Wed.Feb 13, 2019

article thumbnail

Japan's Credit Card Fraud Debacle

Data Breach Today

Fraudsters Received 20 Percent Cashback for Fraudulent Purchases A convergence of events in December in Japan led to an unprecedented spike in card-not-present fraud. New statistics from a dark web monitoring firm explains how a promotion by PayPay, a third-party payments service, slid sideways.

248
248
article thumbnail

Bomb Threat Hoaxer Exposed by Hacked Gaming Site

Krebs on Security

Federal authorities this week arrested a North Carolina man who allegedly ran with a group of online hooligans that attacked Web sites (including this one), took requests on Twitter to call in bomb threats to thousands of schools, and tried to frame various online gaming sites as the culprits. In an ironic twist, the accused — who had fairly well separated his real life identity from his online personas — appears to have been caught after a gaming Web site he frequented got hacked.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Battling Big Breaches: Are We Getting Better?

Data Breach Today

Bad News, Based on the 5 Biggest Breaches in the Past 5 Years What if organizations' information security practices have gotten so good that they're finally repelling cybercriminals and nation-state attackers alike? Unfortunately, the five biggest corporate breaches of the past five years - including Yahoo, Marriott and Equifax - suggest otherwise.

article thumbnail

Malicious PDF Analysis

Security Affairs

In the last few days I have done some analysis on malicious documents, especially PDF. Then I thought, “Why not turn a PDF analysis into an article?” Let’s go to our case study: I received a scan request for a PDF file that was reported to support an antivirus vendor, and it replied that the file was not malicious. Because the manufacturer’s analysis was not satisfactory, the team responsible for handling the incident requested a second opinion, since in other anti-virus

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Data Gravity: Will It Weigh Down Cloud Security?

Data Breach Today

The 2019 RSA Conference offers an opportunity to learn about new concepts across all aspects of cybersecurity. One such area is "data gravity," which will be the topic of a session featuring Microsoft's Diana Kelley and Sian John. They discuss the concept in a joint interview.

Cloud 164

More Trending

article thumbnail

Deciphering HHS' Proposed Information Blocking Rules

Data Breach Today

Proposed rules released this week by the Department of Health and Human Services aim to define and discourage inappropriate blocking of the secure sharing of health information, Elise Sweeney Anthony of the Office of the National Coordinator for Health IT explains in an interview at the HIMSS19 conference.

Security 160
article thumbnail

Hacker deleted all data from VFEmail Servers, including backups

Security Affairs

A destructive cyberattack hit the email provider VFEmail, a hacker wiped its servers in the United States, including the backup systems. An unknown attacker has launched a destructive cyber attack against the email provider VFEmail, he erased information on its server including backups, 18 years’ worth of customer emails were lost. “We have suffered catastrophic destruction at the hands of a hacker.

article thumbnail

US Air Force Defector Allegedly Helped Iran Hack Americans

WIRED Threat Level

In an astonishing indictment, the DoJ details how Monica Witt allegedly turned on her former counterintelligence colleagues.

article thumbnail

Cyberinsurance and Acts of War

Schneier on Security

I had not heard about this case before. Zurich Insurance has refused to pay Mondelez International's claim of $100 million in damages from NotPetya. It claims it is an act of war and therefor not covered. Mondelez is suing. Those turning to cyber insurance to manage their exposure presently face significant uncertainties about its promise. First, the scope of cyber risks vastly exceeds available coverage, as cyber perils cut across most areas of commercial insurance in an unprecedented manner: d

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

2018 Was Second-Most Active Year for Data Breaches

Dark Reading

Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.

article thumbnail

The AI database is upon us

IBM Big Data Hub

IBM General Manager for Data and AI Rob Thomas has said organizations can't have effective AI without sound IA (Information Architecture). And one of the pillars of any IA is data management.

article thumbnail

EDPB Reiterates the Need to Address Post-Brexit Data Transfers, Including BCRs

Hunton Privacy

At its plenary meeting on February 13, 2019, in Brussels, the European Data Protection Board (“EDPB”) adopted an Information Note on Data Transfers under the GDPR in the Event of a No-Deal Brexit , and an Information Note on BCRs for Companies Which Have ICO as BCR Lead Supervisory Authority. The Information Note on Data Transfers reiterates the need for organizations to implement data transfer mechanisms if they wish to continue transferring personal data from the European Economic Area (“EEA”)

article thumbnail

Making Watson available on any cloud

IBM Big Data Hub

During the IBM flagship Think conference in San Francisco today, businesses looking to accelerate their transformation with the IBM AI Watson were treated to news that they’ll be able to build, deploy and run AI models and applications across any cloud, giving them the freedom to apply Watson capabilities to their data wherever it is stored.

