Tue.Apr 17, 2018

article thumbnail

Health Data Breach Tally Spikes in Recent Weeks

Data Breach Today

A Wide Assortment of Hacker, Insider Incidents Reported The reporting of major health data breaches has spiked in recent weeks, with a wide variety of incidents reported. So what's behind the surge?

article thumbnail

Number of Facebook users whose data was compromised 'far more than 87m', MPs told

The Guardian Data Protection

Former Cambridge Analytica employee gives evidence before parliamentary committee Far more than 87 million people may have had their Facebook data harvested by Cambridge Analytica, according to evidence from former employee Brittany Kaiser. Speaking to the Commons digital, culture, media and sport select committee, Kaiser said Cambridge Analytica had a suite of personality quizzes designed to extract personal data from the social network, of which Aleksandr Kogan’s This Is Your Digital Life app

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US, UK: Russian Hackers Deeply Embedded in Routers, Switches

Data Breach Today

Advice: Update Outdated Protocols, Equipment The U.S. and U.K. warned Monday that Russian hackers have compromised critical internet infrastructure with the aim of spying, extracting intellectual property and gaining footholds for future cyberattacks.

124
124
article thumbnail

The Teens Who Hacked Microsoft's Videogame Empire—And Went Too Far

WIRED Threat Level

Among those involved in David Pokora's so-called Xbox Underground, one would become an informant, one would become a fugitive, and one would end up dead.

Security 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Life After WannaCry's Wake-Up Call: What's Next?

Data Breach Today

RSA Conference Keynoters Recap Last Year's 'Cyber-Geddon' Before Looking to Future At the opening of the RSA Conference in San Francisco, executives from RSA, Microsoft and McAfee offered an update on the state of cybersecurity, focusing on WannaCry. They called for the industry to work more closely together to protect not just individuals but also society.

More Trending

article thumbnail

Battling Social Engineering Attacks

Data Breach Today

KnowBe4's Stu Sjouwerman on the Need to Foster 'Human Firewalls' Social engineering attacks, including ransomware, business email compromise and phishing, are a problem that can never be solved, but rather only managed via a continued focus on security awareness training, says Stu Sjouwerman, CEO of KnowBe4.

article thumbnail

Guest Post--Will Automation Make Us More Human Centric?

AIIM

Automation in the workplace is already well underway. The McKinsey Global Institute estimates that up to 50% of workplace tasks could be fully automated by 2055 , if not before. For employees, this can be a daunting concept, as increased automation in professional settings could lead to job loss on a mass scale. Yet, automation is the workplace might not be all doom and gloom, depending on how we look at it.

article thumbnail

Embracing Change in Cybersecurity

Data Breach Today

Tom Kellerman of Carbon Black on Ovecoming Failing Architectures Security leaders need to embrace security change to overcome failing architectures that have evolved over the last decade, says Tom Kellerman, chief cybersecurity officer at Carbon Black.

article thumbnail

8 Ways Hackers Monetize Stolen Data

Dark Reading

Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Social Media Thread-Hijacking is Nothing More Than Targeted Spam

Troy Hunt

I have a vehement dislike of spam. Right there, that's something you and I have in common because I'm yet to meet a person who says "well actually, I find those Viagra emails I receive every day kinda useful" We get bombarded by spam on a daily basis and quite rightly, people get kinda cranky when they have to deal with it; it's an unwanted invasion that takes a little slice of unnecessary mental processing each time we see it.

article thumbnail

Inside the Unnerving CCleaner Supply Chain Attack

WIRED Threat Level

CCleaner owner Avast is sharing more details on the malware attackers used to infect legitimate software updates with malware.

article thumbnail

The Guardian view on Facebook’s business: a danger to democracy | Editorial

The Guardian Data Protection

The conceit of data mining firms is that they could win elections by moulding electorates based on new identities and value systems – a process accelerated by the echo chamber of social media Facebook sees itself as a commercial firm, not a social institution, and behaves accordingly. It makes money based on the depth and scale of its users’ data. That is why no one should be surprised that a former executive from the controversial data-mining firm Cambridge Analytica claimed in parliament that

Mining 75
article thumbnail

Pornhub Will Now Accept Verge Cryptocurrency

WIRED Threat Level

By accepting Verge, Pornhub could help make cryptocurrency transactions in general more mainstream.

