Tue.May 21, 2019

article thumbnail

Database May Have Exposed Instagram Data for 49 Million

Data Breach Today

Email Addresses, Phone Numbers Potentially Exposed There's been a potential leak of personally identifiable information from Instagram, but it's not clear yet whether the data on 49 million users came directly from the social media company. A database that was left online without password protection has since been taken down.

Passwords 243
article thumbnail

Google Has Stored Some Passwords in Plaintext Since 2005

WIRED Threat Level

On the heels of embarrassing disclosures from Facebook and Twitter, Google reveals its own password bugsā€”one of which lasted 14 years.

Passwords 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is Healthcare Sector Better Prepared for Ransomware Attacks?

Data Breach Today

Several Organizations Have Avoided Paying Ransoms, Thanks to Backup Plans Several recently reported breaches involving ransomware attacks in which organizations recovered without paying a ransom to extortionists offer a glimmer of hope that healthcare entities are getting better prepared to deal with such incidents.

article thumbnail

Open the Gates for Next-Gen Loyalty

Reltio

Ankur Gupta, Sr. Product Marketing Manager, Reltio. I was in Boston last week. Coincidently, Martha had dropped a mail and wanted to talk. So I decided to take the opportunity and meet her. Martha earlier worked with one of our customers and had recently moved to another company as VP – Customer Innovation and Experience. She was delighted that we could meet in person and suggested an early morning breakfast meet.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Database May Have Exposed Instagram Personal Data

Data Breach Today

Email Addresses, Phone Numbers for 49 Million People Potentially Exposed There's been a potential leak of personally identifiable information from Instagram, but it's not clear yet whether the data on 49 million users came directly from the social media company. A database that was left online without password protection has since been taken down.

More Trending

article thumbnail

MuddyWater APT Group Upgrades Tactics to Avoid Detection

Data Breach Today

Researchers: New 'BlackWater' Campaign Shows Changes in Tactics, Techniques, Procedures MuddyWater, an advanced persistent threat group that has targeted organizations in the Middle East, has changed some of its tactics to better avoid detection as it continues to plant backdoors within targeted networks, according to new research from Cisco Talos.

IT 184
article thumbnail

Emsisoft released a free Decrypter for JSWorm 2.0

Security Affairs

Good news for the victims of the JSWorm 2.0 ransomware, thanks to experts at Emsisoft they can decrypt their file for free. Experts at Emsisoft malware research team released a decrypter for a recently discovered ransomware tracked as JSWorm 2.0. JSWorm 2.0 is written in C++ and implements Blowfish encryption. The first version of the malware was written in C# and used the ā€œ.JSWORMā€ extension.

article thumbnail

How does API Management Complement IAM?

Data Breach Today

Flat-out, traditional IAM practices are insufficient to secure a modern enterprise that relies on such diverse endpoints and connected devices. But API management can play a strong complementary role, says Jay Thorne of CA Technologies, a Broadcom company.

Security 149
article thumbnail

How Technology and Politics Are Changing Spycraft

Schneier on Security

Interesting article about how traditional nation-based spycraft is changing. Basically, the Internet makes it increasingly possible to generate a good cover story; cell phone and other electronic surveillance techniques make tracking people easier; and machine learning will make all of this automatic. Meanwhile, Western countries have new laws and norms that put them at a disadvantage over other countries.

IT 82
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. Itā€™s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Satan Ransomware Adds More Evil Tricks

Dark Reading

The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully.

article thumbnail

Dutch Supervisory Authority Opines on Use of Cookie Walls

Data Matters

Recently, the Dutch Supervisory Authority (the ā€œ Autoriteit Persoonsgegevens ā€ or ā€œ Dutch SA ā€) has taken the position that the use of so-called ā€œcookie walls,ā€ whereby website access is made conditional upon the provision of consent to tracking cookies, is not compliant with the EU General Data Protection Regulation (ā€œ GDPR ā€). Since the entry into application of the GDPR, many websites accessible from the EU have implemented mechanisms (including cookie banners) allowing users to consent to th

GDPR 68
article thumbnail

Old Threats Are New Again

Dark Reading

They may look familiar to you, and that isn't a coincidence. New threats are often just small twists on old ones.

100
100
article thumbnail

Top 7 characteristics of a modern data architecture

IBM Big Data Hub

A modern data architecture (MDA) must support the next generation cognitive enterprise which is characterized by the ability to fully exploit data using exponential technologies like pervasive artificial intelligence (AI) , automation, Internet of Things (IoT) and blockchain.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented ā€“ threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Group-IB blocked more than 180,000 links to pirated copies of Game of Thrones

Security Affairs

Since April 2019, Group-IB has successfully blocked more than 43,000 links to pirated copies of the Game of Thrones Season 8 on pirate websites, forums, and social media. As the Game of Thrones saga came to a close (no spoilers here), Group-IB has summed up the results of its anti-piracy campaign during Season 8 of the Game of Thrones ā€“ one of the biggest franchises in the TV history.

