Fri.Nov 30, 2018

article thumbnail

Marriott's Starwood Reservation Hack Could Affect 500 Million

Data Breach Today

Database Intrusion Dates Back to 2014 The Marriott hotel chain has announced its Starwood guest reservation database has been hacked, potentially exposing up to 500 million accounts. The unauthorized access to the database started in 2014, the company says.

Access 234
article thumbnail

When It Comes to PII, Santa’s Got Nothing Over Amazon

Weissman's World

Amazon this week announced new software that, as described by The Wall Street Journal, “can read patient records and other clinical notes, analyze them, and pluck out key data points.” Which means that not only do they know what you’re buying (Prime), and what you’re eating (Whole Foods), but now also what meds you’re taking. […]. The post When It Comes to PII, Santa’s Got Nothing Over Amazon appeared first on Holly Group.

IT 149
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dell, Dunkin Donuts Reset Passwords After Incidents

Data Breach Today

The Impacts of Both Incidents Appear to Be Limited Dell and Dunkin Donuts have both initiated password resets after experiencing separate security incidents aimed at gaining access to customer accounts. The impacts of the attacks, however, appear to be limited.

Passwords 221
article thumbnail

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

The Last Watchdog

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. But smart homes, smart workplaces and smart shopping malls are just the warm-up act. Get ready for smart ground transportation. Related: Michigan’s Cyber Range hubs help narrow talent gap. Driverless autos, trucks and military transport vehicles are on a fast track for wide deployment in the next five years.

IoT 103
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Another Healthcare Website Security Issue Revealed

Data Breach Today

Tandigm Health Reports Vulnerability in Physician Portal In yet another sign that website security issues are far too common in the healthcare sector, Tandigm Health says a vulnerability on a physician portal potentially exposed patient data.

Security 208

More Trending

article thumbnail

The Profile of Modern-Day DDoS

Data Breach Today

Netscout Arbor's Tom Bienkowski on the Risks to Healthcare Organizations DDoS attacks against healthcare organizations have increased not only in size and scale, but especially in complexity, says Tom Bienkowski of Netscout Arbor. How can enterprises build upon their traditional DDoS defenses?

Risk 200
article thumbnail

Holiday Hacks: 6 Cyberthreats to Watch Right Now

Dark Reading

'Tis the season for holiday crafted phishes, scams, and a range of cyberattacks. Experts list the hottest holiday hacks for 2018.

Phishing 108
article thumbnail

Healthcare's Insider Threat

Data Breach Today

Veriato's Pete Nourse on Why This Is the Sector's Achilles Heel Organizations in all sectors struggle with mitigating the insider threat, but it's an acute concern in healthcare, where patients' lives are at stake. Pete Nourse of Veriato outlines specific threats to this sector.

IT 195
article thumbnail

Three-Rotor Enigma Machine Up for Auction Today

Schneier on Security

Sotheby's is auctioning off a (working, I think) three-rotor Enigma machine today. They're expecting it to sell for about $200K. I have an Enigma, but it's missing the rotors.

IT 84
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

ISO 27001: Gap analysis vs. risk assessment

IT Governance

Gap analyses and risk assessments are two of the most important processes organisations must complete when implementing ISO 27001 or reviewing their compliance status. There are a lot of similarities between the two, which often causes organisations to confuse them and use elements of one process in the other. This leads to unnecessary work and expenditure, and in some instances can result in the organisation failing to meet ISO 27001’s requirements.

Risk 83
article thumbnail

That Bloomberg Supply-Chain-Hack Story

Schneier on Security

Back in October, Bloomberg reported that China has managed to install backdoors into server equipment that ended up in networks belonging to -- among others -- Apple and Amazon. Pretty much everybody has denied it (including the US DHS and the UK NCSC ). Bloomberg has stood by its story -- and is still standing by it. I don't think it's real. Yes, it's plausible.

IT 81
article thumbnail

Marriott Starwood hack affects 500 million customers

IT Governance

Hotel giant Marriott has confirmed that its Starwood Hotels & Resorts guest reservation database has been hacked by an unauthorised party. Affecting 500 million people, the vast hack has exposed a considerable amount of data including: Names. Phone numbers. Passport numbers. Encrypted payment card numbers. Payment card expiration dates. There are two components needed to decrypt the payment card numbers, but at this point, Marriott has not been able to rule out the possibility that both were

article thumbnail

OSSEC For Website Security: PART II – Distributed Architectures Using Agents and Managers

PerezBox

This article assumes you already have OSSEC deployed. If you need a refresher, refer to the Part I of OSSEC for website security, written March 2013. OSSEC is popular open-source. Read More. The post OSSEC For Website Security: PART II – Distributed Architectures Using Agents and Managers appeared first on PerezBox.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Retailers Make Big Strides In Offering Clear Unsubscribe Links

Dark Reading

Fifth annual Online Trust Alliance survey said retailers get good marks for offering clear unsubscribe links, using tools like SPF and DKIM and honoring unsubscribe requests.

