Thu.Jan 31, 2019

article thumbnail

Apple Slams Facebook for Monitoring App Given to Minors

Data Breach Today

Facebook's Internal iOS Apps Break After Apple Revokes Developer Certificate Apple has revoked Facebook's enterprise certificate, leaving the social network's employees unable to access internal iOS apps, after Facebook used it to distribute an app that monitored smartphone activity, sometimes from minors, in exchange for monthly payments. Facebook says it did nothing wrong.

Access 238
article thumbnail

MY TAKE: ‘Bashe’ attack theorizes a $200 billion ransomware raid using NSA-class cyber weapons

The Last Watchdog

A report co-sponsored by Lloyd’s of London paints a chilling scenario for how a worldwide cyberattack could trigger economic losses of some $200 billion for companies and government agencies ill-equipped to deflect a very plausible ransomware attack designed to sweep across the globe. Related: U.S. cyber foes exploit government shutdown. The Cyber Risk Management (CyRiM) project lays out in detail how a theoretical ransomware attack – dubbed the “Bashe” campaign – could improve upon the real lif

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy: Several States Consider New Laws

Data Breach Today

After California Takes Bold Action, Other States Ponder Privacy Protection Measures Several U.S. states are considering new legislation to shore up consumer data privacy laws in the wake of California passing strict privacy requirements last year. What's in the pipeline?

Privacy 234
article thumbnail

Researchers published the PoC exploit code for Linux SystemD bugs

Security Affairs

Security researchers at the security firm Capsule8 have published exploit code for the vulnerabilities in Linux systemD disclosed in January. Security researchers at the security firm Capsule8 have published exploit code for the vulnerabilities in Linux systemD disclosed in January. Early this month, security firm Qualys disclosed three flaws (CVE-2018-16864, CVE-2018-16865, and CVE-2018-16866 ) in a component of systemd , a software suite that provides fundamental building blocks for a Linux op

Security 107
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Airbus Hacked: Aircraft Giant Discloses Data Breach

Data Breach Today

Investigation Underway After Attack Compromises Employee Details Airbus says it suffered a hack attack, leading to a breach of "contact and IT identification details" for at least some of its EU employees. The aerospace giant says its investigation continues and that it has notified European privacy authorities, per GDPR requirements.

More Trending

article thumbnail

Will Huawei Play a Key Role in 5G Network Development?

Data Breach Today

India's Private Carriers Support Chinese Firm's Technology for Cost Advantage Despite early indications that India would not use technology from Chinese telecom giant Huawei in its program to build a 5G network, because of security concerns, many security experts now predict the government likely will reverse itself and allow the use of that technology to help hold down costs.

article thumbnail

8 Cybersecurity Myths Debunked

Dark Reading

The last thing any business needs is a swarm of myths and misunderstandings seeding common and frequent errors organizations of all sizes make in safeguarding data and infrastructure.

article thumbnail

Inside Matrix and Emotet: How They Work, and How to Defend

Data Breach Today

Sophos is out with new reports on Matrix and Emotet , two different types of cyberattacks that are hitting enterprise defenses. Matrix is a targeted ransomware, an emerging type of attack Sophos expects to gain prominence, and Emotet is malware that has evolved over the years into an opportunistic, polymorphic threat that can wreak havoc in many different ways.

article thumbnail

CookieMiner Mac Malware steals browser cookies and sensitive Data

Security Affairs

Palo Alto Networks discovered a piece of Mac malware dubbed CookieMiner that is targeting browser cookies associated with cryptocurrency exchanges and wallet service websites. Researchers from Palo Alto Networks discovered a new piece of Mac malware dubbed CookieMiner that steals browser cookies associated with cryptocurrency exchanges and wallet service websites along with other sensitive data.

Mining 96
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

SBI Investigates Reported Massive Data Leak

Data Breach Today

Report: India's Largest Bank Had Database That Lacked Password Protection The State Bank of India, the nation's largest bank, is investigating an apparent data leak that reportedly exposed information on millions of its customers. Security experts are calling on all banks to improve their server management practices.

Passwords 171
article thumbnail

OpenText Buys Catalyst Repository Systems, Inc.

OpenText Information Management

I’m pleased to announce that OpenText has acquired Catalyst Repository Systems, Inc., a leading provider of cloud-based eDiscovery software for large-scale discovery and regulatory compliance. This acquisition extends our leadership in both the Enterprise eDiscovery and Legal Tech markets, increasing our scale and scope with new capabilities, new enterprise customers and deeper coverage of the … The post OpenText Buys Catalyst Repository Systems, Inc. appeared first on OpenText Blogs.

article thumbnail

How Integration, Orchestration Help in Battling Cyberthreats

Data Breach Today

Improved integration, automation and orchestration are needed to better detect and respond to evolving cyberthreats, says John Maynard, vice president and global security specialist at Cisco Systems.

