Fri.Jan 12, 2018

article thumbnail

Backdoored in 30 Seconds: Attack Exploits Intel AMT Feature

Data Breach Today

Physical Access Plus Default AMT Credentials Equals Takeover, F-Secure Warns An attacker who gains physical access to a corporate PC with an Intel chip could exploit the built-in Active Management Technology to backdoor the system in about 30 seconds, unless default AMT credentials have been changed, Finnish security firm F-Secure warns.

Access 160
article thumbnail

Tech Companies Are Complicit in Censoring Iran Protests

WIRED Threat Level

Opinion: Google, Twitter, and Signal should take steps to ensure their tools aren’t restricting Iranian’s free speech.

Security 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spectre Reversal: AMD Confirms Chips Have Flaws

Data Breach Today

Also, Intel Confirms Stability Problems For Some CPUs Following Firmware Update In a reversal, chipmaker AMD is now warning that its chips are susceptible to the speculative execution flaws in microprocessors known as Spectre, but not to the Meltdown. Separately, Intel has confirmed that its firmware updates have led to stability problems for older Broadwell and Haswell chipsets.

IT 143
article thumbnail

A Clever Radio Trick Can Tell If a Drone Is Watching You

WIRED Threat Level

A quirk of video compression lets spy targets see what the drone watching them sees.

Security 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Rising Attack Vector for Industrial IoT: Smartphone Apps

Data Breach Today

Mobile Apps Can Be Exploited To Tamper With Industrial Control Systems Fresh research into mobile apps designed to control ICS systems from afar has unearthed unnerving findings. More than 20 percent of mobile ICS apps have issues that could allow an attacker to influence an industrial system.

IoT 134

More Trending

article thumbnail

ONC's New Chief Privacy Officer: The Road Ahead

Data Breach Today

Kathryn Marchesini Has the Experience. But Will She Have the Resources? The Office of the National Coordinator for Health IT's new chief privacy officer, Kathryn Marchesini, has a wealth of experience. But will the Department of Health and Human Services give her the resources she needs to get the job done?

Privacy 113
article thumbnail

How to Attract More Women Into Cybersecurity - Now

Dark Reading

A recent survey finds a number of attributes women seek in their careers can be found in a cybersecurity profession - the dots just need to be connected.

article thumbnail

FBI Director's Encryption Comments Prove Controversial

Data Breach Today

An analysis of FBI Director Christopher Wray's comments about how encryption poses complications for law enforcement officials leads the latest edition of the ISMG Security Report. Also featured: The former CISO of the state of Michigan sizes up cybersecurity forecasts.

article thumbnail

Strategies to Protect your Records from Ransomware

The Texas Record

Over the past several years, cyber criminals have hacked into records management systems at the federal, state, and local levels. Once the criminals gain access to the system, they plant a virus, causing problems when trying to retrieve records from these systems. The virus is a malicious string of software known as ransomware because after the criminals take control of your data, they demand a monetary amount to release the records.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Majority of Companies Lack Sufficient IoT Policy Enforcement Tools

Dark Reading

Shortfall exists despite nearly all global technology enterprise companies having security policies to manage IoT devices.

IoT 64
article thumbnail

The Best of Record Nations: Top Posts of 2017

Record Nations

No matter how your business stores data, whether on paper or digital files, managing all that information efficiently can make or break your business’ growth goals for the future. Records management goes a long way in allowing your business to scale or pivot to new challenges. If your company saw significant growth in 2017, you […]. The post The Best of Record Nations: Top Posts of 2017 appeared first on Record Nations.

article thumbnail

Intel AMT Loophole Allows Hackers to Gain Control of Some PCs in Under a Minute

Threatpost

Researchers say an unprotected Management Engine BIOS Extension can allow an attacker the ability to configure Intel’s AMT feature for remote access by a hacker.

Access 47
article thumbnail

France Might Vet Acquisitions of AI, Data Protection Firms

Dark Reading

Finance minister says country may add artificial intelligence and data security to list of nation's strategically important, regulated sectors

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Resourceful Records Managers- Brad Houston

The Schedule

Our eagerly anticipated series Resourceful Records Managers returns! This month we meet Brad Houston, City Records Officer and Document Services Manager for the City of Milwaukee. *If you would like to be included in this feature please contact Jessika Drmacich, jgd1(at)williams(dot)edu. What led you to choose your current career in Records Management?

article thumbnail

UK ICO Issues Unprecedented Fine Against Mobile Phone Retailer for Lax Security

Hunton Privacy

On January 8, 2017, the UK Information Commissioner (“ICO”) issued an unprecedented monetary penalty of £400,000 against British mobile phone retailer, The Car Phone Warehouse Limited. Following an attack on their system in 2015, the ICO found that the company had failed to take adequate steps to protect the personal data it held on its system. Between July and August 2015, the system hosting the company’s internal and external websites, which included personal data (including payment card data)

Retail 40
article thumbnail

Kofax Declares 2018 the Year of the Robot

Info Source

. Irvine, CA, January 11, 2018 – Kofax ® , a leading provider of software to simplify and transform the First Mile™ of business, today announced record sales achievements for Kofax Kapow™ , its leading robotic process automation (RPA) software that mimics human actions to automate a wide range of manual, repetitive tasks and drive continuous improvement.

article thumbnail

What Can We Learn from Counterterrorism and National Security Efforts?

Dark Reading

The best practices and technologies that originated in the intelligence realm can help businesses stay safer, too.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What is DMARC and How Does it Improve Email Security?

eSecurity Planet

The U.S. government is moving ahead with broad adoption of DMARC to help improve email security, and other organizations should take note.

article thumbnail

House Passes Bill to Renew NSA's Warrantless Surveillance Program

Dark Reading

The bill passed without an amendment which would require a warrant to analyze Americans' incidentally collected data.

47
article thumbnail

What’s big for big data for 2018

Information Management Resources

This year will unleash a major disruption for the analytics and information management space. It will upend decades worth of accepted practices and introduce new winners and losers.

article thumbnail

XKCD's Smartphone Security System

Schneier on Security

Funny.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

4 steps to get your organization ready for GDPR compliance

Information Management Resources

Regardless of the EU’s efforts, the reality is that many companies won’t meet the May deadline, whether due to lack of resources, laziness or apathy.

article thumbnail

Facial Recognition Is Coming to Retail

Schneier on Security

Summary article.

Retail 50
article thumbnail

Crowdfunding platform raising $100M fund for AI, deep-learning

Information Management Resources

'Everyone is running scared from disruption, and the disruption that is coming is artificial intelligence,' explained OurCrowd's CEO Jon Medved.

article thumbnail

Apps Exposing Children to Porn Ads Booted From Google Play

Threatpost

Researchers identified 60 apps on Google Play infected with AdultSwine malware that in some cases displayed graphic adult-themed ads on apps intended for children.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

GM drops the steering wheel and gives the robot driver control

Information Management Resources

When the firm starts testing its autonomous electric sedan in San Francisco ride-sharing fleets, it’ll likely be the first production-ready car on the roads without the tools to let a human drive.

IT 31
article thumbnail

Friday Squid Blogging: Japanese "Dude Food" Includes Squid

Schneier on Security

This seems to be a trend. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

article thumbnail

SS&C to acquire DST Systems for $5.4B

Information Management Resources

The firm is a global provider of specialized technology, strategic advisory and business operations outsourcing to the financial services and healthcare industries.