Wed.May 22, 2019

article thumbnail

Legal Threats Make Powerful Phishing Lures

Krebs on Security

Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the recipient that he/she is being sued, and instruct them to review the attached file and respond within a few days — or else. Here’s a look at a recent spam campaign that peppered more than 100,000 business email addresses with fake legal threats harboring malware.

Phishing 277
article thumbnail

Google Stored Unhashed G Suite Passwords for Years

Data Breach Today

Passwords Remained Encrypted for Enterprise Users Google is notifying administrators and users of its business-oriented G Suite product that the company had been storing unhashed passwords for years because of a flaw in the platform. The company believes no customer data was leaked and that all passwords remained encrypted.

Passwords 251
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Dear America, Facebook is an addictive digital drug of little productive value

The Last Watchdog

Social media consumers are getting wise to the joke that when the product is free, they’re the ones being sold. But despite the growing threat of consumer exploitation, Washington still shrinks from confronting our social media giants. Why? Because the social giants have convinced the chattering class that America simply can’t do without them. Confront the industry, we’re told, and you might accidentally kill it ?

article thumbnail

Misconfigured IT (Again) Leads to Big Health Data Breach

Data Breach Today

Did Company Also Bungle Notification for Some Victims Impacted? A misconfigured IT setting has landed a Puerto Rico-based clearinghouse and cloud software services vendor at the top of federal regulators' list of largest health data breaches so far this year. Why do these types of mistakes keep happening?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The UPDATED Certified Information Professional (CIP) Exam - Answers to All of your Questions

AIIM

Good news - we’ve updated Certified Information Professional (CIP) exam! For the last six months, a group of very experienced subject matter experts has been revising the CIP exam, program, and training. With any change comes questions, so I thought I would take some time to answer some of the ones I’m sure you’re asking. Why did you update the CIP?

ECM 84

More Trending

article thumbnail

Fingerprinting iPhones

Schneier on Security

This clever attack allows someone to uniquely identify a phone when you visit a website, based on data from the accelerometer, gyroscope, and magnetometer sensors. We have developed a new type of fingerprinting attack, the calibration fingerprinting attack. Our attack uses data gathered from the accelerometer, gyroscope and magnetometer sensors found in smartphones to construct a globally unique fingerprint.

Paper 100
article thumbnail

Increase Detection & Effectiveness to Targeted Attacks

Data Breach Today

Proactive Malware Intelligence & Increasing ROI of SIEM & SOAR Deployments With today's challenges from an increasingly hostile threat landscape, combined with a lack of people, expertise, and budget, organizations are driving toward optimizing their SIEM and SOAR solutions in order to get the highest return their investment. Of the greatest areas of unmet need with SIEM and SOAR solutions, obtaining the right file-level intelligence with actionable rich context, and building effective levels of

155
155
article thumbnail

What You Need to Know About Zero Trust Security

Dark Reading

The zero trust model might be the answer to a world in which perimeters are made to be breached. Is it right for your organization?

Security 105
article thumbnail

Verizon DBIR: C-Level Executives in the Crosshairs

Data Breach Today

C-level executives are 12 times more likely to be the target of social incidents and nine times more likely to be the target of social breaches. This is among the key findings of the latest Verizon's Data Breach Investigations Report. Author John Grim shares insight.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Accelerate your Journey to AI with a Hyper Converged Data and Analytics Platform

IBM Big Data Hub

IBM Cloud Pak for Data System is an integrated end-to-end platform that is cloud native by design, architected as microservices and containerized workloads. It offers instant pre-assembled provisioning and has capabilities to collect, organize and analyze data. It takes the IBM Cloud Pak for Data experience further by providing a modular approach to compute, network and storage on standard hardware, leveraging a building block approach under unified management.

article thumbnail

Proactive Malware Intelligence & Increasing ROI of SIEM & SOAR Deployments

Data Breach Today

With today's challenges from an increasingly hostile threat landscape, combined with a lack of people, expertise, and budget, organizations are driving toward optimizing their SIEM and SOAR solutions in order to get the highest return their investment. Of the greatest areas of unmet need with SIEM and SOAR solutions, obtaining the right file-level intelligence with actionable rich context, and building effective levels of automation are both needed to increase detection and response effectivenes

142
142
article thumbnail

3 GDPR compliance tips for small businesses

IT Governance

This week marks one year since the GDPR (General Data Protection Regulation) took effect, and although we’ve seen organisations take huge strides in their commitment to information security, many are still struggling to implement the necessary measures. Small businesses have faced this biggest challenge, partly because they lack the resources to overhaul their processes and invest in compliance solutions.

GDPR 85
article thumbnail

Visiting the NSA

Schneier on Security

Yesterday, I visited the NSA. It was Cyber Command's birthday, but that's not why I was there. I visited as part of the Berklett Cybersecurity Project, run out of the Berkman Klein Center and funded by the Hewlett Foundation. (BERKman hewLETT -- get it? We have a web page , but it's badly out of date.). It was a full day of meetings, all unclassified but under the Chatham House Rule.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Google Stored G Suite Passwords in Plaintext Since 2005

Threatpost

Google said it had stored G Suite enterprise users' passwords in plain text since 2005 marking a giant security faux pas.

article thumbnail

Consumer IoT Devices Are Compromising Enterprise Networks

Dark Reading

While IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks.

IoT 91
article thumbnail

G Suite users’ passwords stored in plain-text for more than 14 years

Security Affairs

Google accidentally stored the passwords of its G Suite users in plain-text for 14 years allowing its employees to access them. The news is disconcerting, Google has accidentally stored the passwords of the G Suite users in plain-text for 14 years, this means that every employee in the company was able to access them. According to the tech giant, the incident was caused by a bug in the password recovery mechanism and only business users were affected. “However, we recently notified a subse

article thumbnail

The 3 Cybersecurity Rules of Trust

Dark Reading

Every day, keeping anything secure requires being smart about trust. The rules of trust will keep you and your data safer.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Exploring the DevOps model through gamification

CGI

Exploring the DevOps model through gamification. pooja.cs@cgi.com. Wed, 05/22/2019 - 17:30. Does it seem like your operating methods should be made more efficient? Maybe the DevOps model can help. With agile methods going mainstream?along with technological enablers like cloud, virtualization, containerization, integrated toolchains and service automation taking hold?

Sales 75
article thumbnail

A Considerable Insight into your Data | Capture, Organize, Store and Deliver rich media assets with everteam.iNSight

Everteam

In the age of Big Data , capturing , organizing and analyzing all your data is nearly impossible if you are counting on traditional methods. Without having a solution to structure and benefit from this data, you’ll find yourself with mountains of data that you can’t tell what to do with but also are afraid of getting rid of. The size of Data might be an issue but the biggest challenge is the multiple data streams coming from online sources and social media, bringing rich media assets such as ima

article thumbnail

Facial Recognition Has Already Reached Its Breaking Point

WIRED Threat Level

Facial recognition technology has proliferated unchecked in the US so far. Congress finally seems ready to do something about it.

IT 86
article thumbnail

Emsisoft released a free Decrypter for the GetCrypt ransomware

Security Affairs

For the second time in a few days, experts at Emsisoft released a free decrypter , this time to help victims of the GetCrypt ransomware. Security experts at Emsisoft released a new decrypted in a few days, it could be used for free by victims of the GetCrypt ransomware to decrypt their files encrypted by the malware. The GetCrypt ransomware is served through the RIG exploit kit , it leveragesSalsa20 and RSA-4096 to encrypt the victims’ files. “ GetCrypt is a ransomware spread by th

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

European Businesses Signal ‘Growing Security Gap’ Amid Mass Digital Transformation

Thales Cloud Protection & Licensing

As false predictions of digital transformation fade into the past, we are hurtling into a new era of business. In a global and unprecedented shift, digital transformation is driving a wave of benefits as part of this new digital-first business environment – from greater efficiencies to building better customer experiences and relationships. For Europe, the story is no different.

article thumbnail

New Online Course For Local Governments

The Texas Record

SLRM is excited to announce the relaunch of our Introduction to Records Management Course for local governments! You may remember a previous iteration of the IRM course available on our training page. Based on feedback from users, we’ve updated it to better reflect our in-person trainings. For the uninitiated, the IRM course is a self-paced multi-subject class that covers the fundamentals of records management.

article thumbnail

Securely conducting exams on iPad with GeoGebra and Jamf

Jamf

In the conclusion of our three-part blog series, we highlight how the Sewanhaka Central High School District has taken on testing and given students a better avenue to showcase their learnings.

article thumbnail

Alphabet's Chronicle Explores Code-Signing Abuse in the Wild

Dark Reading

A new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Facial recognition tech prevents crime, police tell UK privacy case

The Guardian Data Protection

South Wales force defends use of technology after office worker claims rights breach Facial recognition cameras prevent crime, protect the public and do not breach the privacy of innocent people whose images are captured, a police force has argued. Ed Bridges, an office worker from Cardiff, claims South Wales police violated his privacy and data protection rights by using facial recognition technology on him.

Privacy 64
article thumbnail

WannaCry-Infested Laptop Starts at $1.13M in Art Auction

Threatpost

The "bestiary" houses six historical threats that combined resulted in at least $95B in damages worldwide.

84
article thumbnail

Digital healthcare: Improving outcomes through cloud-based insight

DXC Technology

by Mutaz Shegewi Digital transformation in healthcare can no longer be ignored when seeking to improve outcomes. The convergence of “3rd Platform” technologies (big data and analytics, cloud, mobility and social) with innovation accelerators, such as artificial intelligence and the internet of things, continues to impact the industry landscape daily and bring new opportunities and […].

Cloud 59