Mon.Feb 11, 2019

article thumbnail

With Doctored Photos, Thieves Try to Steal Bitcoin

Data Breach Today

'Deep Fakes' May Eventually Complicate Identity Verification Cryptocurrency exchanges are seeing fraudsters submit doctored photos in an attempt to reset two-step verification on accounts. The ruse appears to have some degree of success, underscoring the difficulties around verifying identity on the internet.

233
233
article thumbnail

GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

The Last Watchdog

The moment we’ve all feared has finally come to pass. When government agencies and international intelligence groups pooled together resources to gather user data, the VPN’s encryption seemed like the light at the end of the tunnel. Related: California enacts pioneering privacy law. However, it looks like things are starting to break apart now that Australia has passed the “Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Health Data Security: The Most Promising Technologies

Data Breach Today

Analytics, artificial intelligence and machine learning are increasingly playing promising roles in healthcare data security, say Ron Mehring, CISO at Texas Health Resources, a large delivery system, and Axel Wirth of Symantec, a technology vendor. They were featured speakers at the HIMSS19 conference.

article thumbnail

Creating Magic Moments for Your Customers with Intelligent Business Processes

AIIM

Content, documents, and information are at the center of all organizations, of all sizes, and in all industries. But once your clients need to review, approve, sign a document, or receive some information— efficiency is key. That is when you need your organization and processes to shine. Allen Bonde, an analyst at Forrester , defines “The Magic Moment” as the moment of communication between your organization and your customer.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Assessing IoT Risks in Healthcare Environments

Data Breach Today

Healthcare organizations should steer clear of connecting internet of things devices to their networks unless they serve a precise medical purpose, says attorney Julia Hesse, a featured speaker at the HIMSS19 Conference.

IoT 175

More Trending

article thumbnail

The Who, What and Why of Micro Focus

Micro Focus

Over the past decade, through a combination of organic growth and M&A, Micro Focus has grown precipitously. Today, the company has thousands of employees in 43 countries worldwide, and is one of the largest pure-play enterprise software companies in the world. Yet, despite this size and growth, and likely because the company is headquartered in.

article thumbnail

620 million accounts stolen from 16 hacked websites available for sale on the dark web

Security Affairs

620 million accounts stolen from 16 hacked websites (Dubsmash, Armor Games, 500px, Whitepages, ShareThis) available for sale on the dark web. The Register revealed in exclusive that some 617 million online account details stolen from 16 hacked websites are available for sale on the dark web. The advertising for the sale of the huge trove of data was published in the popular Dream Market black marketplace, data are available for less than $20,000 worth of Bitcoin.

Sales 91
article thumbnail

Can two-factor authentication save us from our inability to create good passwords?

IT Governance

An advert is currently running in which a man gets his password hacked because, the ad implies, he wasn’t using a VPN (virtual private network). The man’s password? ‘John123’. When you’re that hopeless at creating login credentials, there’s not much a VPN can do to help. Sooner rather than later, someone will guess your password and stumble into a wealth of sensitive information.

article thumbnail

A mysterious code prevents QNAP NAS devices to be updated

Security Affairs

Users of QNAP NAS devices are reporting through QNAP forum discussions of mysterious code that adds some entries that prevent software update. Users of the Network attached storage devices manufactured have reported a mystery string of malware attacks that disabled software updates by hijacking entries in host machines’ hosts file. According to the users, the malicious code adds some 700 entries to the /etc/hosts file that redirects requests to IP address 0.0.0.0.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What the Government Shutdown Teaches Us about Cybersecurity

Dark Reading

As lawmakers face a Friday deadline to prevent the federal government from closing a second time, we examine the cost to the digital domain, both public and private.

article thumbnail

MetaMask app on Google Play was a Clipboard Hijacker

Security Affairs

Security researcher Lukas Stefanko from ESET discovered the first Android cryptocurrency clipboard hijacker impersonating MetaMask on the official Google Play store. The rogue MetaMask app is a Clipboard Hikacker that monitors a device’s clipboard for Bitcoin and Ethereum addresses and replaces them with addresses of wallets under the control of the attacker.

article thumbnail

Michigan Adopts National Association of Insurance Commissioners’ (NAIC) Insurance Data Security Model Law

Data Matters

On December 28, 2018, Michigan adopted the National Association of Insurance Commissioners’ (NAIC) Insurance Data Security Model Law in the form of Michigan H.B. 6491 (Act). By doing so, Michigan joins Ohio and South Carolina as the third state to adopt the Model Law and the fifth state – along with Connecticut and New York – to have enacted cybersecurity regulations focused on insurance companies.