Retail 72
article thumbnail

7 reasons why artificial intelligence needs people

Information Management Resources

Despite the strong and inherently negative narrative around the impact on jobs, the bulk of the impact from the automation of work through AI will result in a 'displacement' of work not a 'replacement' of work.

article thumbnail

The Marriott Hack: How to Protect Yourself

WIRED Threat Level

Up to 500 people's personal information has been stolen in a Marriott hack that lasted four years, one of the biggest breaches yet.

article thumbnail

Bing Warns VLC Media Player Site is ‘Suspicious’ in Likely False-Positive Gaff

Threatpost

After identifying the official VLC media download page as "unsafe" with its Bing search engine, Microsoft now suggests it was done in error.

IT 78
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Threat Hunting: Improving Bot Detection in Enterprise SD-WANs

Dark Reading

How security researchers tracked down Kuai and Bujoi malware through multiple vectors including client type, traffic frequency, and destination.

article thumbnail

Click Here to Kill Everybody News

Schneier on Security

My latest book is doing well. And I've been giving lots of talks and interviews about it. (I can recommend three interviews: the Cyberlaw podcast with Stewart Baker, the Lawfare podcast with Ben Wittes, and Le Show with Henry Shearer.) My book talk at Google is also available. The Audible version was delayed for reasons that were never adequately explained to me, but it's finally out.

IT 67
article thumbnail

Marriott Breach: More than 500 Million Guest Affected

Adam Levin

Marriot announced an enormous breach of the company’s reservations database that may have potentially exposed the personally identifiable information of more than 500 million guests. If you’ve made reservations at the St. Regis, Westin, Sheraton, W Hotels or anywhere else that operates on Marriot’s Starwood guest reservation database, it’s time to redouble your cybersecurity and privacy efforts, because this compromise is one of biggest we’ve seen—dwarfed only by the Yahoo breach that affected

article thumbnail

Massive Starwood Hotels Breach Hits 500 Million Guests

Dark Reading

Among the unknowns: who is behind the breach and how many of the affected records have been sold or used by criminals.

81
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Humans of OpenText: Jesus Cuesta

OpenText Information Management

Meet Jesus, OpenText™ colleague from Madrid, Spain. He’s one of the top Brazilian Jiu-Jitsu fighters in all of Europe! In this post, he talks about where his love of Jiu-Jitsu came from, and all of the meaningful life lessons he’s learned from it along the way. How did you first get into martial arts? Like … The post Humans of OpenText: Jesus Cuesta appeared first on OpenText Blogs.

IT 60
article thumbnail

The Risks of Skipping Data Backup: No Fallback for Disaster

Record Nations

The amount of data collected and analyzed each day is constantly growing and will continue to grow as we move into the future. Because data about customers, business partnerships, patients, transactions, and much more holds immense value, the need to protect that data is becoming stronger. Learn about the risks of not backing up your […]. The post The Risks of Skipping Data Backup: No Fallback for Disaster appeared first on Record Nations.

Risk 70
article thumbnail

39 Arrested in Tech Support Scam Crackdown: Microsoft

Dark Reading

Law enforcement officials in India raided 16 call center locations that conned primarily American and Canadian victims.

72
article thumbnail

Can SharePoint be scaled to be used as an SAP Document Management Platform?

Gimmal

Even though Microsoft’s SharePoint have been recognized as a leader in Gartner’s Magic Quadrant for Content Services platforms for multiple years in a row, when it comes to using SharePoint as an enterprise content management (ECM) platform, many users coming from world of traditional legacy ECM hold the opinion that SharePoint is just great for collaboration and not a great platform to manage content and the information essential to business operations.

ECM 55
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

FTC’s Upcoming Hearing Will Address U.S. Approach to Data Security

Hunton Privacy

The Federal Trade Commission published the agenda for the ninth session of its Hearings on Competition and Consumer Protection in the 21st Century (“Hearings Initiative”), a wide-ranging series of public hearings. The ninth session, to take place on December 11-12, 2018, will focus on data security. Lisa Sotto , chair of Hunton Andrews Kurth’s Privacy and Cybersecurity practice, is one of five panel participants discussing “The U.S.

article thumbnail

Db2 for z/OS Global Variables: What is a "Session"?

Robert's Db2

Has this ever happened to you? You're looking at the Db2 for z/OS SQL Reference (or in the Db2 for z/OS Knowledge Center on the Web), and you see something like this (and the quote below is from the description of the CREATE VARIABLE statement in the SQL Reference , with highlighting added by me): Global variables have a session scope. Although they are available for use to all sessions that are active at the current server, the value of the global variable is private for each session.

Access 48
article thumbnail

Marriott hotels: data of 500m guests may have been exposed

The Guardian Data Protection

Company says information may have been taken from breached reservation database Marriott has announced that the data of 500 million guests may have been exposed in breaches of a reservation database for its hotels, which include luxury London institutions. The company said reservations at its Starwood properties, which include the Park Lane Sheraton Grand, Westbury Mayfair and Le Méridien Piccadilly, had been affected by the “data security incident”.