Thu.Apr 04, 2019

article thumbnail

Sen. Warren Wants CEOs Jailed After Big Breaches

Data Breach Today

Bill Would Pave Way for Criminal Charges Against Execs for Corporate Wrongdoing Sen. Elizabeth Warren, D-Mass, has introduced legislation that would pave the way for top executives at major corporations to face criminal charges if their company's wrongdoing leads to harm, such as a major data breach. While business groups immediately criticized the plan, consumer advocates praised it.

article thumbnail

Alleged Chief of Romanian ATM Skimming Gang Arrested in Mexico

Krebs on Security

An alleged top boss of a Romanian crime syndicate that U.S. authorities say is responsible for deploying card-skimming devices at Automated Teller Machines (ATMs) throughout North America was arrested in Mexico last week on firearms charges. The arrest comes months after the accused allegedly ordered the execution of a former bodyguard who was trying to help U.S. authorities bring down the group’s lucrative skimming operations.

Paper 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Insights on Applying Behavioral Biometrics

Data Breach Today

Frances Zelazny of Biocatch Describes Uses for the Technology Frances Zelazny of Biocatch outlines the need for behavioral biometrics and how it can help mitigate fraud.

IT 168
article thumbnail

The German chemicals giant Bayer hit by a cyber attack

Security Affairs

The German chemicals giant Bayer confirmed that of a cyber attack, it confirmed the incident but clarified that no data has been stolen. The chemicals giant Bayer is the last victims of a cyber attack, it confirmed the incident, but pointed out the hackers haven’t stolen any data. According to the company, at the beginning of 2018, it detected an intrusion that linked to Winnti threat actors, a group of Chinese APTs belonging to the Beijing intelligence apparatus, Groups under the Winnti u

Security 108
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Disrupting Call Center Fraud With Voice Biometrics

Data Breach Today

Nuance Communications and Royal Bank of Scotland Share a Case Study Jason Costain of the Royal Bank of Scotland and Brett Beranek of Nuance Communications share a real world example of mitigating fraud with voice biometrics in a call center.

More Trending

article thumbnail

OpenText announces winners of the 2019 Partner Awards at Enterprise World

OpenText Information Management

The OpenText™ Partner Awards, presented annually at OpenText Enterprise World (EW), recognize our global Partners for their commitment to helping customers transform and maximize the potential of the intelligent and connected enterprise. The award winners exemplify top-performing Partners who are dedicated to helping our joint customers get the most out of their OpenText solutions. 2019 … The post OpenText announces winners of the 2019 Partner Awards at Enterprise World appeared first on O

95
article thumbnail

Adversarial Machine Learning against Tesla's Autopilot

Schneier on Security

Researchers have been able to fool Tesla's autopilot in a variety of ways, including convincing it to drive into oncoming traffic. It requires the placement of stickers on the road. Abstract: Keen Security Lab has maintained the security research work on Tesla vehicle and shared our research results on Black Hat USA 2017 and 2018 in a row. Based on the ROOT privilege of the APE (Tesla Autopilot ECU, software version 18.6.1), we did some further interesting research work on this module.

Risk 92
article thumbnail

Threat Group Employs Amazon-Style Fulfillment Model to Distribute Malware

Dark Reading

The operators of the Necurs botnet are using a collection of US-based servers to send out banking Trojans, ransomware, and other malware on behalf of other cybercriminals.

article thumbnail

Former Mozilla CTO Harassed at the US Border

Schneier on Security

This is a pretty awful story of how Andreas Gal, former Mozilla CTO and US citizen, was detained and threatened at the US border. CBP agents demanded that he unlock his phone and computer. Know your rights when you enter the US. The EFF publishes a handy guide. And if you want to encrypt your computer so that you are unable to unlock it on demand, here's mu guide.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CNIL Publishes Binding Rules on Processing Biometric Data as Workplace Access Control

Hunton Privacy

On March 28, 2019, the French data protection authority (“CNIL”) published a “Model Regulation” addressing the use of biometric systems to control access to premises, devices and apps at work. The Model Regulation lays down binding rules for data controllers who are subject to French data protection law and process employee biometric data for such purposes.

Access 82
article thumbnail

Cisco fixes flaws RV320 and RV325 routers targeted in attacks

Security Affairs

On Thursday Cisco announced new security patches to definitively address two vulnerabilities in Small Business RV320 and RV325 routers. Last week Cisco revealed that security patches released in January to address vulnerabilities in Small Business RV320 and RV325 routers were incomplete. “The initial fix for this vulnerability was found to be incomplete.

article thumbnail

Keeping up with Quantum Technology | Quantum Computing

Everteam

Every time we think we have reached the technological peak, a new leap shows up with thousands of ideas, theories and inventions. While everyone is digging deep into the Artificial Intelligence, Machine Learning, Blockchain and many other new digital transformation phenomena, Quantum Computing has been transformed from theory to reality. A Quick Quantum look.

article thumbnail

How iOS App Permissions Open Holes for Hackers

Dark Reading

The permissions iOS apps request from users can turn the devices into spy tools and provide a toehold into the enterprise network, according to new research.

