Thu.Jan 10, 2019

article thumbnail

Lessons From Report on Massive Singapore Healthcare Hack

Data Breach Today

Analysis of SingHealth Attack Offers Recommendations That Could Be Applied Wordwide A variety of security weaknesses contributed to a massive 2017 health data security breach in Singapore, according to a new report. What can healthcare organizations around the world learn from the report's security recommendations?

Security 222
article thumbnail

Three security bugs found in the popular Linux suite systemd

Security Affairs

Experts disclosed three flaws in the systemd , a software suite that provides fundamental building blocks for Linux operating systems. Security firm Qualys has disclosed three flaws (CVE-2018-16864, CVE-2018-16865, and CVE-2018-16866 ) in a component of systemd , a software suite that provides fundamental building blocks for a Linux operating system used in most major Linux distributions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Neiman Marcus Settles Lawsuit Over Payment Card Breach

Data Breach Today

Agreement With 43 States Requires Retailer to Use Encryption, Tokenization Forty-three states have reached a settlement with Neiman Marcus over its 2013 data breach, one of several breaches from that period blamed on in-memory malware. The retailer will pay $1.5 million and must use encryption and tokenization to protect card data.

Retail 186
article thumbnail

Security Vulnerabilities in Cell Phone Systems

Schneier on Security

Good essay on the inherent vulnerabilities in the cell phone standards and the market barriers to fixing them. So far, industry and policymakers have largely dragged their feet when it comes to blocking cell-site simulators and SS7 attacks. Senator Ron Wyden, one of the few lawmakers vocal about this issue, sent a letter in August encouraging the Department of Justice to "be forthright with federal courts about the disruptive nature of cell-site simulators.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Vietnam's 'Cybersecurity' Law Says Little on Security

Data Breach Today

Law Focuses More on Fighting Anti-Government Speech On Wednesday, just days after a new "cybersecurity" law took effect, Vietnam alleged that Facebook has violated the law by allowing users to post anti-government comments on the platform. The so-called cybersecurity law actually speaks little about IT security measures.

More Trending

article thumbnail

Germany's Mega-Leak Takeaway: Noisy Young Hacker Got Caught

Data Breach Today

But Quiet Nation-State Hackers and Cybercrime Gangs Can Exploit the Same Flaws Police in Germany say a 20-year-old student has confessed to stealing and leaking personal details from 1,000 German politicians, celebrities and journalists, allegedly after bragging about the crime. More advanced attackers rarely make so much noise.

142
142
article thumbnail

Reddit locked Down accounts due to alleged security breach

Security Affairs

The social media platform Reddit has notified users that some of them have been locked out of their accounts after detecting suspicious activity. Reddit locked down a large number of user accounts after due to a security concern after detecting suspicious activity on them. . “If you are here because you’ve been locked out of your account in the last day or so, you’re in the right place and we want to help you get your account back in working order.” reads a post published by one of t

article thumbnail

Is your data ready for AI? Part 1

IBM Big Data Hub

Enterprise leaders understand the importance of integrating AI into their business models. However, there's a big difference between experimenting with AI and true enterprise-grade integration of AI.

78
article thumbnail

Ironic turn … Kaspersky Labs helped NSA to catch alleged data thief

Security Affairs

Kaspersky was a long accused to support Russian intelligence, in an ironic turn, source now revealed it helped to catch alleged NSA data thief. Kaspersky was a long accused to support Russian intelligence in cyber espionage activities and for this reason, its products have been banned by the US Government and EU Parliament. The company denied any involvement with operations conducted by the Russian intelligence and recently opened it Transparency Center in Zurich to assure the integrity and trus

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Your Old Tweets Give Away More Location Data Than You Think

WIRED Threat Level

Researchers built a tool that can predict where you live and work, as well as other sensitive information, just by using geotagged tweets.

article thumbnail

Linkedin Learning: Producing a Video

Adam Shostack

My Linkedin Learning course is getting really strong positive feedback. Today, I want to peel back the cover a bit, and talk about how it came to be. Before I struck a deal with Linkedin, I talked to some of the other popular training sites. Many of them will buy you a microphone and some screen recording software, and you go to town! They even “let” you edit your own videos.

IT 75
article thumbnail

DNS Hijacking Campaign Targets Organizations Globally

Dark Reading

A group believed to be operating out of Iran has manipulated DNS records belonging to dozens of firms in an apparent cyber espionage campaign, FireEye says.

