by getting rid of extensions that are no longer useful or

Risk 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Promises Crackdown on 'Tech Support' Fraudsters

Data Breach Today

But Tech-Support Fraud is Surging, via Cold Calls, Phishing and More, FBI Warns While tech-support scams have proliferated for years, the FBI says losses tied to such fraud are now higher than ever. Google has pledged to crack down on fake tech-support listings. But fraudsters regularly employ a variety of channels, including cold calls, pop-up windows and phishing emails.

Phishing 165
article thumbnail

Doing Information Right: Where Do I Begin?

Weissman's World

If there’s one thing we know about doing information right – which is to say, improving the care and feeding of your critical business information – it’s that it’s really hard to know where to begin. Should we scan the boxes full of paper that’s cluttering our hallways? Should we comb through our shared drives […]. The post Doing Information Right: Where Do I Begin?

Paper 120
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware Recovery: Don't Make Matters Worse

Data Breach Today

The Impact of Missteps Can Be Substantial A recent incident involving a chronic care management company spotlights how paying a ransom to recover decryption keys from ransomware attackers can put sensitive data at additional risk. Security experts offer insights on how to prepare for the many challenges posed by attacks.

More Trending

article thumbnail

Scrappy 'Silence' Cybercrime Gang Refines Its Bank Attacks

Data Breach Today

Two-Person Gang Is Picking Up After Decline in Cobalt Attacks, Researchers Warn A cybercrime gang called "Silence," which appears to have just two members, has been tied to attacks that have so far stolen at least $800,000, in part via ATM jackpotting or "cash out" attacks, warns cybercrime investigation firm Group-IB.

IT 113
article thumbnail

How to assess your physical filing practices and identify any issues

TAB OnRecord

Is it possible that you’re not managing your organizations records, but rather they are managing you? If panicked “All-Office” emails are common or if people are regularly searching for critical files after the information was needed, the answer may be yes. The following questions are designed to help diagnose how your organization uses and stores information.

article thumbnail

It's Time to Move Endpoint Security to the Cloud

Data Breach Today

Learn how to leverage a predictive security cloud model to get ahead of emerging attacks. Traditional endpoint security products are holding organizations back. It's time to move your antivirus to the cloud.

Cloud 100
article thumbnail

[Podcast] Exploring Intelligent Information Management

AIIM

Intelligent Information Management (IIM).It sounds great, but what the heck do those 3 words really mean? Here at AIIM, you've probably heard us use IIM to describe the core set of capabilities that are necessary for organizations to digitally transform. In fact, we believe so whole-heartedly that it's the future of Information Management that we actually changed our name to the Association of Intelligent Information Management and even wrote the book on it.

ECM 82
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A Fresh Look at Security Analytics

Data Breach Today

Most enterprises are at least discussing security analytics. But how are they actually deploying these tools? And with what levels of automation and orchestration? Drew Gidwani of ThreatConnect shares insight on how to maximize analytics.

Analytics 100
article thumbnail

[Podcast] Exploring Intelligent Information Management

AIIM

Intelligent Information Management (IIM).It sounds great, but what the heck do those 3 words really mean? Here at AIIM, you've probably heard us use IIM to describe the core set of capabilities that are necessary for organizations to digitally transform. In fact, we believe so whole-heartedly that it's the future of Information Management that we actually changed our name to the Association of Intelligent Information Management and even wrote the book on it.

ECM 80
article thumbnail

10 SMB Endpoint Problems Solved By the Cloud

Data Breach Today

The 10 most common security problems facing small to mid-sized companies. The 10 most common security problems facing small to mid-sized companies.

Cloud 100
article thumbnail

Clean-Up Bill Advances to Amend the New California Consumer Privacy Act

Data Matters

On Friday, August 31, the California legislature unanimously passed a host of “clean-up” amendments to the new California Consumer Privacy Act (CCPA), AB 375 , as it set about addressing flaws and other concerns in the state’s groundbreaking data privacy law. These amendments are now awaiting Governor Brown’s signature. These amendments follow closely on the heels of the State’s initial enactment of the CCPA in June.

Privacy 68
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

7 Ways Blockchain is Being Used for Security

Dark Reading

Blockchain is being used as a security tool. If you haven't thought about adopting it, you might want to reconsider your take.

article thumbnail

e-Records Conference 2018: Registration Open!

