Wed.Aug 29, 2018

article thumbnail

GDPR Effect: Data Protection Complaints Spike

Data Breach Today

Individuals Report Organizations for Allegedly Failing to Secure Personal Data Three months after the EU's General Data Protection Regulation went into full effect, the U.K.'s data privacy watchdog says that the number of data protection complaints it has received from individuals has nearly doubled.

GDPR 124
article thumbnail

7 Steps to Start Searching with Shodan

Dark Reading

The right know-how can turn the search engine for Internet-connected devices into a powerful tool for security professionals.

Security 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Zero-Day Exploit Published Before Patch

Data Breach Today

Exploit Code Published After Disclosure Process Appears to Have Gone Sideways Microsoft appears set to patch a zero-day local privilege escalation vulnerability after a research published proof-of-concept exploit code for the flaw. That's a relatively rare turn of events these days, owing to Microsoft's bug bounty program rules.

113
113
article thumbnail

The Rise of an Overlooked Crime – Cyberstalking

Security Affairs

Cyberstalking is one of the most overlooked crimes. This is exactly why it is among the fastest growing crimes in the world. Learn all there is about cyberstalking here. The internet has been a blessing since its inception. The very concept of globalization has come into existence just because of the internet. The world that was previously unconnected soon became a global village with different cultures and traditions linking together via the information highway.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Healthcare Cybersecurity: Helping the Little Guy

Data Breach Today

Group Pushes for Changes in Federal Rules to Pave the Way for Donations Federal regulators are being asked to relax anti-kickback rules so that resource-strapped healthcare providers can accept certain donations or subsidies of cybersecurity products and services.

More Trending

article thumbnail

Securing IoT: Is It Feasible?

Data Breach Today

U.S. consumers now own about 870 million IoT devices. In an interview, Al Pascual of Javelin Strategy & Research, discusses the challenges involved in securing the exploding IoT landscape.

IoT 100
article thumbnail

Winning with AI: Industry POV on how to change the game, part 1

IBM Big Data Hub

Will artificial intelligence remake business as we know it? Will AI change the way we do our jobs – or reshape entire categories of careers? How can businesses harness the transformative potential of AI and outplay the competition? Leaders from a broad range of industries and expertise will be discussing these questions at “Changing the Game: Winning with AI,” a 13 September, 2018 event taking place live in New York City.

article thumbnail

Preventing Compromises in the Cloud

Data Breach Today

Amazon's Keith Carlson on How to Prevent, Detect and Remediate As general manager for payments and fraud prevention at Amazon Web Services, Keith Carlson has a unique perspective on detecting and preventing compromises in the cloud. He shares insights gleaned from dealing with scores of customers and their concerns.

Cloud 100
article thumbnail

DataGuidance’s Thought Leaders in Privacy: Vishnu Shankar

Data Matters

Vishnu Shankar, an associate in our London office, spoke with DataGuidance at the 2018 IAPP Data Protection Intensive. He discussed his recommendations on regulatory requirements regarding breach notification across several key pieces of legislation, including the GDPR and the NIS Directive, as well as sector-specific requirements. See More >> The post DataGuidance’s Thought Leaders in Privacy: Vishnu Shankar appeared first on Data Matters Privacy Blog.

Privacy 60
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Build a Computer Information script for your Help Desk

Jamf

Discover how to drastically simplify your Help Desk interactions by creating a tool that displays technical information in an easy-to-read window for end users.

69
article thumbnail

CVE-2018-15919 username enumeration flaw affects OpenSSH Versions Since 2011

Security Affairs

Qualys experts discovered that OpenSSH is still vulnerable to Oracle attack, it is affected by the CVE-2018-15919 flaw at least since September 2011. Security experts from Qualys discovered that OpenSSH is still vulnerable to Oracle attack, it is affected by the CVE-2018-15919 flaw at least since September 2011. A few days ago the security expert Darek Tytko from securitum.pl has reported a similar username enumeration vulnerability in the OpenSSH client.

article thumbnail

Android Devices Can Be Exploited With Decades Old-Telephone Tech

WIRED Threat Level

So-called Attention commands date back to the 80s, but they can enable some very modern-day smartphone hacks.

article thumbnail

Data of 130 Million hotel chain guests offered for 8 BTC on Dark Web

Security Affairs

A hacker is offering for sale the personal details of over 130 million hotel chain guests on a Chinese Dark Web forum. The news was reported by Bleeping computers, a hacker is selling the personal details of over 130 million hotel guests for 8 Bitcoin on a Chinese Dark Web forum. “The breach was reported today by Chinese media after several cyber-security firms spotted the forum ad [ 1 , 2 , 3 , 4 ]. ” states Bleeping Computer.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Amazing Things are Happening

OpenText Information Management

It is an amazing time to be a citizen of the world. Breakthroughs in technology are having a profound effect on our lives. Gene editing is redefining the prevention of disease and extending our life expectancy, quantum computing is available in the cloud, 3D metal printing could replace mass production and new techniques in AI … The post Amazing Things are Happening appeared first on OpenText Blogs.

