Wed.Nov 21, 2018

article thumbnail

USPS Site Exposed Data on 60 Million Users

Krebs on Security

U.S. Postal Service just fixed a security weakness that allowed anyone who has an account at usps.com to view account details for some 60 million other users, and in some cases to modify account details on their behalf. Image: USPS.com. KrebsOnSecurity was contacted last week by a researcher who discovered the problem, but who asked to remain anonymous.

article thumbnail

Did China Spy on Australian Defense Websites?

Data Breach Today

One Answer Is Clear: Network Re-Routing Raises Suspicions For nearly 30 months, internet traffic going to Australian Department of Defense websites flowed through China Telecom data centers, an odd and suspicious path. Why the strange routing occurred is known. But the reasons why it persisted for so long aren't.

IT 255
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: California pioneers privacy law at state level; VA, VT, CO, NJ take steps to follow

The Last Watchdog

Privacy regulations and legislation are topics that continue to be of concern for consumers and businesses alike. News of data breaches, data vulnerabilities and compromised private information is released almost daily from businesses both small and large. Related: Europe’s GDPR ushers in new privacy era. Legislation has recently been proposed for individual states, addressing data privacy regulations head-on.

Privacy 103
article thumbnail

Lessons Learned From 2018's Top Attacks

Data Breach Today

Cisco's Paul Singleton on Why It's Important to Know Your Adversary How have cyberattacks evolved in 2018? Cisco's Paul Singleton describes the common threats and vectors, as well as why it's important to know exactly who your attacker is - and how they are exploiting your defenses.

IT 212
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

A Brief History of Artificial Intelligence

AIIM

Artificial Intelligence (AI) is obviously all the rage. Consider the search traffic on “Artificial Intelligence” since early 2016. As a result, just about every technology product in the world now seems to have the artificial intelligence “label” attached to it. Which is ironic, because AI has actually been with us for decades, not months. People have been thinking about the relationship between people and machines going all the way back to ancient times, and process automation goes back to the

More Trending

article thumbnail

Information Attacks against Democracies

Schneier on Security

Democracy is an information system. That's the starting place of our new paper: " Common-Knowledge Attacks on Democracy." In it, we look at democracy through the lens of information security, trying to understand the current waves of Internet disinformation attacks. Specifically, we wanted to explain why the same disinformation campaigns that act as a stabilizing influence in Russia are destabilizing in the United States.

article thumbnail

How Machine Learning Transforms Fraud Management

Data Breach Today

First Data's Jaclyn Blumenfeld on Practical Use Cases for Emerging Technologies Artificial intelligence and machine learning get all the marketing buzz, but First Data's Jaclyn Blumenfeld cites examples of use cases where these emerging technologies are actually transforming security and fraud management.

article thumbnail

A Brief History of Artificial Intelligence

AIIM

Artificial Intelligence (AI) is obviously all the rage. Consider the search traffic on “Artificial Intelligence” since early 2016. As a result, just about every technology product in the world now seems to have the artificial intelligence “label” attached to it. Which is ironic, because AI has actually been with us for decades, not months. People have been thinking about the relationship between people and machines going all the way back to ancient times, and process automation goes back to the

article thumbnail

Medical Devices: The Long Road to Security

Data Breach Today

Fortinet's Sonia Arista Brings CISO's Perspective to Security Solutions As a former healthcare CISO, Fortinet's Sonia Arista has a unique perspective on how cybersecurity vendors can best assist in the ongoing challenge of securing critical medical devices.

Security 159
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK ICO Issues Warning to Washington Post Over Cookie Consent Practices

Hunton Privacy

On November 19, 2018, The Register reported that the UK Information Commissioner’s Office (“ICO”) issued a warning to the U.S.-based The Washington Post over its approach to obtaining consent for cookies to access the service. The Washington Post presents readers with three options to access its service: (1) free access to a limited number of articles dependent on consent to the use of cookies and tracking for the delivery of personalized ads; (2) a basic subscription consisting of paid access t

GDPR 92
article thumbnail

The SOC Essentials for 2019

Data Breach Today

Trustwave's Kory Daniels Outlines the Must-Have Skills, Capabilities What are the key differences between building a SOC for a large enterprise vs. for a small to midsized organization? Trustwave's Kory Daniels explains the distinction and outlines the must-have skills.

159
159
article thumbnail

Rowhammer Data Hacks Are More Dangerous Than Anyone Feared

WIRED Threat Level

Researchers have discovered that the so-called Rowhammer technique works on "error-correcting code" memory, in what amounts to a serious escalation.

article thumbnail

Protecting 'Very Attacked Persons'

Data Breach Today

Ryan Witt of Proofpoint on How to Protect Highly Targeted Individuals From Cybercrime Cybercriminals target certain individuals as a means of infiltrating systems. Ryan Witt of Proofpoint discusses how to identify and protect those most likely to be targets.

153
153
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Experts found first Mirai bot targeting Linux servers via Hadoop YARN flaw

Security Affairs

Security experts from Netscout Asert discovered more than ten Mirai bot variants attempting to exploit a recently disclosed flaw in Hadoop YARN on Intel servers. These Mirai variants are the first one that doesn’t target Internet of Things devices, the bot was specifically developed to target Linux servers. The Hadoop YARN is vulnerability is a command injection flaw that could be exploited by attackers to remotely execute arbitrary shell commands on a vulnerable server.

article thumbnail

To Stockpile or Not to Stockpile Zero-Days?

Dark Reading

As the debate rages on, there is still no simple answer to the question of whether the government should stockpile or publicly disclose zero-day vulnerabilities.

article thumbnail

Experts found flaws in Dell EMC and VMware Products. Patch them now!

