Wed.Jul 25, 2018

article thumbnail

Under GDPR, Data Breach Reports in UK Have Quadrupled

Data Breach Today

Privacy Regulator Sees 1,750 Breach Reports in June, Up From 400 in April Under the EU's General Data Protection Regulation, within 72 hours of an organization learning about the data breach, it must report the breach to relevant authorities or face fines. The U.K.'s data privacy watchdog says it's already seen the volume of self-reported breaches quadruple.

article thumbnail

Expert says: Hack your Smart Home to Secure It

The Security Ledger

Smart home security starts at home, according to researcher Michael Sverdlin who says that consumers should explore the security of their smart home technology and consider simple modifications or hacks to remove insecure or promiscuous features. Not long ago, Michael Sverdlin, the back-end team leader for IoT security startup Vdoo, bought his. Read the whole entry. » Related Stories U.S. official: Don’t bring laptops or mobile devices to the World Cup in Russia Fitness apps: Good for

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Here’s why identities are the true firewalls, especially as digital transformation unfolds

The Last Watchdog

Was it really that long ago that company networks were comprised of a straightforward cluster of servers, data bases, applications and user devices corralled largely on premises? Related article: Taking a ‘zero-trust’ approach to authentication. In today’s digitally transformed environment, companies must monitor and defend systems housed on-premises and in overlapping public and private clouds.

article thumbnail

LifeLock Bug Exposed Millions of Customer Email Addresses

Krebs on Security

Identity theft protection firm LifeLock — a company that’s built a name for itself based on the promise of helping consumers protect their identities online — may have actually exposed customers to additional attacks from ID thieves and phishers. The company just fixed a vulnerability on its site that allowed anyone with a Web browser to index email addresses associated with millions of customer accounts, or to unsubscribe users from all communications from the company.

Phishing 192
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Proposed Settlement in Lawsuit Tied to Insider Breach

Data Breach Today

Are Class Action Suits Stemming From Insider Breaches Easier for Plaintiffs to Win? A proposed settlement of a class action lawsuit against an Alabama hospital provides a total of up to $150,000 in relief to more than 1,200 individuals affected by a breach involving a former employee who was convicted of identity theft that led to federal tax refund fraud.

140
140

More Trending

article thumbnail

Facebook Battles Election Interference, Internal Criticism

Data Breach Today

Departing CSO Urges Major Culture Change - More Transparency, Storing Less Data Facebook has promised to bring machine learning to bear on the problem of hate speech and information warfare via its platform. But insiders have been urging the company to pursue a major cultural change, including prioritizing not doing anything "creepy" over the quest for short-term gain.

IT 113
article thumbnail

CCTV and the GDPR – an overview for small businesses

IT Governance

As of 25 May 2018, organisations that use CCTV to capture images of individuals are processing personal data as defined by the GDPR (General Data Protection Regulation) and must comply with the Regulation’s requirements. If your business uses CCTV – whether for security or employee monitoring purposes – and you’re unsure about your obligations under the new law and how they differ from those of the DPA (Data Protection Act) 1998, this blog outlines some of the areas you need to consider.

GDPR 102
article thumbnail

GDPR After the Deadline — Part 1 of 3 — The emerging challenges tied to information privacy and security

AIIM

The GDPR’s May 25, 2018 deadline set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers. We just published a new market research report on GDPR. The purpose of this survey of 262 executives was to quantify – as close to the May 25th deadline as possible – the following three key issues related to GDPR: How do organizations view the emerging challenges tied to information privacy and securi

GDPR 80
article thumbnail

Tips for your corporate file move: Seize the opportunity to improve

TAB OnRecord

A move is a great time to make changes to your records management program and a chance to improve the way your records are stored and handled. If you have had a big project in mind, now is the time, just follow these simple steps! Read More. The post Tips for your corporate file move: Seize the opportunity to improve appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Parliamentary library deletes post confirming police can access My Health Record

The Guardian Data Protection

Page removed after complaint from health department about ‘potential inaccuracies’ A complaint from the federal health department has prompted the parliamentary library to pull its advice that patients’ My Health Record could be accessed by police without a court order. A spokesman for the library told Guardian Australia the parliamentary librarian, Dianne Heriot, “decided to temporarily take down the post”, which contradicted the health minister’s advice, while it is reviewed after concerns wer

article thumbnail

Has the GDPR helped spark public interest in security?

IT Governance

One overlooked side-effect of the GDPR (General Data Protection Regulation) is the extent to which data privacy and information security have become widely discussed. Thousands upon thousands of emails were sent in the couple of weeks leading up to the GDPR’s 25 May deadline, informing people about the Regulation and what companies were doing to become compliant.

