Mon.Jan 07, 2019

article thumbnail

Marriott Mega-Breach: Victim Count Drops to 383 Million

Data Breach Today

Hotel Giant Warns 5.3 Million Unencrypted Passport Numbers Also Stolen Marriott International's digital forensic investigation now counts not 500 million but an "upper limit" of 383 million customers affected by the four-year mega-breach of its Starwood reservations system. The hotel giant now says the breach also exposed more than 5 million unencrypted passport numbers.

IT 221
article thumbnail

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The Last Watchdog

The heyday of traditional corporate IT networks has come and gone. In 2019, and moving ahead, look for legacy IT business networks to increasingly intersect with a new class of networks dedicated to controlling the operations of a IoT-enabled services of all types, including smart buildings, IoT-enabled healthcare services and driverless cars. Related: Why the golden age of cyber espionage is upon us.

IoT 152
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Card-Not-Present Fraud Growth: No End in Sight?

Data Breach Today

Card-not-present fraud will cost retailers worldwide $130 billion between 2018 and 2023, a new report from Juniper Research predicts. Steffen Sorrell, author of the study, explains the reasons behind this growth projection and describes what can be done to improve the fight against fraud.

Retail 203
article thumbnail

Do you have a data breach response plan?

IT Governance

This blog has been updated to reflect industry updates. Originally published 6 August 2018. The EU GDPR (General Data Protection Regulation) requires organisations to respond to serious data breaches within 72 hours of detection. This places a significant burden on organisations: taking the appropriate measures to comply with the law while simultaneously dealing with the collateral impact of a breach is not a picnic!

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware Attacks: The Data Integrity Issues

Data Breach Today

Healthcare Incident Points to Possible 'Altered' Patient Data Data integrity issues can arise in the wake of a ransomware attack. Case in point: A California podiatrist practice hit by ransomware reports that patient files were possibly "altered" or "corrupted." Security specialists weigh in on what might have happened and offer prevention and detection insights.

More Trending

article thumbnail

Marriot Mega-Breach: Victim Count Drops to 383 Million

Data Breach Today

Hotel Giant Warns 5.3 Million Unencrypted Passport Numbers Also Stolen Marriott International's digital forensic investigation now counts not 500 million but an "upper limit" of 383 million customers affected by the four-year mega-breach of its Starwood reservations system. The hotel giant now says the breach also exposed more than 5 million unencrypted passport numbers.

IT 168
article thumbnail

Tens of thousands of hot tubs are exposed to hack

Security Affairs

Experts from security firm Pen Test Partners reported that tens of thousands of hot tubs are currently vulnerable to cyber attacks. Security experts at Pen Test Partners have discovered thousands of connected hot tubs vulnerable to remote cyber attacks. The hot tubs could be remotely controlled by an app, dubbed Balboa Water App, that lack of authentication mechanisms. “The mobile app connects to a Wi-Fi access point on the tub.

IoT 100
article thumbnail

Moving to a Next-Generation SOC: Critical Factors

Data Breach Today

Organizations looking to migrate to a next-generation security operations center must first carefully assess any problems they are facing with current security technology, says Vikram Mehta, associate director of information security at MakeMyTrip, an India-based online ticketing portal.

article thumbnail

FinTech banking’s nightmare frozen customer money problem

Collaboration 2.0

There’s a lot to like about modern mobile-first FinTech banks, but being locked out of your account isn’t one of them. Minimal customer service, opaque information flows and vague timelines create serious client stress levels.

98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Solve fundamental IT issues within your business

IT Governance

As a framework in your business, governing your IT effectively helps ensure your organisation’s IT infrastructure supports and enables the corporate strategies and objectives. But problems can arise that constantly affect critical functions within your IT: Your staff are constantly faced with issues that threaten your organisation’s security. Leron Zinatullin, author of The Psychology of Information Security , found that employees often struggle to comply with information security best practices

IT 95
article thumbnail

NSA will reveal its GHIDRA Reverse Engineering tool at RSA Conference

Security Affairs

The National Security Agency (NSA) will release at the next RSA Conference a free reverse engineering framework called GHIDRA. GHIDRA is a multi-platform reverse engineering framework that runs on major OSs (Windows, macOS, and Linux). The framework was first mentioned in the CIA Vault 7 dump that was leaked in 2017. WikiLeaks obtained thousands of files allegedly originating from a CIA high-security network that details CIA hacking techniques, tools, and capabilities.