Security Affairs

Security experts have found several vulnerabilities affecting Dell EMC Avamar and Integrated Data Protection Appliance products. They also warn that VMware’s vSphere Data Protection, which is based on Avamar, is also affected by the issues. Dell EMC released security updates for Dell EMC Avamar Client Manager in Dell EMC Avamar Server and Dell EMC Integrated Data Protection Appliance (IDPA) to address a critical remote code execution issue and a medium open redirection flaw.

article thumbnail

CIPL Publishes Report on Artificial Intelligence and Data Protection in Tension

Hunton Privacy

The Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP recently published the first report in its project on Artificial Intelligence (“AI”) and Data Protection: Delivering Sustainable AI Accountability in Practice. The report , entitled “Artificial Intelligence and Data Protection in Tension,” aims to describe in clear, understandable terms: what AI is and how it is being used all around us today; the role that personal data plays in the development, deployment and ove

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Facebook increases rewards for its bug bounty program and facilitate bug submission

Security Affairs

Facebook updates its bug bounty program, it is increasing the overall rewards for security flaws that could be exploited to take over accounts. Facebook announced an important novelty for its bug bounty, the social media giant is going to pay out as much as $40,000 for vulnerabilities that can be exploited to hack into accounts without user interaction.

IT 86
article thumbnail

The Security Token Story: SEC Reveals Act III — Registered Digital Assets — and Reminds Market Actors of Acts I (Investment Vehicles) & II (Secondary Trading)

Data Matters

On November 16, the U.S. Securities and Exchange Commission (SEC) announced its first enforcement actions against issuers of initial coin offerings solely for failing to register the offerings in violation of the federal securities laws since Munchee (i.e., without allegations of fraud). Unlike the Munchee order, these settlements impose penalties against the issuers and require certain undertakings, such as registering the digital assets as securities under the Exchange Act.

article thumbnail

A flaw in US Postal Service website exposed data on 60 Million Users

Security Affairs

US Postal Service has patched a critical bug that allowed anyone who has an account at usps.com to view and modify account details for other users. US Postal Service has patched a critical bug that allowed anyone who has an account at usps.com to view and modify account details for other users, some 60 million users were affected. The news was first reported by the popular investigator Brian Krebs who was contacted by a researcher who discovered the issue.

article thumbnail

Amazon’s data breach email looks like a phishing scam

IT Governance

It appears that Amazon had a bit of a problem – and it very nearly went unnoticed. An unknown number of Amazon customers reported yesterday and today that they had received an email from the online retail giant (see below). Can you see the problem? To many, the email looks to be a phishing scam of some sort. For one thing, there is no personalisation (you’d expect a company like Amazon to address its customers by name) or Amazon logo, and the odd URL at the bottom – which is missing the ‘s’ from

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Amazon UK is notifying a data breach to its customers days before Black Friday

Security Affairs

Many readers of the Register shared with the media outlet an email sent from the Amazon UK branch that is notifying them an accidental data leak. The news is disconcerting, Amazon has suffered a data breach a few days before Black Friday. Many readers of the Register shared with the media outlet an email sent from the Amazon UK branch that is notifying them an accidental data leak.

article thumbnail

Mirai Evolves From IoT Devices to Linux Servers

Dark Reading

Netscout says it has observed at least one dozen Mirai variants attempting to exploit a recently disclosed flaw in Hadoop YARN on Intel servers.

IoT 84
article thumbnail

Amazon hit with major data breach days before Black Friday

The Guardian Data Protection

Customers’ names and email addresses posted on website, tech giant confirms Amazon has suffered a major data breach that caused customer names and email addresses to be disclosed on its website, just two days ahead of Black Friday. The e-commerce giant said it has emailed affected customers but refused to give any more details on how many people were affected or where they are based.

article thumbnail

Preparing for the cyber threats of tomorrow

IT Governance

Earlier this year, ENISA (the European Union Agency for Network and Information Security) claimed that technology is increasingly vulnerable to attacks. The figures definitely support this claim. There were 6,000 new vulnerabilities identified in 2016, 14,500 in 2017 and so far almost 15,000 in 2018. It gets worse: ENISA says that the rise in security flaws is inherent to the cyber security landscape.

IoT 70
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why do user experience, intelligence and automation matter in the enterprise?

OpenText Information Management

The life of a marketer can be exciting and inspiring. From major product launches to creating new collateral to attending conferences around the world, marketing and creative professionals get to do a lot of incredible work. But it can also be a busy and hectic life. Most marketers are juggling multiple projects and deadlines, working … The post Why do user experience, intelligence and automation matter in the enterprise?

article thumbnail

£500,000 funding for Cyber Essentials certification now available to Scottish charities and SMEs

IT Governance

Charities and SMEs in Scotland can now apply for up to £1000 in funding to help them protect their businesses against cyber attacks through Cyber Essentials certification. The Scottish government has provided £500,000 in funding for the Cyber Essentials scheme through the Scottish Council for Voluntary Organisations. According to the Scottish government, cyber security is particularly important for the charity sector, with one in five UK charities having reported a cyber breach , but only a qua

article thumbnail

OpenText Media Management uses intelligence to improve the marketer’s life, one task at a time

OpenText Information Management

Marketers who use video grow revenue 49% faster than non-video users, according to Wordstream. But in today’s digital world, it’s not enough to simply use video – video must be easily searchable, discoverable, and embedded with video analytics to meet the needs of current day marketers. In this second post in a four-part series, I … The post OpenText Media Management uses intelligence to improve the marketer’s life, one task at a time appeared first on OpenText Blogs.