Fri.Jan 04, 2019

article thumbnail

Hackers Leak Hundreds of German Politicians' Personal Data

Data Breach Today

Chancellor Angela Merkel Among the Victims of Massive Hack Attack and Data Leak Hundreds of members of the German parliament, Chancellor Angela Merkel as well as numerous local celebrities have had their personal details and communications stolen and leaked online as part of what authorities are calling an attack on the country's democracy and institutions.

article thumbnail

The Servant Leader, Team Doctor, Technically-Comfortable Agile Project Manager

AIIM

“Ideas are a commodity. Execution of them is not”- Michael Dell. In our series, we have been looking at this digital age and how technology is changing the roles and functions of traditional project positions and causing them to evolve into the positions that they were always supposed to be. Our second article focused on the role of the project sponsor.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransom Moves: The Dark Overlord Keeps Pressuring Victims

Data Breach Today

Demanding Bitcoins, Blackmailing Hacker Group Turns to 9/11 Conspiracies The notorious hacker gang The Dark Overlord continues its blackmail efforts, turning its hand to 9/11 conspiracy theories to try to sell stolen insurance documents. The group's latest media blitz attempts to pressure victims that it has so far failed to extort.

Insurance 174
article thumbnail

Hackers leak data on hundreds of German Politicians, including Chancellor Merkel

Security Affairs

German politicians were impacted by a massive data leak that exposed their personal data online, German Chancellor Angela Merkel was affected too. Data belonging to hundreds of German politicians, including Chancellor Angela Merkel, were exposed online due to a massive leak that is the biggest data dump of its kind in the country. According to Bloomberg News, the exposed data includes email addresses, mobile phone numbers, invoices, copies of identity documents and personal chat transcripts.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Making the Case for Zero-Trust Security

Data Breach Today

In this edition of the ISMG Security Report, former federal CISO Gregory Touhill explains why a zero-trust security model is essential, and Ron Ross of NIST describes initiatives to protect critical infrastructure from IoT vulnerabilities.

IoT 159

More Trending

article thumbnail

Blockchain's Biggest Potential in Healthcare

Data Breach Today

Where is the greatest potential for the implementation of blockchain in healthcare? Attorney Steven Teppler discusses the possibilities for the distributed ledger technology as well as its security pros and cons.

article thumbnail

Flaw in Skype for Android exposes photos and contacts

Security Affairs

A security expert found a flaw in Skype for Android that could be exploited by an unauthenticated attacker to view photos and contacts, and even open links in the browser. Security expert Florian Kunushevci (19) discovered a vulnerability that allows an unauthenticated local attacker to view photos and contacts, and also to open links in the browser.

article thumbnail

Managing Security in Today's Compliance and Regulatory Environment

Dark Reading

Instead of losing sight of the cybersecurity forest as we navigate the compliance trees, consolidate and simplify regulatory compliance efforts to keep your eyes on the security prize.

article thumbnail

Town of Salem RP Game hacked, more than 7.6M Players affected

Security Affairs

BlankMediaGames disclosed a data breach that affects millions of players of the popular role-playing game Town of Salem. The BlankMediaGames suffered a data breach that impacted more than 7.6 million players of the browser-based role-playing game Town of Salem. Exposed data includes usernames, emails, passwords, IP addresses, game and forum activity.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Marriott Sheds New Light on Massive Breach

Dark Reading

New information on the Starwood breach shows that the overall breach was somewhat smaller than originally announced, but the news for passport holders is worse.

83
article thumbnail

Selecting the best AI-powered analytics software for Life Sciences in 2019

OpenText Information Management

Artificial intelligence or AI is fast becoming a key technology for the life sciences field. Combined with advanced analytics, it has almost limitless potential to deliver superior data, leading to better and more efficient drug development, reduced costs and increased profits. But the question is how best to integrate artificial intelligence and analytics software into … The post Selecting the best AI-powered analytics software for Life Sciences in 2019 appeared first on OpenText Blogs.

article thumbnail

'Tracking every place you go': Weather Channel app accused of selling user data

The Guardian Data Protection

Most popular mobile weather app misled users who shared location information, say Los Angeles prosecutors in lawsuit People relied on the most popular mobile weather app to track forecasts that determined whether they chose jeans over shorts and packed a parka or umbrella, but its owners used it to track their every step and profit off that information, Los Angeles prosecutors said Friday.

