Fri.Mar 08, 2019

article thumbnail

MyEquifax.com Bypasses Credit Freeze PIN

Krebs on Security

Most people who have frozen their credit files with Equifax have been issued a numeric Personal Identification Number (PIN) which is supposed to be required before a freeze can be lifted or thawed. Unfortunately, if you don’t already have an account at the credit bureau’s new myEquifax portal , it may be simple for identity thieves to lift an existing credit freeze at Equifax and bypass the PIN armed with little more than your, name, Social Security number and birthday.

article thumbnail

Guilty Plea in Rare HIPAA Criminal Case

Data Breach Today

Former Patient Coordinator Wrongfully Disclosed Patient Information A former patient coordinator at UPMC, a medical center in Pittsburgh, has pleaded guilty to wrongfully disclosing health information in a rare case involving criminal prosecution for violating HIPAA.

219
219
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Open Government Today: “The Harder I Work, The Behinder I Get”

Weissman's World

This 3-Minute Drill troubleshoots a typical municipality’s information challenges as it strives to meet its Open Government commitment. TL:DR Chances are the documents you need are hard to find and are hard to validate because: They’re in different departments, scattered all across the city; They’re in different computer systems; and As often as not, they’re […].

article thumbnail

Women in Tech: How Are We Doing? How Should We Be Doing?

Data Breach Today

Ann Ruckstuhl of Unisys Says Women Are Key to Solving Sector's Talent Shortage How are we doing on hiring more women in the technology sector? Ann Sung Ruckstuhl of Unisys says that from a demographic representation standpoint, we should be doing far better because of the demonstrable benefits to the business that women bring.

184
184
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Infographic: List of data breaches in 2018

IT Governance

2018 saw some of the biggest data breaches yet , with Marriott, Under Armour and Facebook suffering breaches that affected 500 million, 150 million and 100 million people respectively. It was also the year of the GDPR (General Data Protection Regulation) , which changed the way organisations handle customers’ personal data and introduced hefty fines for non-compliance.

More Trending

article thumbnail

FBI informed software giant Citrix of a security breach

Security Affairs

The American multinational software company Citrix disclosed a security breach, according to the firm an international cyber criminals gang gained access to its internal network. The American multinational software company Citrix is the last victim of a security breach, according to the company an international cyber criminal gang gained access to its internal network, Hackers were able to steal business documents, but its products or services were impacted by the attack.

Security 101
article thumbnail

EDPB Releases Overview on the Implementation and Enforcement of the GDPR

Hunton Privacy

On February 26, 2019, the European Data Protection Board (the “EDPB”) presented its first overview of the GDPR’s implementation and the roles and means of the national supervisory authorities to the European Parliament (the “Overview”). The Overview provides key statistics relating to the consistency mechanism among national data protection authorities (“DPAs”), the cooperation mechanism of the EDPB, the means and powers of the DPAs and enforcement of the GDPR at the national level.

GDPR 88
article thumbnail

More than billion records exposed online by email validation biz Verifications.io

Security Affairs

Experts found an unprotected server exposing online 4 MongoDB databases belonging to the email validation company Verifications.io. A new mega data leak made the headlines, an unprotected MongoDB database (150GB) belonging to a marketing company exposed up to 809 million records. The archive includes 808,539,849 records containing: emailrecords = 798,171,891 records emailWithPhone = 4,150,600 records businessLeads = 6,217,358 records.

Archiving 101
article thumbnail

Drones of the future will be smart (and maybe dangerous)

DXC Technology

Drones have been around for a few years now, but the truth is their usefulness largely has been limited to providing visual information to users in the form of photos and video captured by their onboard digital cameras. That’s great if you’re a photographer, need to inspect an inaccessible piece of equipment or some farm […].

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Google discloses Windows zero-day actively exploited in targeted attacks

Security Affairs

Google this week revealed a Windows zero-day that is being actively exploited in targeted attacks alongside a recently fixed Chrome flaw. Google this week disclosed a Windows zero-day vulnerability that is being actively exploited in targeted attacks alongside a recently addressed flaw in Chrome flaw ( CVE-2019-5786). The Windows zero-day vulnerability is a local privilege escalation issue in the win32k.sys kernel driver and it can be exploited for security sandbox escape. “It is a local p

article thumbnail

How to control costs and simplify life with IBM Hybrid Data Management Platform

IBM Big Data Hub

The IBM Hybrid Data Management Platform provides simplicity and control in one package for your hybrid architecture needs or journey to the cloud.