GDPR 68
article thumbnail

The ABCs of Hacking a Voting Machine

Dark Reading

A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.

IT 67
article thumbnail

ISO 27001: Is your certification legitimate?

IT Governance

If you’re among the many organisations that have adopted ISO 27001, you should have gone through the assessment process and received a certificate demonstrating that you are following the Standard’s requirements. Certification enables organisations to assure customers and clients that they are secure and reputable. Unfortunately, there are some instances where certification isn’t all that it seems to be.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Major Bluetooth Vulnerability

Schneier on Security

Bluetooth has a serious security vulnerability : In some implementations, the elliptic curve parameters are not all validated by the cryptographic algorithm implementation, which may allow a remote attacker within wireless range to inject an invalid public key to determine the session key with high probability. Such an attacker can then passively intercept and decrypt all device messages, and/or forge and inject malicious messages.

Paper 55
article thumbnail

Ten expert tips for visual data science

IBM Big Data Hub

Data science and machine learning provide the basis for business growth, cost and risk reduction and even new business model creation -- but implementing predictive analytics does present some challenges. IT Central Station members have shared tips that help organizations overcome the challenges in effective data preparation, model development and training.

article thumbnail

Equifax's Security Overhaul, a Year After Its Epic Breach

WIRED Threat Level

Nearly a year after hackers stole the personal data of 147 million people from Equifax, the company details how it's overhauling security.

IT 56
article thumbnail

On Financial Fraud

Schneier on Security

There are some good lessons in this article on financial fraud: That's how we got it so wrong. We were looking for incidental breaches of technical regulations, not systematic crime. And the thing is, that's normal. The nature of fraud is that it works outside your field of vision, subverting the normal checks and balances so that the world changes while the picture stays the same.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Good & Bad News About Today's Cybersecurity Investment Landscape

Dark Reading

Lots of things keep CISOs up at night. But instead of guessing what CISOs want, investors and vendors should incorporate customer feedback throughout product ideation and development cycles.

article thumbnail

SQL Server 2008 and Windows Server 2008 End of Extended Support

Daymark

On July 12, 2018, Microsoft announced new options for SQL Server 2008 and Windows Server 2008 end of support.

Cloud 63
article thumbnail

Korean Davolink routers are easy exploitable due to poor cyber hygene

Security Affairs

Davolink dvw 3200 routers have their login portal up on port 88, the access is password protected, but the password is hardcoded in the HTLM of login page. The story started in 2018 when Anubhav noticed a very basic flaw the routers of the Korean vendor Davolink. These Davolink dvw 3200 routers have their login portal up on port 88, the access is password protected.

article thumbnail

What is machine learning?

IBM Big Data Hub

A 101 article on machine learning.

87
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Hide ‘N Seek botnet also includes exploits for home automation systems

Security Affairs

Security experts from Fortinet have discovered that the Hide ‘N Seek botnet is now targeting vulnerabilities in home automation systems. The Hide ‘N Seek botnet was first spotted on January 10th when it was targeting home routers and IP cameras. It was first spotted on January 10th by malware researchers from Bitdefender then it disappeared for a few days, and appeared again a few week later infecting in less than a weeks more than 20,000 devices.

article thumbnail

Podcast: The Industrial World is Facing a Security Crisis

Threatpost

Eddie Habibi, the CEO of industrial IoT security company PAS, sounds off on how to secure the increasingly connected industrial control space.

IoT 50
article thumbnail

US-CERT Warns of ERP Application Hacking

Dark Reading

ERP applications such as Oracle and SAP's are open to exploit and under attack, according to a new report referenced in a US-CERT warning.

51
article thumbnail

The Death botnet grows targeting AVTech devices with a 2-years old exploit

Security Affairs

A new botnet, tracked as Death botnet has appeared in the threat landscape and is gathering unpatched AVTech devices with an old exploit. A new botnet, tracked as ‘Death botnet,’ has appeared in the threat landscape, its author that goes online with the moniker EliteLands is gathering unpatched AVTech devices in the malicious infrastructure.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Review: A Counterfeit, $100 iPhone X

IG Guru

We disassembled the phone and asked security researchers to probe it to find out what it is. Verdict: It's wild. The post Review: A Counterfeit, $100 iPhone X appeared first on IG Guru.

article thumbnail

Iranian Hacker Group Waging Widespread Espionage Campaign in Middle East

Dark Reading

Unlike other threat actors that have a narrow set of targets, Leafminer has over 800 organizations in its sights, Symantec says.

IT 45
article thumbnail

Facebook Security Exec Calls for Tightened Data Privacy

Threatpost

Security executive Alex Stamos called on Facebook to change its strategy around data in an internal memo - and privacy experts agree.

Privacy 42