Wed.Oct 03, 2018

article thumbnail

Experts' View: Avoid Social Networks' Single Sign-On

Data Breach Today

Use Password Managers and Unique Passwords for Every Service and App Step away from the social media single sign-on services, cybersecurity experts say, citing numerous privacy and security risks. Instead, they recommend that everyone use password managers to create unique and complex passwords for every site, service or app they use.

Passwords 203
article thumbnail

Don’t Let Data Overwhelm You

AIIM

Are you finding yourself overwhelmed by the amount of data you have to manage? While it's great to stay up with the latest technology, digital transformation can sometimes leave people feeling like there was a document "explosion" in their department. Not to worry, we're here to help. I invite you to join us for a free webinar on Wednesday, October 10th @ 2pm EDT as AIIM’s Chief Evangelist, John Mancini and Microsoft’s Principal Engineering Lead, Nishan DeSilva discuss the latest ways Office 365

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook Can't Reset All Breach Victims' Access Tokens

Data Breach Today

Social Network Reveals It Cannot Log Users Out of All Third-Party Services Warning: Attackers behind the recently revealed Facebook mega-breach may still be able to access victims' accounts at some third-party web services and mobile apps - and Facebook has offered no timeline for when a full lockdown might occur - although there are no signs of third-party account takeovers.

Access 178
article thumbnail

Four Ways the Data Scientist Has Evolved to the 21st Century

AIIM

In 1989, I took my first decision sciences course, and started coding in SAS at the age of 20. I greatly enjoyed pulling discoveries buried within mounds of data, although and even small datasets had many discoveries back then. At the root of every model I’ve built, even the simplest, was a solid understanding and foundational rigor of statistical theory.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Critical Elements of a Solid Cybersecurity Program

Data Breach Today

Healthcare organizations often fail to address five fundamental elements of a solid cybersecurity program, says security expert Mark Johnson of the consultancy LBMC Information Systems, who formerly was CISO at Vanderbilt University and Medical Center.

More Trending

article thumbnail

Election Security: Building Public Confidence

Data Breach Today

Suzanne Spaulding, former undersecretary for the Department of Homeland Security, says a key way to ensure public confidence in the security of U.S. elections is to rely on paper ballots for voting or as backups for electronic balloting.

Security 145
article thumbnail

Will you survive a data breach?

IT Governance

In the last year alone, almost half of UK businesses suffered a cyber security breach. And that’s just the tip of the iceberg. From Butlins to British Airways, recent headlines have been dominated by high-profile digital disasters. With the?advent of the GDPR (General Data Protection Regulation) ?at the end of May, the financial damage resulting from a breach?

article thumbnail

APEC Cross-Border Privacy Rules Enshrined in U.S.-Mexico-Canada Trade Agreement

Hunton Privacy

On September 30, 2018, the U.S., Mexico and Canada announced a new trade agreement (the “USMCA”) aimed at replacing the North American Free Trade Agreement. Notably, the USMCA’s chapter on digital trade recognizes “the economic and social benefits of protecting the personal information of users of digital trade” and will require the U.S., Canada and Mexico (the “Parties”) to each “adopt or maintain a legal framework that provides for the protection of the personal information of the users[.

Privacy 87
article thumbnail

Hidden Cobra APT used the new ATM cash-out scheme FASTCash to hit banks worldwide

Security Affairs

A joint technical alert from the DHS, the FBI, and the Treasury warning about a new ATM cash-out scheme, dubbed “FASTCash,” used by Hidden Cobra APT. The US-CERT has released a joint technical alert from the DHS, the FBI, and the Treasury warning about a new ATM cash-out scheme, dubbed “ FASTCash ,” being used by the prolific North Korean APT hacking group known as Hidden Cobra (aka Lazarus Group and Guardians of Peace).

Retail 86
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Presidential Text Alert Has a Long, Strange History

WIRED Threat Level

While the presidential text that hits your phone Wednesday will be the first of its kind, it's part of a decades-long lineage of official government Doomsday alerts.

article thumbnail

APT38 is behind financially motivated attacks carried out by North Korea

Security Affairs

Security experts from FireEye published a report on the activity of financially motivated threat actors, tracked as APT38, linked to the North Korean government. The attacks aimed at financial institutions, FireEye estimates APT38 has stolen at least a hundred million dollars from banks worldwide. APT38 appears to be a North Korea-linked group separate from the infamous Lazarus group, it has been active since at least 2014 and it has been observed targeting over 16 organizations across 11 countr

article thumbnail

Terahertz Millimeter-Wave Scanners

Schneier on Security

Interesting article on terahertz millimeter-wave scanners and their uses to detect terrorist bombers. The heart of the device is a block of electronics about the size of a 1990s tower personal computer. It comes housed in a musician's black case, akin to the one Spinal Tap might use on tour. At the front: a large, square white plate, the terahertz camera and, just above it, an ordinary closed-circuit television (CCTV) camera.

article thumbnail

Researchers associated the recently discovered NOKKI Malware to North Korean APT

Security Affairs

Security experts from Palo Alto Networks have collected evidence that links the recently discovered NOKKI malware to North Korea-Linked APT. Researchers from Palo Alto Networks have spotted a new variant of the KONNI malware , tracked as NOKKI. that was attributed to North Korea-linked attackers. NOKKI borrows the code from the KONNI malware, the latter is a remote access Trojan (RAT) used in targeted attacks on organizations linked to North Korea, while NOKKI was used to target politically-moti

Cloud 82
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Malware Has a New Way to Hide on Your Mac

WIRED Threat Level

By only checking a file's code signature when you install it—and never again—macOS gives malware a chance to evade detection indefinitely.