Cloud 89
article thumbnail

Citrix Hacked by 'International Cybercriminals'

Dark Reading

FBI informed Citrix this week of a data breach that appears to have begun with a 'password spraying' attack to steal weak credentials to access the company's network.

article thumbnail

SLUB Backdoor leverages GitHub and Slack in targeted attacks

Security Affairs

Malware researchers from Trend Micro have spotted a new piece of malware dubbed SLUB that leverages GitHub and Slack for C&C communications. Malware researchers at Trend Micro have spotted a new backdoor dubbed SLUB that abuse GitHub and Slack for command and control (C&C) communications. According to the experts, the SLUB backdoor (Backdoor.Win32.SLUB.A) was only used in targeted attacks by sophisticated threat actors.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cybersecurity Insurance Not Paying for NotPetya Losses

Schneier on Security

This will complicate things: To complicate matters, having cyber insurance might not cover everyone's losses. Zurich American Insurance Company refused to pay out a $100 million claim from Mondelez, saying that since the U.S. and other governments labeled the NotPetya attack as an action by the Russian military their claim was excluded under the "hostile or warlike action in time of peace or war" exemption.

article thumbnail

Zerodium $500,000 for VMware ESXi, Microsoft Hyper-V Exploits

Security Affairs

Zero-day broker firm Zerodium is offering up to $500,000 for VMware ESXi (vSphere) and Microsoft Hyper-V vulnerabilities. Exploit acquisition firm Zerodium is offering up to $500,000 for VMware ESXi and Microsoft Hyper-V vulnerabilities. The company is looking for exploits that allow guest-to-host escapes in default configurations to gain full access to the host.

Access 71
article thumbnail

Videos and Links from the Public-Interest Technology Track at the RSA Conference

Schneier on Security

Yesterday at the RSA Conference, I gave a keynote talk about the role of public-interest technologists in cybersecurity. (Video here ). I also hosted a one-day mini-track on the topic. We had six panels, and they were all great. If you missed it live, we have videos: How Public Interest Technologists are Changing the World : Matt Mitchell, Tactical Tech; Bruce Schneier, Fellow and Lecturer, Harvard Kennedy School; and J.

article thumbnail

RSAC 2019: The Dark Side of Machine Learning

Threatpost

As smart devices permeate our lives, Google sends up a red flag and shows how the underlying systems can be attacked.

Privacy 85
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Balance for better at OpenText HQ

OpenText Information Management

Gender balance is not just a women’s issue, it’s a business issue. As VP of the Global Partners and Alliances team at OpenText, I know first-hand the importance of creating balanced and diverse teams. I firmly believe that strong leaders have strong teams, and it takes a diverse set of voices, opinions and experiences to … The post Balance for better at OpenText HQ appeared first on OpenText Blogs.

IT 67
article thumbnail

Data Governance Stock Check: Using Data Governance to Take Stock of Your Data Assets

erwin

For regulatory compliance (e.g., GDPR) and to ensure peak business performance, organizations often bring consultants on board to help take stock of their data assets. This sort of data governance “stock check” is important but can be arduous without the right approach and technology. That’s where data governance comes in …. While most companies hold the lion’s share of operational data within relational databases, it also can live in many other places and various other formats.

article thumbnail

Weekly Update 129

Troy Hunt

Heaps of stuff going on this week with all sorts of different bits and pieces. I bought a massive new stash of HIBP stickers (1ok oughta last. a few weeks?), I'll be giving them out at a heap of upcoming events, I was on the Darknet Diaries podcast (which is epic!) plus there's more insights into the ShareThis data breach and the ginormous verifications.io incident.

article thumbnail

Celebrating International Women’s Day: Introducing Women of Collibra

Collibra

This year we are celebrating International Women’s Day by sharing details about a new group we launched over the past year: Women of Collibra. International Women’s Day is a time when we come together as a global community to celebrate the achievements of women around the world. And while there is much to celebrate, it’s also a time to recognize how much work is still left to do.

IT 64
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Citrix Falls Prey to Password-Spraying Attack

Threatpost

International cybercriminals likely exploited weak passwords on an internal network, the FBI said.

article thumbnail

Q&A: International Women’s Day

Thales Cloud Protection & Licensing

Today is International Women’s Day – an important day at Thales. Not only are we celebrating all the hard-working women in our company, but we are also taking this opportunity to acknowledge all women globally with our commitment to creating a more gender-balanced world. This year’s theme, Balance for Better, stands to take action for equality and celebrate women’s achievements.

article thumbnail

RSA Conference 2019: Operational Technology Widens Supply Chain Attack Surfaces

Threatpost

Between operational technology and open source, the supply chain is rapidly expanding - and companies that can't keep up will be the next security targets, said experts at RSA Conference 2019.

article thumbnail

Shifting Attacks Put Increasing ID Fraud Burden on Consumers

Dark Reading

Card-present fraud is down, but attackers continue to find new strategies, and consumers are paying the price.

75
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Turn On Auto-Updates Everywhere You Can

WIRED Threat Level

Meltdowns like the Chrome zero day bug show why enabling auto-updates can be the wisest choice for many consumers.

article thumbnail

Ultrasound Machine Diagnosed with Major Security Gaps

Dark Reading

Check Point researchers investigate security risks and point to implications for medical IoT devices.

IoT 77
article thumbnail

Shake IT out – by Emily and her PC (not Florence and the machine….)

Micro Focus

First off, there are some fantastic musical role models out there helping to change the mindset of women, one power ballad at a time, so thanks must go to Florence for the inspiring song behind the title and titles used in this #InternationalWomansDay blogpost. ‘It’s always darkest before the dawn’ In celebration of International Women’s.

IT 52