article thumbnail

Building the Bridge Between Strategy and Governance Aboard the IT Enterprise ā€“ An Interview with Kevin Gray, CIO for the City of Burbank

Information Governance Perspectives

Building a Bridge Between Strategy and Governance Aboard the IT Enterprise ā€“ An Interview with Kevin Gray, CIO of the City of Burbank Eleventh in a series of in-depth interviews with innovators and leaders in the fields of Risk, Compliance and Information Governance across the globe. Kevin Gray is the Chief Information Officer for the […].

article thumbnail

After latest Microsoft Windows updates some PCs running Sophos AV not boot

Security Affairs

Sophos is warning users of potential problems with the recent Microsoft’s Patch Tuesday updates and is saying to roll back it if they want the PC to boot. The security firm has informed its customers of potential problems with the latest Microsoft’s Patch Tuesday updates and is asking them to uninstall the patch if they want the machine to boot.

article thumbnail

How to Scale the AI ladder: Watch these enterprises

IBM Big Data Hub

There is no AI without data. Thatā€™s why weā€™ve put together a prescriptive set of five steps we call the ladder to AI to help our enterprise clients get their data ready. The journey of the AI ladder starts with collecting the data you need to build models, followed by organizing your data so you can find and safeguard it. The next two steps in the ladder are analyzing your data to better understand their business and know where to apply AI -- and finally, infusing AI inside of your processes wit

Cloud 73
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Avoiding cyber attacks while on the road to digital transformation

DXC Technology

No matter where your organization may be on its digital transformation journey, beware the dangers lurking along the way. Fellow travelers down this road have been waylaid time and again by cybercriminals wreaking havoc through ransomware, distributed denial of service attacks, data breaches and other types of attacks. Digitizing more core business processes, after all, […].

article thumbnail

How education technology drives equal learning in special education curriculum

Jamf

Sewanhaka Central High School District is doing incredible things with their iPad program. In part two of our three-part blog series, we examine iPad’s role in special education curriculum.

article thumbnail

Tres formas de impulsar una carrera IT y otras tres de hundirla

DXC Technology

Vamos a hacer el post del vaso medio vaciĆ³, o medio lleno, y sugerir tres maneras de avanzar en la carrera IT, junto a otras tres formas de estrellarse. Comencemos por lo bueno; el especialista en CIOs, Paul Heltzel, ha proporcionado una lista de 15 cosas que los profesionales de IT deben hacer, para ir […].

IT 67
article thumbnail

From capture to archiving, OpenText Content Services will be everywhere at Enterprise World in Toronto

OpenText Information Management

Whether your focus is capture, content management, archiving or all of the above, the Content Services track at OpenTextā„¢ Enterprise World 2019 is where youā€™ll gain insight into this rapidly evolving sector, including the new technology advances and best practices that will help you make the most of your OpenText investment. The flagship OpenText user … The post From capture to archiving, OpenText Content Services will be everywhere at Enterprise World in Toronto appeared first on OpenText

article thumbnail

Reimagined: Building Products with Generative AI

ā€œReimagined: Building Products with Generative AIā€ is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Office worker launches UK's first police facial recognition legal action

The Guardian Data Protection

Ed Bridges, from Cardiff, says ā€˜intrusiveā€™ technology used on thousands of people An office worker who believes his image was captured by facial recognition cameras when he popped out for a sandwich in his lunch break has launched a groundbreaking legal battle against the use of the technology. Supported by the campaign group Liberty, Ed Bridges, from Cardiff, raised money through crowdfunding to launch the first major legal action, claiming the suspected use of the technology on him by South Wa

Privacy 65
article thumbnail

49 Million Instagram Influencer Records Exposed in Open Database

Dark Reading

An AWS-hosted database was configured with no username or password required for access to personal data.

article thumbnail

Millions of Golfers Land in Privacy Hazard After Cloud Misconfig

Threatpost

A database with millions of data points on games played plus sensitive information was left right in the middle of the internet fairway for all to see.

Cloud 67
article thumbnail

To Narrow the Cyber Skills Gap with Attackers, Cut the Red Tape

Dark Reading

Attackers are getting further ahead, and entrenched corporate rules shoulder much of the blame.

79
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If youā€™re considering migrating from DataStax Enterprise (DSE) to open source Apache CassandraĀ®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether youā€™re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cisco Starts Patching Firmware Bug; Millions of Devices Still Vulnerable

Threatpost

A flaw in the Secure Boot trusted hardware root-of-trust affects enterprise, military and government network gear, including routers, switches and firewalls.

article thumbnail

How AI and machine learning are improving customer experience

Information Management Resources

From data quality to personalization, to customer acquisition and retention, and beyond, AI and ML will shape the customer experience of the future.

article thumbnail

Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter

Threatpost

Enjoy the video replay of the recent Threatpost cloud security webinar, featuring a panel of experts offering best practices and ideas for managing data in a cloudified world.

Cloud 56