Thu.Oct 25, 2018

article thumbnail

Facebook Slammed With Maximum UK Privacy Fine

Data Breach Today

Failings Leading to Cambridge Analytica Scandal Earn Sharp Rebuke From Regulator Facebook has been slammed with the maximum possible fine under U.K. law for "a very serious data incident" that exposed an estimated 87 million Facebook users' personal details to political campaign influence firm Cambridge Analytica.

Privacy 232
article thumbnail

Experts released a free Decryption Tool for GandCrab ransomware

Security Affairs

Good news for the victims of the infamous GandCrab ransomware, security experts have created a decryption tool that allows them to decrypts files without paying the ransom. Bitdefender security firm along with Europol, the FBI, Romanian Police, and other law enforcement agencies has developed a free ransomware decryption tool. “The good news is that now you can have your data back without paying a cent to the cyber-criminals, as Bitdefender has released a free utility that automates the da

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cathay Pacific Says 9.4 Million Affected by Data Breach

Data Breach Today

Airline's Five-Month Delay Before Public Disclosure Raises Concern Hong Kong-based airline Cathay Pacific says the personal details of 9.4 million passengers were inappropriately accessed in March, a breach the company confirmed in early May but publicly revealed on Wednesday. That raises questions about whether the airline violated data breach disclosure regulations.

article thumbnail

I Bought Used Voting Machines on eBay for $100 Apiece. What I Found Was Alarming

WIRED Threat Level

Opinion: The fact that voter information is left on devices, unencrypted, that are then sold on the open market is malpractice.

Marketing 112
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Medicaid Data Breach Trends: An Analysis

Data Breach Today

One Big Hacker Incident Responsible for Most Victims Impacted in 2016 Medicaid agencies and their contractors reported more than 1,200 data breaches in 2016, but just one hacking incident accounted for more than 70 percent of all victims, according to a new report. What else does the report reveal?

More Trending

article thumbnail

Effective change management for your digital evolution – Part 1

TAB OnRecord

A digital evolution is only as effective as the people behind it. This makes effective change management a key factor in any successful digital transformation. In this three-part post we will present six change management tips to help you meet challenges that may arise during your digital evolution. Tip #1 – Know the culture No [.] Read More. The post Effective change management for your digital evolution – Part 1 appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Cathay Pacific data breach affecting 9.4 million passengers

Security Affairs

Cathay Pacific Airways Limited, the flag carrier of Hong Kong, had suffered a major data leak affecting up to 9.4 million passengers. Cathay Pacific Airways Limited, the flag carrier of Hong Kong, admitted having suffered a major data leak affecting up to 9.4 million passengers. Exposed data includes passport numbers, identity card numbers, email addresses, and credit card details were accessed, information exposed varies for each affected passenger. “As part of our ongoing IT security pro

article thumbnail

Android Ad-Fraud Scheme

Schneier on Security

BuzzFeed is reporting on a scheme where fraudsters buy legitimate Android apps, track users' behavior in order to mimic it in a way that evades bot detectors, and then uses bots to perpetuate an ad-fraud scheme. After being provided with a list of the apps and websites connected to the scheme, Google investigated and found that dozens of the apps used its mobile advertising network.

IT 83
article thumbnail

UK ICO fines Facebook with maximum for Cambridge Analytica scandal

Security Affairs

Facebook has been fined £500,000 by the UK’s Information Commissioner’s Office ( ICO ) for the Cambridge Analytica privacy scandal that exposed data of 87 million users. The announcement was made by the UK’s data protection regulator, Information Commissioner Elizabeth Denham. “The ICO’s investigation found that between 2007 and 2014, Facebook processed the personal information of users unfairly by allowing application developers access to their information without

GDPR 85
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Feds Just Hit Notorious Swatter Tyler Barriss With 46 New Charges. He Intends to Plead Guilty

WIRED Threat Level

Prosecutors in California have filed 46 new counts against Tyler Barriss for bomb threats, fraud, and swatting incidents nationwide. He’s angling to get the case transferred to Kansas and intends to plead guilty.

article thumbnail

Experts discovered a severe command injection flaw in Cisco Webex Meetings Desktop

Security Affairs

Researchers discovered a “high” severity command injection vulnerability, tracked as CVE-2018-15442, in Cisco Webex Meetings Desktop. It’s time to patch again the Cisco Webex video conferencing software of your organization to avoid ugly surprise. Researchers Ron Bowes and Jeff McJunkin of Counter Hack discovered a “high” severity command injection vulnerability, tracked as CVE-2018-15442 , in Cisco Webex Meetings Desktop.

