Fri.Apr 19, 2019

article thumbnail

Facebook Password, Email Contact Mishandling Worsens

Data Breach Today

Millions of Instagram Users Affected by Plain-Text Password Storage Two security issues disclosed by Facebook over the past month are worse than first thought, adding to a harrowing series of data-handling mishaps by the social network. Millions of Instagram users had their plain-text passwords stored, and 1.5 million people had their email contact lists uploaded without consent.

Passwords 249
article thumbnail

Marcus “MalwareTech” Hutchins Pleads Guilty to Writing, Selling Banking Malware

Krebs on Security

Marcus Hutchins, a 24-year-old blogger and malware researcher arrested in 2017 for allegedly authoring and selling malware designed to steal online banking credentials, has pleaded guilty to criminal charges of conspiracy and to making, selling or advertising illegal wiretapping devices. Marcus Hutchins, just after he was revealed as the security expert who stopped the WannaCry worm.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leak Exposes OilRig APT Group's Tools

Data Breach Today

Group, Apparently Backed By Iran, Was Broadening Its Targets, Analysts Say A set of malicious tools, along with a list of potential targets and victims, belonging to an APT group dubbed OilRig has leaked online, exposing some of the organization's methods and goals, analysts say.

IT 212
article thumbnail

Source code of tools used by OilRig APT leaked on Telegram

Security Affairs

Lab Dookhtegan hackers leaked details about operations carried out by Iran-linked OilRig group, including source code of 6 tools. A hacker group that goes online with the name Lab Dookhtegan have disclosed details about operations conducted by the Iran-linked cyber-espionage group tracked as OilRig , APT34 , and HelixKitten. OilRig is an Iran-linked APT group that has been around since at least 2014, it targeted mainly organizations in the financial, government, energy, telecoms and chemical

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Facebook Password, Email Contact Mishandling Deepens

Data Breach Today

Millions of Instagram Users Affected by Plain-Text Password Storage Two security issues disclosed by Facebook over the past month are worse than first thought, adding to a harrowing series of data-handling mishaps by the social network. Millions of Instagram users had their plain-text passwords stored, and 1.5 million people had their email contact lists uploaded without consent.

Passwords 207

More Trending

article thumbnail

The Dangers of Unsecured Medical Devices

Data Breach Today

Mitigating medical device cybersecurity risks can be a matter of life and death, warns federal adviser and security expert Anura Fernando, who says ensuring that medical device network connections are properly managed, monitored and secured is "much like keeping a weapon in a safe with the safety on.

article thumbnail

Ransomware attack knocks Weather Channel off the Air

Security Affairs

A ransomware attack knocked the Weather Channel off the air for at least 90 minutes Thursday morning, federal law enforcement are investigating the incident. A ranomware attack knocked the Weather Channel off the air for at least 90 minutes Thursday morning, federal law enforcement are investigating the incident. A cyber attack hit the Weather Channel and forced it off the air for at least 90 minutes.

article thumbnail

Not So 'Smart' - Child Tech Has Hackable Flaws

Data Breach Today

A warning that a smartwatch marketed to parents for tracking and communicating with their children could be coopted by hackers leads the latest edition of the ISMG Security Report. It also reviews how a DNS hijacking campaign is hitting organizations and how "dark patterns" trick users.

article thumbnail

Broadcom WiFi Driver bugs expose devices to hack

Security Affairs

Experts warn of security flaws in the Broadcom WiFi chipset drivers that could allow potential attackers to remotely execute arbitrary code and to trigger DoS. According to a DHS/CISA alert and a CERT/CC vulnerability note, Broadcom WiFi chipset drivers are affected by security vulnerabilities impacting multiple operating systems. The flaws could be exploited to remotely execute arbitrary code and to trigger a denial-of-service condition. “The CERT Coordination Center (CERT/CC) has release

IoT 94
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Third-Party Cyber-Risk by the Numbers

Dark Reading

Recent stats show that the state of third-party cyber-risk and vendor risk management remains largely immature at most organizations.

Risk 85
article thumbnail

Operator of Codeshop Cybercrime Marketplace Sentenced to 90 months in prison

Security Affairs

Djevair Ametovski was sentenced to 90 months in prison for operating an international cybercrime marketplace named Codeshop. Macedonian national Djevair Ametovski (32) was sentenced to 90 months in prison by US DoJ authorities for operating an international cybercrime marketplace named Codeshop. Codeshop.su was a website that specialized in selling stolen payment card data.

Access 83
article thumbnail

APT34 Toolset, Victim Data Leaked via Telegram

Dark Reading

For the last month, an unknown individual or group has been sharing data and hacking tools belonging to Iranian hacker group APT34.

