Wed.Dec 19, 2018

article thumbnail

Hackers Intercepted EU Diplomatic Cables for 3 Years

Data Breach Today

Phishing Attack Against Cyprus Stole Access Passwords, New York Times Reports For the past three years, hackers have been intercepting sensitive diplomatic cables sent between EU member states after stealing passwords for accessing the EU network via a phishing attack against diplomats in Cyprus, The New York Times reports.

Phishing 242
article thumbnail

Microsoft Issues Emergency Fix for IE Zero Day

Krebs on Security

Microsoft today released an emergency software patch to plug a critical security hole in its Internet Explorer (IE) Web browser that attackers are already using to break into Windows computers. The software giant said it learned about the weakness ( CVE-2018-8653 ) after receiving a report from Google about a new vulnerability being used in targeted attacks.

Risk 198
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR: EU Sees More Data Breach Reports, Privacy Complaints

Data Breach Today

Ireland, France, Germany and UK Report Increases Since Privacy Law Took Effect The number of data breach reports filed since the EU General Data Protection Regulation went into effect has hit nearly 3,500 in Ireland, over 4,600 in Germany, 6,000 in France and 8,000 in the U.K. Regulators say more Europeans are also filing more complaints about organizations' data protection and privacy practices.

article thumbnail

Bridging the Gap Between Security Awareness and Action

AIIM

The amount of data stored on electronic systems today is exploding and growing at an exponential rate. Data breaches, privacy concerns, and growing e-discovery costs continue to evolve how organizations approach controlling their business data while balancing worker productivity. Aged or poor data hygiene can further increase organizational inefficiencies, in aggregate costing billions annually. 35% of organizations believe the volume of information and data coming into their organizations will

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Email-Related Breaches: Why Are There So Many?

Data Breach Today

How Addressing Common Mistakes, Security Gaps Can Help Prevent These Incidents Several recent health data breaches point to the need to better mitigate the risks posed by email. Why do these incidents keep happening, and what can be done to help prevent them?

More Trending

article thumbnail

Data Leak Exposes Psychologists' Home Addresses

Data Breach Today

Leak Has Been Reported to Australia's Data Regulator A large health insurer in Western Australia shared the home addresses of some psychologists to a web-based appointment booking service, according to a news report. The health insurer belated realized after a complaint from one practitioner that some psychologists work from home.

Insurance 164
article thumbnail

Facebook users cannot avoid location-based ads, investigation finds

The Guardian Data Protection

No combination of settings can stop location data being used by advertisers, says report Facebook targets users with location-based adverts even if they block the company from accessing GPS on their phones, turn off location history in the app, hide their work location on their profile and never use the company’s “check in” feature, according to an investigation published this week.

Privacy 95
article thumbnail

AI for Insight: Three things we learned at the Forrester Data Strategy and Insights Forum

OpenText Information Management

We live in an age of unequaled access to data. By some estimates, the average company has between 150 and 400 terabytes of information stored. A large enterprise may have multiple petabytes, i.e. as much data as all the printed books in the world. The problem, though, is that many companies haven’t figured out how … The post AI for Insight: Three things we learned at the Forrester Data Strategy and Insights Forum appeared first on OpenText Blogs.

Access 90
article thumbnail

Russia-linked Sofacy APT developed a new ‘Go’ variant of Zebrocy tool

Security Affairs

Researchers at Palo Alto Networks discovered that the Russian-linked Sofacy APT has written a new version of their Zebrocy backdoor using the Go programming language. The Sofacy APT group has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. The group was involved also in the string of attacks that targeted 2016 Presidential election.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Privacy Futures: Fed-up Consumers Take Their Data Back

Dark Reading

In 2019, usable security will become the new buzzword and signal a rejection of the argument that there must be a trade-off between convenience and security and privacy.