article thumbnail

SEC Cautions Public Companies to Address Cyber Threats as Part of Internal Accounting Controls

Data Matters

On October 16, 2018, the U.S. Securities and Exchange Commission (SEC) took the unusual step of issuing a Report of Investigation cautioning public companies that they should consider cyber threats and related human vulnerabilities when designing and implementing their internal accounting controls. The report is an outgrowth of an investigation conducted by the SEC’s Enforcement Division into whether certain public companies that were victims of cyber fraud complied with the federal securities

article thumbnail

Google requires 2 years of Android security updates for popular devices

Security Affairs

The media outlet The Verge obtained a copy of a contract between Google and OEMs that obliges them to two years of security updates for popular phones. Google continues the battle for securing devices of its users, this time making mandatory for device makers two years of Android security updates. One of the main problems with patch management is related to the distribution of security patches issued by Google for Android OS.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Securing Severless: Defend or Attack?

Dark Reading

The best way to protect your cloud infrastructure is to pay attention to the fundamentals of application security, identity access management roles, and follow configuration best-practices.

article thumbnail

Until next time, Jamf Nation

Jamf

Goodbye is never easy, but we hope you’ve added a few new workflows, tools and friends to your repertoire. From the bottom of our hearts, safe travels home and thank you for going on this wonderful adventure with us!

75
article thumbnail

Retail Fraud Spikes Ahead of the Holidays

Dark Reading

Researchers note massive increases in retail goods for sale on the black market, retail phishing sites, and malicious applications and social media profiles.

Retail 81
article thumbnail

Everything you need to know about Jamf Connect

Jamf

The creator of NoMAD, Joel Rennich, explained how Jamf Connect (formerly NoMAD Pro, NoMAD Login+ and NoMAD PKINIT) allows for simple provisioning of users from a cloud identity service during an Apple provisioning workflow.

Cloud 75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Digital Transformation Puts Tremendous Pressure on IT Security; A CISO Perspective

Data Breach Today

article thumbnail

A great enrollment experience, using Jamf and open source software

Jamf

IBM has open-sourced its provisioning process to assist the Mac community in delivering the same new-hire experience as it does with its Mac@IBM program. Get the details.

IT 76
article thumbnail

Side-Channel Attack Exposes User Accounts on Facebook, XBox, Other Social Sites

Dark Reading

Researcher will demonstrate at Black Hat Europe his team's recent discovery: a way to exploit popular user-blocking feature on social media and other sites.

79
article thumbnail

Data Protection Authorities Endorse Guidelines on AI – Fairness, Transparency and Privacy Key Principles

Hunton Privacy

On October 23, 2018, the 40th International Conference of Data Protection and Privacy Commissioners (the “Conference”) released a Declaration on Ethics and Protection in Artificial Intelligence (“the Declaration”). In it, the Conference endorsed several guiding principles as “core values” to protect human rights as the development of artificial intelligence (“AI”) continues apace.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

County Election Websites Can Be Easily Spoofed to Spread Misinformation

Dark Reading

Majority of county sites in 20 key swing states have non-.gov domains and don't enforce use of SSL, McAfee researchers found.

86
article thumbnail

How to migrate to modern Mac management

Jamf

Brian Martin of Lafayette School Corporation shared his school district’s story of digging out of old management methods and migrating to modern ones.

75
article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

Critical infrastructure is so basic to how we live our daily lives that we don’t even think about it. Yet safeguarding it is essential to our national well-being. Critical infrastructure, as defined by Department of Homeland Security : describes the physical and cyber systems and assets that are so vital to the United States that their incapacity or destruction would have a debilitating impact on our physical or economic security or public health or safety.

article thumbnail

Securing Serverless: Attacking an AWS Account via a Lambda Function

Dark Reading

It's not every day that someone lets you freely wreak havoc on their account just to find out what happens when you do.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Tips from NASA on how to manage Smart Cards with Jamf Pro

Jamf

Allen Golbig of NASA explains what he’s learned about Smart Card support built into macOS, and how to manage Smart Cards using Jamf Pro.

75
article thumbnail

UK Slaps Facebook with $645K Fine Over Cambridge Analytica Scandal

Threatpost

The amount is the max allowed under pre-GDPR regulation, but is barely a financial slap on the risk for the social-media giant.

GDPR 76
article thumbnail

How the Google Cloud Secure LDAP and Jamf integration works

Jamf

What is Google Cloud Identity? What is Google Cloud Secure LDAP? How does the Google and Jamf integration work? Read this for answers.

Cloud 74