76
article thumbnail

These 6 companies are hiring the most AI workers right now

DXC Technology

Artificial intelligence (AI) is not a future technology. It’s here, right now! That means organizations are eagerly trying to find AI workers who can help them launch initiatives that can leverage the power of smart machines and algorithms capable of learning and making decisions. From governments and global mega-corporations to SMBs, enterprises of all sizes […].

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Researchers Find Clues for Dramatically Reducing IDS Traffic Volume

Dark Reading

Research at military labs and Towson University shows that identifying malicious activity may require much less captured data than has been the case.

article thumbnail

Iranian Cyberespionage Tools Leaked Online

Schneier on Security

The source code of a set of Iranian cyberespionage tools was leaked online.

87
article thumbnail

Why the EU’s New AI Ethics Guidelines Require Trustworthy Data

Collibra

Last week, the European Union published a new set of AI Ethics Guidelines. These guidelines are very interesting – and what they have to say about the ethical relationship and balance between artificial intelligence (AI), data, and humanity is particularly thought-provoking. Here are a few things that stood out to me from the guidelines, including how it pertains to data management.

article thumbnail

Free Princeton Application Provides IoT Traffic Insight

Dark Reading

The application developed by a research group allows users to spot possible IoT security problems.

IoT 74
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft’s Latest Patch Hoses Some Antivirus Software

Threatpost

McAfee, Sophos and Avast are among the antivirus software suites impacted.

article thumbnail

UK Supreme Court Gives Morrisons Permission to Appeal Data Breach Class Action

Hunton Privacy

On October 22, 2018, the UK Court of Appeal upheld the High Court’s decision that VM Morrison Supermarkets PLC (“Morrisons”) was vicariously liable for a data breach caused by a disgruntled former employee, despite Morrisons being cleared of any wrongdoing ( VM Morrison Supermarkets PLC v Various Claimants ). The case is important, given its potential “floodgate” effect on data breach class action claims in the UK.

article thumbnail

Three-Fourths of Consumers Don’t Trust Facebook, Threatpost Poll Finds

Threatpost

On the heels of several Facebook data privacy snafus this week - and over the past year - users no longer trust the platform.

article thumbnail

De-Duplicating Software: An Introduction

The Texas Record

One of the most useful tools in managing electronic records is de-duplication software. Is it right for your government? In short, de-duplication software can be used to analyze electronic records to determine if there are duplicates in a drive or folder. There are countless versions of this class of software available online. Some will charge, while others are available as freeware.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Insecure Ride App Database Leaks Data of 300K Iranian Drivers

Threatpost

A researcher said that millions of records were leaking 300,000 Tap30 drivers' names, ID numbers and phone numbers.

Cloud 64
article thumbnail

Will Widened Class Actions Regime Boost Data Litigation in the Netherlands?

HL Chronicle of Data Protection

On 19 March 2019, the Dutch Senate approved legislation introducing collective damages actions in the Netherlands (the “Legislation”) which will broaden the regime even further. The Legislation introduces an option to claim monetary damages in a “US style” class action, including for violations of the GDPR. This Legislation together with the mechanisms already available under Dutch law put the Netherlands at the forefront of collective redress in Europe.

article thumbnail

Redaction: Definition, Process, and When to Use It

Record Nations

Sometimes called “document sanitizing,” redaction is the process of removing sensitive information from a document. To obscure information, the text or image is blacked out—oftentimes with a black marker when redacted by hand. Watch the video or read the transcript below to find out how you can securely manage redaction of your documents.

IT 40
article thumbnail

Getty Images Sued Yet Again For Trying To License Public Domain Images

IG Guru

Mon, Apr 1st 2019 9:42am — Mike Masnick Back in 2016, we wrote about two separate lawsuits involving claims that Getty Images was selling “licenses” to images it had no rights to sell licenses to. The first one was brought by photographer Carol Highsmith, who sued Getty after Getty had sent a demand letter to her over her own images, which […].

IT 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why We Need a 'Cleaner Internet'

Dark Reading

Introducing a 'Cleaner Internet'

69
article thumbnail

Time Traveling Drama

Archives Blogs

In celebration of the College’s bicentennial in 1821, we’re reprocessing several large collections in the archives. One of these is the Dramatic Activities Collection – material assembled by Tuffy McGoun, a professor of dramatics at the College. The collection documents the history of dramatic productions and activities on campus. It’s a long history – our first production ephemera dates from 1826!

article thumbnail

Data on Tap for all Your Data Woes

Reltio

Ramya Krishnan , Reltio Meeting an old friend is always a pleasure. A cozy coffee shop, peaceful mid-morning, and genuine casual talk. Though Janine didn’t seem all that relaxed, and when asked, she mentioned that at her workplace data processing seems to go on and on. “But didn’t your pharmaceutical company initiated digital transformation recently?