Security 104
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

EU to force tech firms to hand over terror suspects' messages

The Guardian Data Protection

Plan to gather evidence of crime and terrorism ‘quickly and efficiently across borders’ The European commission is seeking to force technology companies wherever they are based in the EU to hand over emails, text messages and app communications of terror suspects within hours of a court order. Under the plans, judges in one member state will be able to seize electronic evidence held on a service provider in another European country through a transnational European production order.

article thumbnail

Ultrasonic Signals Are the Wild West of Wireless Tech

WIRED Threat Level

Inaudible signals that your phone can hear—but you can't—are often based on ad hoc tech, which makes for risky security.

article thumbnail

The DSP Toolkit – why can’t you register?

IT Governance

As most health and social care organisations will be aware, the Data Security and Protection (DSP) Toolkit replaced the Information Governance (IG) Toolkit from April 2018 as the compliance standard for any organisation looking to access NHS networks. Although the Toolkit portal is now live, not all organisations are able to register to complete this.

article thumbnail

Attacks Targeting Oil and Gas Sector Renew Questions About Cybersecurity

Hunton Privacy

As reported in the Hunton Nickel Report : Recent press reports indicate that a cyber attack disabled the third-party platform used by oil and gas pipeline company Energy Transfer Partners to exchange documents with other customers. Effects from the attack were largely confined because no other systems were impacted, including, most notably, industrial controls for critical infrastructure.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Kicking Off RSA: Thales eSecurity Celebrates Its Partners and Customers

Thales Cloud Protection & Licensing

The 2018 RSA Conference officially kicked off with a welcome reception on Monday evening. Following a couple hours spent milling around the exhibits, speaking with industry cohorts, and giving the Thales Escape Room a go (along with other RSA attendees), the Thales eSecurity team headed over to Jillian’s San Francisco for the company’s yearly RSA customer and partner appreciation happy hour.

IT 48
article thumbnail

How To Choose an Advanced Endpoint Protection Vendor

eSecurity Planet

[VIDEO] Jason Brvenik, Chief Technology Officer at NSS Labs details the best practises he recommends as his company releases its 2018 Advanced Endpoint Protection Group Test Results at RSA Conference 2018

IT 48
article thumbnail

Auto parts manufacturer uses OpenText Analytics Suite to gain competitive edge

OpenText Information Management

How can a business make its operations more agile to quickly react to changing client demands or competitors’ offerings? As part of the business integration between MOBIS Parts Australia Pty Ltd. (MPAU) and Kia Motors Australia, MPAU started exploring business intelligence (BI) and analytics technology that would integrate with the BI tools Kia was using … The post Auto parts manufacturer uses OpenText Analytics Suite to gain competitive edge appeared first on OpenText Blogs.

article thumbnail

You Can Have Security or You Can Have Speed: RSA Cryptographers' Panel

eSecurity Planet

The RSA Conference 2018 Cryptographers' panel was not particularly optimistic about blockchain or the state of modern cyber security.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why We Need Privacy Solutions That Scale Across Borders

Dark Reading

New privacy solutions are becoming scalable, smarter, and easier to address compliance across industries and geographies.

Privacy 52
article thumbnail

Automated Bots Growing Tool For Hackers

Threatpost

The use of automated bots is becoming more prevalent for novice attackers as tools become more available, researchers found.

article thumbnail

New Malware Adds RAT to a Persistent Loader

Dark Reading

A newly discovered variant of a long-known malware loader adds the ability to control the victim from afar.

56
article thumbnail

Panasonic to Offer EPEAT® Registered Document Scanners for Businesses

Info Source

NEWARK, N.J. — April 10, 2018 — Panasonic System Solutions Company of North America , Division of Panasonic Corporation of North America and an industry-leading producer of high quality document management and imaging solutions, today announced that its KV-S1027C and KV-S1057C scanners are now registered EPEAT® Bronze , meeting an extensive list of at least 33 mandatory environmental performance criteria.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Are you an asset manager in the era of MiFID II?

Hanzo Learning Center

MiFID II is going to change things. It hasn’t quite yet, but it will, specifically around the areas of: Record-keeping. Investor protection. Supervision. Reconstruction. Retention and storage.

IT 40
article thumbnail

DocPoint Solutions and QAI Announce 10th Annual User Conference

Info Source

Fulton, Md. – April 17, 2018 – Konica Minolta companies DocPoint Solutions, Inc. and Quality Associates, Inc. (QAI), announce their 10th Annual User Conference. The conference, which will take place on May 16 at the Gaylord National Resort and Convention Center in National Harbor, will give attendees the opportunity to hear from and network with 400 industry experts and feature WebMD founder Chris Dancy as the keynote speaker. .

ECM 40
article thumbnail

Cryptominer Malware Threats Overtake Ransomware, Report Warns

Threatpost

Cryptomining malware is the top threat to watch out for 2018, according to a Q1 analysis of threats.