Privacy 88
article thumbnail

Congressional Report on the 2017 Equifax Data Breach

Schneier on Security

The US House of Representatives Committee on Oversight and Government Reform has just released a comprehensive report on the 2017 Equifax hack. It's a great piece of writing, with a detailed timeline, root cause analysis, and lessons learned. Lance Spitzner also commented on this. Here is my testimony before before the House Subcommittee on Digital Commerce and Consumer Protection last November.

article thumbnail

Facebook shared private user messages with Netflix and Spotify

The Guardian Data Protection

Firm bent its own data rules for major clients such as Amazon, Microsoft and Sony, report says Facebook gave Netflix and Spotify the ability to read and even delete users’ private messages, a new investigation has revealed. The social media giant granted major companies far more exceptions to its privacy policies than previously known, making user data available through loopholes to companies including Amazon, Microsoft and Sony.

Privacy 76
article thumbnail

Cybersecurity in 2019: From IoT & Struts to Gray Hats & Honeypots

Dark Reading

While you prepare your defenses against the next big thing, also pay attention to the longstanding threats that the industry still hasn't put to rest.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Facebook Fights Back on Secret Data-Sharing Partnerships

Threatpost

Facebook is under fire again after a bombshell report claims it has broad data-sharing arrangements with Amazon, Apple, Netflix and others.

IT 60
article thumbnail

Facebook Data Deals Extend to Microsoft, Amazon, Netflix

Dark Reading

An explosive new report sheds light on data-sharing deals that benefited 150 companies as Facebook handed over unknowing users' information.

81
article thumbnail

5 top trends that will drive business intelligence in 2019

Information Management Resources

As I continually probe the industry, I see who is driving innovation and what those innovative advancements look like. As a result, I feel five key trends will emerge in the analytics space in 2019.

article thumbnail

How to Remotely Brick a Server

Dark Reading

Researchers demonstrate the process of remotely bricking a server, which carries serious and irreversible consequences for businesses.

80
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Best practices to prepare for new data U.S. protection regulations

Information Management Resources

Organizations must not only understand how they should be compliant, but also their customers’ concerns about data privacy and what they are looking for in a data privacy agreement.

article thumbnail

NASA Investigating Breach That Exposed PII on Employees, Ex-Workers

Dark Reading

Incident is latest manifestation of continuing security challenges at agency, where over 3,000 security incidents have been reported in recent years.

article thumbnail

10 steps to success as a data-driven organization

Information Management Resources

Here are 10 strategies to make any company a more successful data-driven decision-based organization.

71
article thumbnail

US Names, Sanctions Russian GRU Officials for 2016 Election Hacks

Dark Reading

Treasury Department names and imposes economic sanctions on the alleged major players behind the Russian election-meddling operation, as well as the World Anti-Doping Agency breach.

55
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Police trawls of rape victims’ private data to be investigated

The Guardian Data Protection

UK watchdog inquiry into possible routine breaching of privacy and data regulations Examination techniques deployed by police and lawyers to trawl through rape victims’ mobile phones and private data in search of evidence are to be investigated by a watchdog. The Information Commissioner’s Office (ICO) has announced an inquiry into whether privacy or data protection regulations are being routinely breached in the criminal justice system.

Privacy 46
article thumbnail

Attack Campaign Targets Financial Firms Via Old But Reliable Tricks

Dark Reading

Among other tried-and-true cyberattack methods, the attackers hosted malware on the Google Cloud Storage service domain storage.googleapis.com to mask their activity.

Cloud 57
article thumbnail

A Devious Phishing Scam Targets Apple App Store Customers

WIRED Threat Level

Be on the lookout for emails that claim to be from the App Store.

article thumbnail

The possibilities of focusing on student outcomes with 1-to-1 iPad programs in higher education

Jamf

See how iPad programs can help universities improve student engagement, student wellness and career readiness.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hackers Succeed in NASA Mission, Lifting Thousands of Employee Records

Threatpost

Twelve years' worth of data has blasted off into the Dark Web.

article thumbnail

Its the most wonderful time of the year – Patching

Roger's Information Security

does that say patching plaster or patch faster? Remember back when Summer and Christmas break was a high time of concern. The kids were out of college and ready to try out their skills. Christmas was worse because so many people were out of the office, no one would notice. Or if they did the response would be limited. Now that’s what we call Tuesday afternoon.

IT 45
article thumbnail

Facebook’s Rough History of Failed User Revolts

Threatpost

What will ultimately be the driving force for Facebook to value data privacy?