article thumbnail

A breakthrough in GDPR data analytics

IBM Big Data Hub

The European Union recently implemented its General Data Protection Regulation (EU) 2016/679 (GDPR). This new regulation has created a challenge for many organizations in terms of how to maintain compliance with the new data protection and privacy laws while continuing to use data for analytics.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Phishing Campaign Hits Credit Unions

Adam Levin

A phishing campaign targeting credit unions and other financial institutions recently found its way into the email inboxes of anti-money laundering officers. Credit unions and banks are both required by the Bank Secrecy Act (BSA) to report potential money laundering operations and to dedicate at least two staff members to ensure compliance. The phishing emails seemed to specifically target the accounts of these BSA officers, which raises the concern that a database containing their information m

article thumbnail

Amber Authenticate Protects Video Footage From Deepfakes and Tampering

WIRED Threat Level

Many of the body cameras worn by police are woefully vulnerable to hacking and manipulation. Amber Authenticate wants to fix that—with the blockchain.

article thumbnail

Kofax Being Opportunistic with Capture Acquisitions

Info Source

Is Kofax doing a capture roll-up? It may look that way, but I would describe it more as an opportunistic short-term play in order to fund a more strategic plan around intelligent automation. “Kofax is in a unique position in that we are trying to protect our base while also funding the future growth portion of our business,” explained Chris Huff, Kofax’s Chief Strategy Officer, during a recent call to discuss the ISV’s acquisition of Top Image Systems (TIS). “The co

Cloud 69
article thumbnail

Experian: US Suffers the Most Online Fraud

Dark Reading

New data from the credit reporting firm shows the sheer scale of online activity in the US also has made businesses and consumers there prime targets.

70
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why the US Needs a Strategy for AI

WIRED Threat Level

Opinion: With its American AI Initiative, the White House is devoting funding, research, and data infrastructure to boosting our prowess in artificial intelligence.

article thumbnail

Threatpost Poll: Is It Impossible to Secure Mobile Devices?

Threatpost

From spyware to leaky apps, mobile devices are facing a heightened level of threats. Are we prepared to secure them?

article thumbnail

Client-Side DNS Attack Emerges From Academic Research

Dark Reading

A new DNS cache poisoning attack is developed as part of the research toward a dissertation.

85
article thumbnail

First ‘Clipper’ Malware Discovered on Google Play

Threatpost

A fake MetaMask app is the first instance of this new type of cryptocurrency stealer appearing outside of shady third-party app stores.

71
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Most Companies Are Confident in Their Compliance Controls: eSecurity Planet Survey

eSecurity Planet

Companies are more confident in their ability to meet GDPR and other compliance demands, but some important controls haven't been fully adopted.

article thumbnail

Password Checkup Chrome extension warns users about compromised logins

Security Affairs

Google has released a new extension for Chrome dubbed Password Checkup that will alert users if their username/password combinations were leaked online as part of a dump after a data breach. Last week Google released Password Checkup a Chrome extension that warns users about compromised logins every time they will enter login credentials on a website.

article thumbnail

U.S. Senators Urge VPN Ban for Federal Workers Over Spying

Threatpost

Wyden and Rubio are eyeing VPN services they say could be instruments of espionage for Russia and China.

Risk 79
article thumbnail

Security Pros Agree Military Should Conduct Offensive Hacking

Dark Reading

But it can't operate in a bubble, a new Washington Post study indicates.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Roll out a comprehensive, compliant health and safety program without relying on IT

OpenText Information Management

Imagine you’re a newly hired health and safety expert for a growing global organization. Your mandate? Implement a much-needed health and safety program across the organization, starting with improving the incident reporting process. As part of your industry expertise, you know that protecting your organization from liability and other risks involves introducing a cohesive series … The post Roll out a comprehensive, compliant health and safety program without relying on IT appeared f

IT 55
article thumbnail

OkCupid Denies Data Breach Amid Account Hack Complaints

Dark Reading

Users on the dating website report hackers breaking into their accounts, changing email addresses, and resetting passwords.

article thumbnail

Data governance takes a turn — And it’s a doozy

Information Management Resources

Data is too dynamic, federated and ownership-complex to apply the same practices for compliance as the gold standard for data governance. Yes, I’m saying it: Kill your data governance program immediately.