Privacy 75
article thumbnail

How Intel Has Responded to Spectre and Meltdown

Dark Reading

In a newly published editorial and video, Intel details what specific actions it has taken in the wake of the discovery of the CPU vulnerabilities.

IT 83
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Phishing Tactic Hides Tracks with Custom Fonts

Threatpost

The phishing campaign is using a new technique to hide the source code of its landing page - and stealing credentials from customers of a major U.S.-based bank.

article thumbnail

A Major Hacking Spree Gets Personal for German Politicians

WIRED Threat Level

Hundreds of German politicians who have had their private digital lives exposed online are victims of a hacking campaign with unclear motives.

article thumbnail

Weather Channel App in a Deluge of Legal Trouble for Data Misuse

Threatpost

The lawsuit alleges that the Weather Channel app misled users about why it was collecting their (extremely precise) geolocation data.

IT 72
article thumbnail

Microsoft's 'Project Bali' Wants to Let You Control Your Data

Dark Reading

Currently in private beta, Bali is designed to give users control over the data Microsoft collects about them.

79
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Weekly Update 120

Troy Hunt

And then it was 2019. Funny how quickly it gets away from you, someone just posted on my 2018 retrospective blog post this week and asked why I didn't include my congressional testimony and if I'm honest, it took me a bit to think about why as well (it was in 2017). But we're here now so it's back to business as usual blog wise. This week is dominated by the personal finance lessons blog post.

IT 58
article thumbnail

CERT/CC Details Critical Flaws in Microsoft Windows, Server

Dark Reading

The vulnerabilities could be remotely exploited and give attackers control over affected systems.

82
article thumbnail

Artificial intelligence, ethics and customer needs are top of mind in 2019

Information Management Resources

Meeting the rapidly changing needs and expectations of customers, the importance of ethics and the growing impact of artificial intelligence will be among the key trends of the coming months, a new study says.

article thumbnail

The right data culture is a predictor of data governance success, says new survey

Collibra

Getting business and leadership support for data governance programs – and building a data culture on that buy-in – remains a significant challenge in many organizations. Yet, having this support is a crucial success factor for these initiatives, according to a new survey. The results of the new survey were presented at a Collibra event in The Hague, the Netherlands, in 2018 by Timm Grosser, head of consulting – BI and data management at BARC, a Teknowlogy Group company.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

A Case Study: Measuring the Impact of Db2 for z/OS Buffer Pool Changes

Robert's Db2

Not long ago, a Db2 for z/OS administrator contacted me with a request. His team had made some changes to the buffer pool configuration in their production Db2 environment (the overall size of the buffer pool configuration was increased to reduce read I/O activity , and greater use was made of large real storage page frames ), and they were not sure as to how the performance impact of these changes could be measured.

Access 48
article thumbnail

Mastering MDM is mandatory for digital transformation success

Information Management Resources

Master data is the vital difference between scaling or failing in this time of business disruption and non-stop data.

article thumbnail

Marriott Revises Breach Scope to 383M Records

Threatpost

The hotel giant said after de-duping, the breach appears to be smaller than it thought.

IT 72
article thumbnail

California DOJ to Hold Series of Public Forums on CCPA

Hunton Privacy

The California Department of Justice will host six public forums on the California Consumer Privacy Act of 2018 (“CCPA”) to provide the general public an opportunity to participate in the CCPA rulemaking process. Individuals may attend or speak at the events or submit written comments by email to privacyregulations@doj.ca.gov or by mail to the California Department of Justice, ATTN: Privacy Regulations Coordinator, 300 S.

Privacy 48
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Adobe Fixes Two Critical Acrobat and Reader Flaws

Threatpost

An unscheduled patch fixed two critical flaws that could enable arbitrary code execution.

article thumbnail

8 top artificial intelligence and analytics trends for 2019

Information Management Resources

Digital twins, edge computing and decision automation are among the hottest trends expected to impact artificial intelligence adoption this year.

article thumbnail

Data on Hundreds of German Politicians Published Online in Massive Compromise

Dark Reading

Authorities are investigating if breach resulted from a leak or a cyberattack.

72