Security 164
article thumbnail

8 key elements of an effective staff awareness training programme

IT Governance

Information security professionals invariably spend most of their time and resources developing measures to prevent crooks breaking into their systems, but did you know that the majority of data breaches are caused by an employee misplacing, stealing or being tricked into handing over sensitive information ? These kinds of incidents thrive because organisations don’t place enough emphasis on security awareness programmes , which reduce the risk of human error and malicious insiders.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Airbus data breach exposes some employees’data

Security Affairs

The European airplane manufacturer Airbus announced to have suffered a data breach that exposed some employees’ data. The European airplane manufacturer Airbus announced to have suffered a data breach, hackers broke into the company “Commercial Aircraft business” information systems and gained access to some of its employees’ personal information. “Airbus SE (stock exchange symbol: AIR) detected a cyber incident on Airbus “Commercial Aircraft business” information s

article thumbnail

Security Flaws in Children's Smart Watches

Schneier on Security

A year ago , the Norwegian Consumer Council published an excellent security analysis of children's GPS-connected smart watches. The security was terrible. Not only could parents track the children, anyone else could also track the children. A recent analysis checked if anything had improved after that torrent of bad press. Short answer: no. Guess what: a train wreck.

article thumbnail

In Landmark Case, Illinois Supreme Court Sets Low Bar For Claims Under Illinois’ Biometric Information Privacy Act

Data Matters

On January 25, 2019, the Illinois Supreme Court unanimously held that a plaintiff does not need to allege any actual injury or damages to successfully state a claim under the Illinois Biometric Information Privacy Act (BIPA). Rosenbach v. Six Flags Entertainment Corp., 2019 IL 123186 (Jan. 25, 2019) (a copy of the opinion is available here ). A violation of the statute by itself is sufficient to state a claim, even if no breach or misuse of the biometric information or identifier has occurred.

Privacy 76
article thumbnail

Dutch DPA Publishes 2018 Report on Data Breach Statistics

Hunton Privacy

On January 29, 2019, the Dutch Data Protection Authority ( Autoriteit Persoonsgegevens , the “Dutch DPA”) published a report (in Dutch) on the personal data breach notifications received in 2018 (the “Report”). The EU General Data Protection Regulation (the “GDPR”) requires data controllers to notify a personal data breach to the competent Data Protection Authority (“DPA”) within 72 hours after becoming aware of it.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

4 ways to monetize data using IBM Cloud Private for Data

IBM Big Data Hub

IBM Cloud Private for Data is a data and analytics platform that provides that cohesive ecosystem to accelerate data monetization to impact your bottom line without the data leaving your organization.

Cloud 77
article thumbnail

31st January Weekly Podcast: Facebook VPN, FaceTime bug, and Internet Explorer 10

IT Governance

In this week’s podcast we discuss Facebook’s VPN, an Apple FaceTime bug being discovered and the end of Internet Explorer 10. Hello and welcome to the IT Governance podcast for Thursday, 31 st January 2019. Neil is unfortunately off sick today, so I will be doing my best to fill in. Here are this week’s stories. Facebook feature in the news yet again, this time for ‘secretly’ paying teens and young adults $20 per month to install a VPN on their phones, allowing the company to essentially track t

article thumbnail

Airbus Data Takes Flight; and Billions of Credentials Dumped on Dark Web

Threatpost

A cyberattack lifts employee data at the French aerospace giant as news hits of "Collections 2-5" being passed around the underground.

article thumbnail

Dell, CrowdStrike, Secureworks Join Forces to Secure Endpoints

Dark Reading

Dell SafeGuard and Response is geared toward businesses, governments, and schools that may lack resources they need to detect and remediate sophisticated threats.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Pulls Data-Chugging App From iOS Devices

Threatpost

A day after Facebook was dinged for shady iOS distribution techniques of its data-collecting research app, Google was discovered using the same methods for its own app.

article thumbnail

Cisco Router Vulnerability Gives Window into Researchers' World

Dark Reading

The research around a recent vulnerability shows how researchers follow leads and find unexpected results.

77
article thumbnail

Major market trends driving the manufacturing sector in 2019

OpenText Information Management

Earlier this year, OpenText™ became a member of the Manufacturers Leadership Council, the highly influential leadership network for senior executives in the manufacturing industry. Recently, the organization outlined some of the market trends it saw affecting the industry this year. I thought I’d share some of them with you. Manufacturing has seen some challenging times … The post Major market trends driving the manufacturing sector in 2019 appeared first on OpenText Blogs.

article thumbnail

DevOps adoption rises to meet business, data privacy demands

Information Management Resources

DevOps adoption is increasing and spreading across organizations, bringing together application and database development, delivering business benefits, and helping companies comply with data privacy regulations.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

U.S. Government Goes After North Korea’s Joanap Botnet

Threatpost

The Department of Justice is looking to dismantle the Joanap botnet, which has been built and controlled by North Korea-linked hackers since 2009.

article thumbnail

For a Super Security Playbook, Take a Page from Football

Dark Reading

Four key questions to consider as you plan out your next winning security strategy.

article thumbnail

TheMoon Rises Again, With a Botnet-as-a-Service Threat

Threatpost

A new module allows it to be rented to other malicious actors -- and it's likely other new capabilities are coming down the pike.

IT 59