Cloud 48
article thumbnail

Experts published a PoC code for Intel Management Engine JTAG flaw

Security Affairs

A group of security researchers has published a proof-of-concept exploit code for a vulnerability in the Intel Management Engine JTAG. A team of security researchers has published a proof-of-concept exploit code for a vulnerability in the Intel Management Engine JTAG. Last year the same group of experts at Positive Technologies discovered an undocumented configuration setting that disabled the Intel Management Engine.

article thumbnail

The soft skills developers most need to be successful

Information Management Resources

Organizations large and small continue to navigate their business and technology transformation and as they undertake their unique transition, the need for insightful, candid and emotionally intelligent leadership has never been greater.

article thumbnail

What the Blockchain Taught Us about IT Security

Security Affairs

It is not just about security, but in utilizing Blockchain to secure your company and your information. With how fast technology is improving and being included in everyday activities or jobs to make them fast and efficient, it is important to make sure you are secured, especially when on the internet. You can have your own internet security installed, but if you are planning on running a reliable business you will need a strong and trusted company to provide secure IT systems and support.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Yahoo Persists in Scanning Emails for In-Depth Ad-Targeting

Threatpost

The service gleans information from receipts, travel itineraries, trade confirmations for online brokerages, Uber messages, auto-loan confirmations, promotions and much more.

Privacy 45
article thumbnail

'Security Fatigue' Could Put Business at Risk

Dark Reading

The relentless march of security breaches may cause some individuals to drop their guard, but there's more to the story than that.

Risk 53
article thumbnail

The Fight Over California's Privacy Bill Has Only Just Begun

WIRED Threat Level

The tech industry lobby has made it clear that they want changes to California's sweeping privacy protections—and they've got plenty of time left to get them made.

Privacy 44
article thumbnail

How Data Breaches Affect the Enterprise

Dark Reading

This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

3-D Printed Gun Blueprints Are Back, and Only New Laws Can Stop Them

WIRED Threat Level

Despite an injunction against sharing the plans online, Cody Wilson is now selling the blueprints directly.

article thumbnail

Overestimating WebAssembly's Security Benefits Is Risky for Developers

Dark Reading

Although WebAssembly technology promises both better performance and better security to developers, it also creates a new risk for native exploits in the browser.

article thumbnail

Hackers could use fax machines to take over entire networks, researchers warn

IG Guru

In an age of instant communication over the internet, the fax machine is seen as an archaic piece of technology. But it could potentially prove to be a gold mine for hackers looking to steal company secrets. Researchers at Nasdaq-listed Check Point Software Technologiessaid that fax machines — which still reside in many offices — have […]. The post Hackers could use fax machines to take over entire networks, researchers warn appeared first on IG GURU.

Mining 40
article thumbnail

Amnesty International creates new human rights digital archive

Preservica

Bryony Hooper, archivist to Amnesty's international secretariat, speaks to Computer Weekly about the “great fear” that all in her profession have about the preservation gap that could be opened up by digital. “We know how to look after parchment and papyrus, but fear a gap opening up with electronic media,” she says. After all, have you tried opening up one of your old WordPerfect documents recently?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Voting Machine Maker Defends Refusal of White-Hat Hacker Testing at DEF-CON

The Security Ledger

Voting machine maker Election Systems & Software (ES&S) defended its decision not to participate in a white-hat hacking event at this year’s DEF-CON to test the security of voting systems, saying such hack-a-thons could actually jeopardize election security and invite hackers to disrupt electronic voting systems. Not allowing its. Read the whole entry. » Related Stories As Election Threats Mount, Voting Machine Hacks are a Distraction DEF CONtests Highlight Hacker Culture̵

Risk 40
article thumbnail

I’m worried about information leaks. How can I securely share my files?

OpenText Information Management

The internet was born to connect us to each other and to the information we need. And somewhere along the way, sharing content—whether it’s your mood on social media or your experience through message boards—became easier and easier. Sharing files is no different. It’s as easy as a click, drag and drop and your file … The post I’m worried about information leaks.

article thumbnail

Norton Rose Fulbright – cyber law firm of the year nomination

Data Protection Report

We are grateful to our clients and industry contacts for nominating us as cyber law firm of the year at the 2018 Insurance Insider Cyber Rankings Awards. The winner will be determined from the results of a wide-ranging survey of insurers and brokers and will be announced on September 21, 2018.