IT 83
article thumbnail

New Attack Against Electrum Bitcoin Wallets

Schneier on Security

This is clever: How the attack works: Attacker added tens of malicious servers to the Electrum wallet network. Users of legitimate Electrum wallets initiate a Bitcoin transaction. If the transaction reaches one of the malicious servers, these servers reply with an error message that urges users to download a wallet app update from a malicious website (GitHub repo).

article thumbnail

Stronger DNS Security Stymies Would-Be Criminals

Dark Reading

2018 saw a reduced number of huge DNS-facilitated DDoS attacks. Vendors and service providers believe that malicious impact will drop with continued technology improvements.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why analytics pros should go to Think 2019

IBM Big Data Hub

Are you working to collect, organize, analyze or modernize your company’s data? Is your business on the ladder to AI? Then you should join us at IBM Think 2019, the event of the year for analytics pros and business leaders.

article thumbnail

ReiKey app for macOS can detect Mac Keyloggers using event taps

Security Affairs

ReiKey is a free tool that allows to scan and detect keylogger that install persistent keyboard “event taps” to intercept your keystrokes. Good news for macOS users, a new open source tool dubbed ReiKey allows them to detect Mac Keyloggers. The ReiKey app monitor systems for applications that analyzed keyboard ‘ event taps ‘ to monitor and filter input events from several points within the system intercept keystrokes.

article thumbnail

Bug Bounty Awards Climb as Software Security Improves

Dark Reading

Top reward for iOS remote exploit hits $2 million, as companies who sell exploits to national governments have to offer more money to attract researchers to tackle increasingly secure software.

article thumbnail

Australian Early Warning Network hacked and used to send fake alerts

Security Affairs

A hacker obtained an unauthorized access to the Australian Early Warning Network over the weekend and abused it to send out an alert via SMS. A hacker breached the Australian Early Warning Network over the weekend and abused it to send out an alert via SMS, landline, and email to the subscribers of the Aeeris firm that provides the service. The Early Warning Network service provides a multi-channel alert system that leads the world in capability.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Hackers Infiltrate Early Warning Network System to Send Spam

Threatpost

Just as ex-tropical Cyclone Penny moved toward the coast of Queensland, Australia, users of Early Warning Network reported receiving strange messages from the emergency system.

70
article thumbnail

A place for everything and everything in its place

OpenText Information Management

If you look at my personal desk right now, you’ll see a few piles of paper and various to-do lists. It’s logically organized by subjects such as finances, bills and household projects. My college roommate once said that I had a place for everything and everything was in its place. But when you look at … The post A place for everything and everything in its place appeared first on OpenText Blogs.

IT 69
article thumbnail

Hackers have stolen customer data from Titan Manufacturing and Distributing company for nearly one year

Security Affairs

Cyber criminals have stolen customer data from the Titan Manufacturing and Distributing company for nearly one year using a malware. Hackers hit the Titan Manufacturing and Distributing company and compromised its computer system to steal customer payment card data for an entire year. Attackers breached into the computer system at Titan Manufacturing and Distributing company to steal customer payment card data for roughly a year.

article thumbnail

unCAPTCHA AI Cracks Google reCAPTCHAs with 90% Accuracy

Threatpost

A proof-of-concept from the University of Maryland can defeat the audio challenges that are offered as an option for people with disabilities.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Threat of a Remote Cyberattack on Today's Aircraft Is Real

Dark Reading

We need more stringent controls and government action to prevent a catastrophic disaster.

article thumbnail

How the Data Science Elite helped uncover a gold mine at Experian

IBM Big Data Hub

Find out more about how the IBM Data Science Elite team helped Experian succeed at better analyzing their data at Think 2019.

article thumbnail

Akamai Streamlines Identity Management with Janrain Acquisition

Dark Reading

Akamai plans to combine Janrain's Identity Cloud with its Intelligent Platform to improve identity management.

Cloud 72
article thumbnail

Mastering the 12 Agile software development principles

Information Management Resources

We explore the 12 core principles of agile software development outlined in the Agile Manifesto to help you make sense of the sometimes esoteric text.

63
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Report: Consumers Buy New Smart Devices But Don't Trust Them

Dark Reading

The gap between acceptance and trust for new smart devices is huge, according to a new survey.

72
article thumbnail

2018 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

As we noted yesterday , eDiscovery Daily published 65 posts related to eDiscovery case decisions and activities over the past year, covering 56 unique cases ! Yesterday, we looked back at cases related to possession, custody and control, privilege disputes and form of production disputes. Today, let’s take a look back at cases related to mobile device discovery, technology assisted review, the use of sampling to settle disputes, objections to production requests, an update on an interesting di

Sales 55
article thumbnail

Snowden’s Attorney Urges Canada to Take in Whistleblower Helpers (Part Two)

Threatpost

Robert Tibbo discusses being pushed to leave Hong Kong under pressure and efforts made to the Canadian government to grant refugee status to the “Snowden refugees.”.