Fri.Mar 16, 2018

article thumbnail

Feds: Secure Smartphone Service Helped Drug Cartels

Data Breach Today

Smartphones Allegedly Helped Criminals Move Drugs While Evading Law Enforcement The FBI has arrested the CEO of the Canadian smartphone service Phantom Secure on charges that he and four other suspects ran an encrypted telecommunications service used by more than 20,000 customers to facilitate illegal activities, including international shipments of cocaine and other drugs.

Security 124
article thumbnail

5 ways to detect a phishing email

IT Governance

Phishing has been used as a way for criminal hackers to gain sensitive information since the mid-1990s. It uses deceptive emails and websites to trick victims into clicking malicious links, downloading attachments or sending sensitive information. Phishing emails can impersonate well-known brands or even people you know, such as colleagues. The goal is to trick the recipient into believing that the message is important and convince them to click a malicious link/attachment or provide sensitive d

Phishing 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australia Sues Equifax, Alleges False Claims to Consumers

Data Breach Today

Credit Bureau Acted 'Unconscionably' With Vulnerable People, ACCC alleges Equifax has a new problem in Australia, a country that was left unscathed by the credit bureau's devastating data breach. The Australian Competition and Consumer Commission alleges the credit bureau deceived vulnerable consumers by misrepresenting its products and charging for services that should have been free.

article thumbnail

Hacker Adrian Lamo Has Died at 37

WIRED Threat Level

The Colombian-American hacker became famous in the early 2000s for breaking into the systems at organizations like *The New York Times*, and later for his role in Chelsea Manning's arrest.

Security 106
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Analysis: NY Attorney General's Anti-Breach Actions

Data Breach Today

Privacy attorney Kirk Nahra offers an analysis of the New York state attorney general proposing updates to the state's data security laws and issuing a substantial financial penalty in a HIPAA violations case.

Privacy 100

More Trending

article thumbnail

Youtube, Facebook, and Google Can't Expect Wikipedia to Cure the Internet

WIRED Threat Level

YouTube and other tech giants have repeatedly turned to Wikipedia to help solve some of their biggest problems—often without giving back.

article thumbnail

New hyper-fast data ingestion enables smarter decisions

IBM Big Data Hub

Human beings tend to filter out events they deem unimportant. They can only process so much at any given time. Computer systems, however, must be able to handle a massive number of events in real time or near-real time to help support a wide range of applications.

72
article thumbnail

Cybercriminals Launder Up to $200B in Profit Per Year

Dark Reading

Cybercrime funds make up 8-10% of all illegal profits laundered and amount to $80-200 billion each year.

87
article thumbnail

Voice Chat App Zello Turned a Blind Eye to Jihadis for Years

WIRED Threat Level

Despite warnings and flagged accounts, Zello left accounts with ISIS flag avatars and jihadist descriptions live on its service.

IT 78
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Weekly podcast: ICO GDPR campaign, Gwent Police, Binance and MediaGet

IT Governance

This week, we discuss the ICO’s new GDPR campaign for micro businesses, a potential data breach at Gwent Police, a US$250,000 reward from Binance and Windows Defender stops a massive malware campaign. Hello and welcome to the IT Governance podcast for Friday, 16 March 2018. Here are this week’s stories. With just over two months until the General Data Protection Regulation (GDPR) comes into effect, the Information Commissioner’s Office this week launched an awareness campaign aimed at busi

GDPR 63
article thumbnail

Who Does What in Cybersecurity at the C-Level

Dark Reading

As security evolve as a corporate priority, so do the roles and responsibilities of the executive team. These seven titles are already feeling the impact.

article thumbnail

Intel Details CPU ‘Virtual Fences’ Fix As Safeguard Against Spectre, Meltdown Flaws

Threatpost

Intel is introducing hardware-based protections to its new chips to protect against the Spectre and Meltdown flaws that rocked the silicon industry when they were announced in early 2018.

IT 45
article thumbnail

The Containerization of Artificial Intelligence

Dark Reading

AI automates repetitive tasks and alleviates mundane functions that often haunt decision makers. But it's still not a sure substitute for security best practices.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The ‘Perfect Storm’ of Disinformation and Hacking

Threatpost

Matt Tait gives a list of examples throughout history where politically motivated groups have used disinformation and hacking as part of a campaign to shape public opinion.

article thumbnail

Phantom Secure 'Uncrackable Phone' Execs Indicted for RICO Crimes

Dark Reading

Executives of Phantom Secure have been indicted on federal RICO charges for encrypting communications among criminals.

article thumbnail

New Microsoft Bug Bounty Program Looks To Squash The Next Spectre, Meltdown

Threatpost

Microsoft is looking to target new speculative execution side channel vulnerabilities - similar to Spectre and Meltdown - with a new bug bounty program.