80
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Mavro Imaging and Con Edison Team Up to Maximize Processing Efficiency and Fight Fraud

Info Source

MavBridge Software Automation Helps Catch Fraudsters and Recover Over $7 Million. Westampton, NJ – April 2, 2019 — Mavro Imaging, a leading provider of lockbox, remittance, and forms processing software, recently completed a new system implementation at Con Edison, a large public utility, located in New York. The system is situated at the Con Edison processing facility and handles over 10 million paper check and EFT payments per year.

Paper 72
article thumbnail

True Cybersecurity Means a Proactive Response

Dark Reading

Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security.

article thumbnail

5 key learnings from the Gartner Data and Analytics Summit 2019

OpenText Information Management

Last week, OpenText joined thousands of IT and business leaders at this year’s Gartner Data & Analytics Summit in Orlando. As the leader in Big Content in addition to Big Data, we showcased how our flexible AI and analytics platform OpenText™ Magellan™ helps organizations uncover insights in structured and unstructured data for faster and more effective … The post 5 key learnings from the Gartner Data and Analytics Summit 2019 appeared first on OpenText Blogs.

article thumbnail

A New Era for Data Protection

Thales Cloud Protection & Licensing

It’s been an exciting week for everyone at Thales and Gemalto. The combination of our two companies creates the worldwide leader in digital security, protecting more data, transactions and identities than any other company and enabling tens of thousands of organizations to deliver trusted digital services to billions of individuals around the world.

Cloud 66
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Adept Streamlines the Composites Business at Toray

Synergis Software

Toray Composites is a world leader in a strong growth area, the manufacture of carbon fiber composites for industrial applications. The company has used Synergis Adept for years, helping it to streamline workflow and coordinate teams on three continents. Toray has been producing carbon fiber composite materials in the USA for more than 20 years. It has become a leading producer of advanced materials for the aerospace industry and other industries including energy and sports equipment.

article thumbnail

Python-Based Bot Scanner Gorging on Recon Intel

Dark Reading

Discovered by AT&T AlienLabs, new malware Xwo seeking default creds and misconfigurations in MySQL and MongoDB, among other services

81
article thumbnail

Preservica v6.0: next generation active digital preservation and discovery

Preservica

Reengineered from the ground-up, Preservica v6.0 delivers enhanced ease-of-use and new ways of working for archives, libraries, museums and businesses - built on a highly scalable platform designed for the future of digital preservation. New capabilities include - updated digital preservation pathways, easy drag & drop upload, online pre-ingest preparation, OCR, enhanced intuitive workflows, automated SharePoint archiving, support for Microsoft Azure and additional content access & disco

article thumbnail

Advantech addressed code execution and DoS flaws in WebAccess software

Security Affairs

Industrial automation firm Advantech addressed several serious vulnerabilities in its WebAccess SCADA software. WebAccess is a browser-based software package for human-machine interfaces (HMI) and SCADA systems developed by Advantech. The vulnerabilities affect WebAccess/SCADA Versions 8.3.5 and prior. The software is widely adopted in many sectors worldwide, such as critical manufacturing, energy, and water and wastewater.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Bases de una plataforma de negocio digital

DXC Technology

Cualquier empresa moderna utiliza hoy una plataforma de negocio digital como base principal de sus aplicaciones digitales. Este tipo de infraestructura digital proporciona la agilidad necesaria para poder construir y soportar el carácter dinámico de las aplicaciones modernas. Pero, ¿cómo son estas plataformas? En general, se sustenta sobre tres grandes pilares; inteligencia, orquestación y automatización. […].

article thumbnail

New XLoader variant leverage Twitter to hide C2 addresses

Security Affairs

Security experts at Trend Micro spotted a new variant of the XLoader Trojan that is targeting Android devices by posing as a security application. Trend Micro discovered a new variant of the XLoader Trojan that is targeting Android devices by posing as a security application, the malware also attempts to infect Apple devices (iPhones and iPads) through a malicious iOS profile.

article thumbnail

Facebook and Amazon are Locked in a Blame Game Over Leaked Data: Who’s Really To Blame?

Threatpost

After two databases were discovered leaking Facebook data, Facebook and Amazon are both pointing fingers - but researchers say the onus lies on all parties involved as data collection continues to grow.

article thumbnail

Third Parties in Spotlight as More Facebook Data Leaks

Dark Reading

Two third-party services left Facebook user data exposed online -- in one case, 540 million records of user comments -- highlighting the ease with which third-party developers can access data and the risk of lax security.

Risk 62
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Complexity in learning: Best practices for the future of work

DXC Technology

Today’s high performing organizations know that the world of learning has undergone tremendous change, and they need to put employees at the center. Employees require a lifetime of continuous learning to keep pace with change. An innovative approach to learning can help tackle the workforce skills gap, retain talent, increase performance and improve productivity.

57
article thumbnail

Alaris Expands Information Capture Ecosystem for Small-to-Medium Enterprises

Info Source

Alaris E1035. ROCHESTER, N.Y., April 4, 2019 – Alaris, a Kodak Alaris business, has unveiled its next generation of information capture solutions designed to easily and affordably digitize paper, automate business processes, and boost productivity at home and in the office. The Alaris E1035 Scanner is the latest addition to the award-winning IN2 Ecosystem, a powerful combination of best-in-class document scanners, imaging software and services delivered by Alaris’ global network of partners.

article thumbnail

New, Improved BEC Campaigns Target HR and Finance

Dark Reading

Spearphishing campaigns from new and established business email compromise (BEC) gangs are stealing from companies using multiple tactics.

63