IT 89
article thumbnail

Experts found 9 NAS flaws that expose LenovoEMC, Iomega Devices to hack

Security Affairs

Experts discovered nine vulnerabilities affecting NAS devices that could be exploited by unauthenticated attackers to access protected content. Nine flaws affecting NAS devices could be exploited by unauthenticated attackers to access protected content. The vulnerabilities are traked as CVE-2018-9074 , CVE-2018-9075 , CVE-2018-9076 , CVE-2018-9077 , CVE-2018-9078 , CVE-2018-9079 , CVE-2018-9080 , CVE-2018-9081 and CVE-2018-9082.

Access 79
article thumbnail

Inside the North Korean Hacking Operation Behind SWIFT Bank Attacks

Dark Reading

FireEye details how this money-stealing operation it now calls APT 38 has emerged in the past four years and how it operates.

IT 92
article thumbnail

New Danabot Banking Malware campaign now targets banks in the U.S.

Security Affairs

According to malware researchers from Proofpoint, DanaBot attackers launched a new campaign aimed at banks in the United States. A couple of weeks ago, security experts at ESET observed a surge in activity of DanaBot banking Trojan that was targeting Poland, Italy, Germany, Austria, and as of September 2018, Ukraine. DanaBot is a multi-stage modular banking Trojan written in Delphi, the malware allows operators to add new functionalities by adding new plug-ins.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Unveiling the all-new IBM Cognos Analytics, fueled by AI

IBM Big Data Hub

Many people agree that artificial intelligence (AI) is the key to the future of business. However, unlocking the full potential of AI has proven elusive for many companies, especially at the enterprise level.

article thumbnail

Cyber resilience in the Scottish public sector: meeting the Cyber Essentials certification deadline

IT Governance

Protecting Scotland’s digital networks and infrastructure, and ensuring they are resilient to cyber attacks, is essential to the country’s prosperity and reputation. The Scottish government therefore launched Safe, secure and prosperous: a cyber resilience strategy for Scotland in 2015 to help develop a culture of cyber resilience across the country.

article thumbnail

iPhone Hack Allows Access to Contacts, Photos

Adam Levin

Apple’s iOS 12 update includes a workaround that can allow a hacker to access a device’s photos and contacts without having the passcode to unlock it. It does not, however, allow unauthorized users full access to the device, and executing the workaround isn’t exactly an easy thing to do. Security research Jose Rodriguez recently posted a Youtube video showing how to exploit a bug in Siri, the iPhone’s voice assistant with a relatively convoluted process (it either takes 16 or 37 steps, depending

Access 70
article thumbnail

100,000-Plus Home Routers Hijacked in Campaign to Steal Banking Credentials

Dark Reading

The GhostDNS campaign, which has been mainly targeting consumers in Brazil, has exploded in scope since August.

89
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Artificial Intelligence: A Cybersecurity Tool for Good, and Sometimes Bad

Threatpost

Attractive to both white-hats and cybercriminals, AI's role in security has yet to find an equilibrium between the two sides.

article thumbnail

Cyber Defense Magazine Annual Global Edition for 2018 has arrived. Enjoy it!

Security Affairs

We hope you enjoy our Cyber Defense Magazine Annual Global Edition for 2018 including our Global Awards Winners for 2018…packed with over 75+ pages of excellent content. Cyber Defense Magazine. Global Edition for 2018 has arrived. Global Awards Winners Announced! Sponsored B y: TrendMicro. InfoSec Knowledge is Power. We have 6 years of eMagazines online with timeless content.

IT 66
article thumbnail

Pumping the Brakes on Artificial Intelligence

Threatpost

Businesses are increasingly adopting artificial intelligence, but all too often these platforms don't feature security-by-design.

article thumbnail

Facebook faces $1.6bn fine and formal investigation over massive data breach

The Guardian Data Protection

Irish data regulator could penalize the social network after hack of nearly 50m accounts The Irish Data Protection Commission has opened a formal investigation into a data breach that affected nearly 50m Facebook accounts , which could result in a fine of up to $1.63bn. The breach, which was discovered by Facebook engineers on Tuesday 24 September, gave hackers the ability to take over users’ accounts.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Cloud, Containers, Orchestration Big Factors in BSIMM9

Threatpost

A converged architecture that brings independent software vendors, cloud vendors and IoT vendors together is reshaping the security landscape.

Cloud 67
article thumbnail

Retail execution with SAP DAM

OpenText Information Management

There’s a battle at your local shop that, as a consumer, you probably don’t know is happening. It affects the products and options available to you and what you buy. The battle is called retail execution. Securing shelf space is not cheap and persuading retailers to take your products means convincing them your product is … The post Retail execution with SAP DAM appeared first on OpenText Blogs.

Retail 58
article thumbnail

Parliamentary library was pressured on My Health Record advice, emails reveal

The Guardian Data Protection

The health department complained that the library’s advice contradicted Greg Hunt’s assurances on police access Pressure from the health department prompted the parliamentary library to remove then amend advice issued in June that contradicted the health minister Greg Hunt’s assurances about police access to My Health Records, new correspondence reveals.