Cloud 45
article thumbnail

How RFID Can Help You Manage Your Data Center

RFID Global Solution, Inc.

Today’s Data Centers are facing many challenges. As facilities grow, the ability to manage inventory, asset utilization and power consumption becomes increasingly difficult. Frequent reconfigurations and consolidations create a loss of inventory visibility. Co-located assets may require utilizing multiple management systems and procedures. Sarbanes-Oxley accounting procedures mandate that a verifiable record of all assets be … How RFID Can Help You Manage Your Data Center Read More ».

40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FCC TCPA order partially upheld and partially set aside

Data Protection Report

On March 16, 2018, the U.S. Court of Appeals for the District of Columbia Circuit issued its decision on the Federal Communications Commission (FCC) omnibus order of 2015, relating to challenges to four of the FCC’s determinations relating to cell phones. The appellate court upheld the FCC’s determinations that consumers can revoke consent to receive marketing calls by “any reasonable means” that clearly expresses the desire to receive no further messages from the caller, and an exception for c

article thumbnail

Financial Institution Regulation: What's Happening in Washington?

Rippleshot

It’s been a busy week in the world of financial institution regulation as headlines about Dodd-Frank, the Equifax breach, credit freezes and data security stole the spotlight. While these four topics have been at the forefront of the news cycle for many months, each of them found their way into the top news items. Here’s a breakdown of what’s been happening in Washington, and how it may impact the world of financial services.

article thumbnail

Next RMS hangout: Records Managers Outside of Archives speak up!

The Schedule

After a few months’ hiatus, the Records Management Section Hangout Series is back! On Thursday, March 29 at 12:00 CDT, join members of the RMS steering committee in a discussion on ““What RMs Want: Records Managers On What They Wish Archivists Knew About Them (And Vice-Versa)”. Experienced records managers Dennis Larsen (retired, formerly Records Manager for the University of Wisconsin-Colleges and Extension) and Connie Schumacher (Content and Records Manager, Argonne National Laboratories) wil

article thumbnail

Answers to Your Questions About Medical Record Scanning

Archive Document Data Storage

In this day and age, it’s important to stay up to date with the laws and requirements affecting your industry. With the National Health Service (NHS) planning to go paperless this year, we wanted to take some time to answer your questions about medical records scanning. Q: What is a Medical Record? A: A medical record is documentation of patient health care information.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Rolls Out New Security Features for Chrome Enterprise

Dark Reading

The business-friendly browser now includes new admin controls, EMM partnerships, and additions to help manage Active Directory.

article thumbnail

Breach costs rise, but few organizations are ready to prevent them

Information Management Resources

51 percent of participants in fifth annual Ponemon survey say their breach response plans aren’t adequate.

article thumbnail

Interesting Article on Marcus Hutchins

Schneier on Security

This is a good article on the complicated story of hacker Marcus Hutchins.

article thumbnail

How artificial intelligence is already paying dividends in healthcare

Information Management Resources

Organizations such as Mount Sinai Health System are finding that AI is already achieving results for providers in various supportive ways that enable staff efficiencies.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Journals of an 19th century Tallahassee Reverend

Archives Blogs

We recently added a small new set of materials to the digital collection for theSt. John’s Episcopal Church Records. Two items detail the history of the Church further. The other three are journals kept by the Reverend Doctor W.H. Carter. They document his travels and ministry in New York, Florida, and places in-between from 1855-1907. Dr. Carter was born in Brooklyn, New York, and studied at Yale University.

article thumbnail

Cuts to skilled immigration degrade a U.S. strength

Information Management Resources

Between 1995 and 2005, immigrants started more than half of the new businesses in Silicon Valley. As of 2011, more than 40 percent of Fortune 500 companies were started by immigrants or their children.

article thumbnail

Friday Squid Blogging: New Squid Species Discovered in Australia

Schneier on Security

A new species of pygmy squid was discovered in Western Australia. It's pretty cute. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.