81
article thumbnail

HHS Publishes Health Industry Cybersecurity Practices

Hunton Privacy

The U.S. Department of Health and Human Services (“HHS”) recently announced the publication of “Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients” (the “Cybersecurity Practices”). The Cybersecurity Practices were developed by the Healthcare & Public Health Sector Coordinating Councils Public Private Partnership, a group comprised of over 150 cybersecurity and healthcare experts from government and private industry.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Resolve to Comply in 2019

Thales Cloud Protection & Licensing

Last year was a big year in the world of information security with data privacy issues, new regulations and several high-profile data breaches. Now that 2019 has arrived, what should corporations be doing to comply with the various data security and privacy regulations? First and foremost, businesses must manage and mitigate risk, and in the digital world order this entails keeping information secure, ensuring proper controls are in place, and policies and roles are set.

article thumbnail

Reddit Alerts Users to Possible Account Breaches

Dark Reading

User lockouts, combined with requirements for new passwords, indicate an attack on accounts at the popular social media platform.

article thumbnail

A time of reflection: Five tips for Financial Services in 2019

OpenText Information Management

The New Year is upon us, and with it come new challenges and opportunities for the Financial Services industry. The industry is currently experiencing unprecedented disruption from factors like new market entrants (FinTechs, InsurTechs), evolving regulatory changes, increasing incidents of cyber-crime, mandates to reduce costs and deliver efficiencies across the enterprise, and expectations to deliver … The post A time of reflection: Five tips for Financial Services in 2019 appeared first

article thumbnail

Election Security Isn't as Bad as People Think

Dark Reading

Make no mistake, however: We'll always have to be on guard. And we can take some lessons from the world of industrial cybersecurity.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

‘Unprecedented’ DNS Hijacking Attacks Linked to Iran

Threatpost

The attacks, targeting several countries to redirect traffic and harvest credentials, have been linked to Iran.

article thumbnail

Google: G Suite Now Alerts Admins to Data Exfiltration

Dark Reading

New additions to the G Suite alert center are intended to notify admins of phishing and data exports.

article thumbnail

Key factors driving digital transformation in manufacturing

OpenText Information Management

The race to digitally transform is more intense than ever for manufacturers. Companies are embracing new technologies to rapidly evolve their business models and operations to drive revenue and competitive advantage. A new InfoBrief from IDC, Digital Transformation in Manufacturing, shows that manufacturing is at the heart of digital transformation’s perfect storm, and outlines how … The post Key factors driving digital transformation in manufacturing appeared first on OpenText Blogs

article thumbnail

Consumers Demand Security from Smart Device Makers

Dark Reading

Poll shows individuals want better security from IoT device manufacturers as connected products flood the market.

IoT 76
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

At CES, Focus is On ‘Cool Factor’ Not IoT Security

Threatpost

When it comes to IoT, the priority at CES is the "wow factor" - but not so much a focus on security.

IoT 68
article thumbnail

Ryuk Ransomware Attribution May Be Premature

Dark Reading

The eagerness to tie recent Ryuk ransomware attacks to a specific group could be rushed, researchers say.

article thumbnail

IriusRisk 2.0

Adam Shostack

I’m excited to be able to share “ Announcement: IriusRisk Threat Modeling Platform 2.0 Released.” If you’re looking to scale your enterprise threat modeling program, this is worth a look.

45
article thumbnail

6 Best Practices for Managing an Online Educational Infrastructure

Dark Reading

Universities must keep pace with rapidly changing technology to help thwart malicious hacking attempts and protect student information.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

OPEX Releases Two New Compact Envelopeners with Milling Cutter Technology

Info Source

Moorestown, NJ—January 7, 2019— OPEX ® Corporation, a recognized global technology leader in high-speed mailroom automation, announced today the addition of the Series 210 Envelopener and the Series 410 Envelopener to its world-renowned OMATION ® line of products. The Series 210 incorporates many of the same key features as its predecessor, the OM2112 – such as superior milling cutter technology that provides complete edge-to-edge opening of envelopes for easy content extraction.

IT 45
article thumbnail

New Software Side-Channel Attack Raises Risk for Captured Crypto

Dark Reading

The new attack hits operating systems, not chips, and may give criminals the keys to a company's cryptography.

Risk 66
article thumbnail

Google Search Results Spoofed to Create Fake News

Threatpost

The technique can be used to spread disinformation while leveraging the trust people have in Google's search results.