The Texas Record

e-Records 2018 – Friday, November 16, 2018. Registration is open to state agency and local government staff for the 2018 e-Records Conference. Visit the conference website to REGISTER and to read more about the exciting lineup and exhibitors. Be sure to register as soon as possible. Please share this opportunity with your colleagues. Seats filled up quickly last year so reserve your spot today!

article thumbnail

An untold story of a memory corruption bug in Skype

Security Affairs

Security expert discovered that S kype has a malloc(): memory corruption vulnerability that could be triggered while users share some media/file with someone during a call. . Tested on: Linux zero 4.15.0-29-generic #31-Ubuntu SMP Tue Jul 17 15:39:52 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux (Ubuntu 18.04 LTS). Product affected: Skype for linux (skypeforlinux_8.27.0.85_amd64.deb) Steps to reproduce this issue: 1.

article thumbnail

Using a Smartphone's Microphone and Speakers to Eavesdrop on Passwords

Schneier on Security

It's amazing that this is even possible: " SonarSnoop: Active Acoustic Side-Channel Attacks ": Abstract: We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Best Way To Secure US Elections? Paper Ballots

Dark Reading

Voting machines that do not provide a paper trail or cannot be independently audited should immediately be removed, concludes a new report from the National Academies of Sciences, Engineering, and Medicine.

Paper 56
article thumbnail

8 Ways Security Automation and Orchestration Is Transforming Security Operations

eSecurity Planet

Enterprises are turning to SOAR solutions to streamline response to cybersecurity incidents.

article thumbnail

Information is at the heart of your business

OpenText Information Management

Even though digital information is evolving at a rapid pace, the world is still document-centric. Documents, whether created by a human or generated by a machine, underpin every operation, communication exchange and innovation in the Intelligent and Connected Enterprise. What is changing, however, is how they are created, their levels of complexity and their collaborative … The post Information is at the heart of your business appeared first on OpenText Blogs.

article thumbnail

The Weakest Security Links in the (Block)Chain

Dark Reading

Despite the technology's promise to transform how business is done, there are significant limitations and potential risks at the intersection of the digital and physical worlds.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CrowdStrike uncovered a new campaign of GOBLIN PANDA APT aimed at Vietnam

Security Affairs

Researchers from security firm CrowdStrike have observed a new campaign associated with the GOBLIN PANDA APT group. Experts from security firm CrowdStrike have uncovered a new campaign associated with the GOBLIN PANDA APT group. The group also knows as Cycldek was first spotted in September 2013, it was mainly targeting entities in Southeast Asia using different malware variants mainly PlugX and HttpTunnel.

article thumbnail

PowerPool Malware Uses Windows Zero-Day Posted on Twitter

Dark Reading

Researchers detected the vulnerability in an attack campaign two days after it was posted on social media.

IT 63
article thumbnail

3 IBM Analytics events you can't miss this fall

IBM Big Data Hub

In the coming weeks, you have three great opportunities — two in the U.S., one in Europe — to network with your industry peers as you meet and learn from IBMers who are reinventing analytics for organizations large and small.

article thumbnail

Thoughts on the Latest Apache Struts Vulnerability

Dark Reading

CVE-2018-11776 operates at a far deeper level within the code than all prior Struts vulnerabilities. This requires a greater understanding of the Struts code itself as well as the various libraries used by Struts.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Three ways to get iOS devices enrolled into management

Jamf

Regardless of where your iPads were purchased, we explain the options for getting devices enrolled so they can be configured, secured and rolled out to users.

article thumbnail

Facebook and Twitter's Biggest Problems Follow Them to Congress

WIRED Threat Level

As Jack Dorsey and Sheryl Sandberg testified before Congress, some of Twitter and Facebook's most notorious trolls and misinformation artists watched on.

article thumbnail

Why won't Facebook give access to Lucy McHugh murder suspect's account?

The Guardian Data Protection

Suspect in schoolgirl’s murder is refusing to supply password. Can police force him to? Facebook cannot hand over the password to the account of either the murdered schoolgirl Lucy McHugh or the suspect Stephen Nicholson, because the company does not store user passwords. Instead, it stores a “hash” of those passwords, which lets it check whether an entered password is correct without needing to store the password itself.

Access 41