Cloud 75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

0patch released micropatch for code execution flaw in OpenOffice

Security Affairs

Experts at ACROS Security’s 0patch released an unofficial patch for a recently disclosed remote code execution vulnerability in the Apache OpenOffice suite. ACROS Security’s 0patch released an unofficial patch for a path traversal flaw recently disclosed in the Apache OpenOffice suite. The security researcher Alex Inführ discovered a severe remote code execution vulnerability in LibreOffice and Apache OpenOffice that could be exploited by tricking victims into opening an ODT (OpenDocument Text)

article thumbnail

The Data and AI announcements from IBM Think 2019

IBM Big Data Hub

Today at Think 2019, IBM announced a new vision for the future of AI and digital transformation. Along the way, we made a number of announcements and updates that could profoundly impact how enterprises will use analytics and AI to shape the future of their business. In all, it was definitely a big day of news for IBM partners and clients. In case you missed it, here are three major announcements for analytics pros from Think 2019.

article thumbnail

Director banned for 4 years after breaching the PECR

IT Governance

The ICO (Information Commissioner’s Office) has banned a Manchester-based businessman from forming or managing an organisation in the next four years, after he breached the PECR (Privacy and Electronic Communications Regulations). Keith Hancock, the director of Lad Media, “ played a central role ” in spamming thousands of people with text messages containing marketing material, many of whom had withdrawn their consent to receive such messages.

article thumbnail

Top 6 predictive analytics software benefits for the Retail industry in 2019

OpenText Information Management

The retail industry is extremely competitive with traditional brick-and-mortar retailers under pressure from online services such as Amazon. In this environment, anything that delivers advantage has to be quickly seized. Predictive analytics offers huge benefits for retailers as it helps them turn Big Data into actionable insight to better understand and connect with their customers. … The post Top 6 predictive analytics software benefits for the Retail industry in 2019 appeared first on O

Retail 65
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

ThreatList: Banking Trojans Are Still The Top Big Bad for Email

Threatpost

Banking trojans, led by the ever-changing Emotet, dominated the email-borne threat landscape in Q4, according to Proofpoint.

article thumbnail

Lessons Learned from a Hard-Hitting Security Review

Dark Reading

Information security is a corporate posture and must be managed at all levels: systems, software, personnel, and all the key processes.

article thumbnail

Unpatched Apple macOS Hole Exposes Safari Browsing History

Threatpost

There are no permission dialogues for apps in certain folders for macOS Mojave, which allows a malicious app to spy on browsing histories.

article thumbnail

1 in 3 Americans Suffered Severe Online Harassment in 2018

WIRED Threat Level

And roughly 80 percent of Americans say tech companies should do more to prevent it, according to a new survey from the Anti-Defamation League.

IT 67
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Top 10 reasons to take a look at OpenText TeamSite

OpenText Information Management

Whether you’re a long-time OpenText™ TeamSite™ user, or you’re just learning about it, here are 10 compelling reasons why marketers love TeamSite and why it’s time to take a closer look at it for your next Content Management System (CMS) solution. 1. Experience Studio TeamSite’s user interface, Experience Studio, provides a visual, drag-and-drop approach to … The post Top 10 reasons to take a look at OpenText TeamSite appeared first on OpenText Blogs.

CMS 59
article thumbnail

My Love for What I Do: eDiscovery Love Story

eDiscovery Daily

It’s Valentine’s Day! I hope you all have a special someone with which you can share Valentine’s Day. As you can guess from the picture for this post, I do! Regardless of that, I hope you all love what you do as much as I do. Most people know me because of the blog, and you have to love eDiscovery to write about it every day. I’ve always been a writer in my career, even when I started as a “Big 8” consultant years ago with Price Waterhouse (years before they became PwC).

article thumbnail

5 Expert Tips for Complying with the New PCI Software Security Framework

Dark Reading

The Secure SLC Standard improves business efficiency for payment application vendors but could also stand as new security benchmark for other industries to follow.

article thumbnail

Show SAP Content Some Love This Valentine's Day

Gimmal

This Valentine's Day, take some time to remember one of the most neglected types of content: documents that support ERP transactions. This content is mission-critical and frequently sensitive, but many times organizations are not able to give it the attention it craves and deserves. There are a couple avenues companies can pursue when considering an enterprise content management (ECM) strategy for content tied to SAP processes.

ECM 58
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Podcast: DevSecOps

Adam Shostack

I did a podcast with Mark Miller over at DevSecOps days. It was a fun conversation, and you can have a listen at “ Anticipating Failure through Threat Modeling w/ Adam Shostack.

IT 58
article thumbnail

Avoid Compliance Nightmares and Clean Your Dark Data: Join the Webinar

Everteam

35% of organizations believe the volume of information and data coming into their organizations will grow more than 5-fold in just the next two years; on average, organizations believe the volume of information will grow by 317%. – AIIM Industry Watch: Automating Compliance and Governance. We talk about dark data all the time. That’s because every organization has it – content and data hidden across organizational silos.

article thumbnail

Ex-US Intel Officer Charged with Helping Iran Target Her Former Colleagues

Dark Reading

Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers.