Thu.Feb 07, 2019

article thumbnail

Stress Test: Police Visit Webstresser Stresser/Booter Users

Data Breach Today

Seized Customer Data Appears to Be Powering Ongoing Dutch and UK Probes Hundreds of suspected customers of Webstresser, a DDoS stresser/booter site that was disrupted last year, are being visited by law enforcement agents and may see jail time. The police message: Using darknet cybercrime services doesn't guarantee anonymity, even if you pay with bitcoin.

185
185
article thumbnail

Expert publicly disclosed the existence of 0day flaw in macOS Mojave

Security Affairs

A zero-day vulnerability in macOS Mojave can be exploited by malware to steal plaintext passwords from the Keychain. The security expert Linus Henze has disclosed the existence of a zero-day vulnerability in macOS Mojave that can be exploited by malware to steal plaintext passwords from the Keychain. According to Henze, the flaw affects macOS Mojave and earlier versions.

Passwords 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

German Antitrust Office Restricts Facebook Data Processing

Data Breach Today

Facebook Must Obtain Consent to Combine User Data From Different Sources Germany's competition authority, the Bundeskartellamt, has prohibited Facebook from combining user data from different sources unless users consent, and it has also prohibited Facebook from blocking users who do not provide this consent. Facebook has one month to appeal the antitrust decision.

IT 182
article thumbnail

AIIM19 session preview - Content Analytics & ECM Implementation across the Enterprise with John Daly

AIIM

AIIM19 is coming soon to San Diego on March 26-28 and as usual the gathering will be the place to be for information management professionals. If you plan on attending you should mark your calendar for an important roundtable session called “When You Are in the Storm: Content Analytics & ECM Implementation Across the Enterprise” being hosted by John Daly, Information Governance Manager the Metropolitan Sewer District in St.

ECM 80
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

EHR Vendor Greenway Gets Hefty Fine for False Claims

Data Breach Today

Concerns Raised About Potential Impact on Patient Safety For the second time, the Department of Justice has imposed a substantial fine on an electronic health records software vendor in a case that involves data accuracy and integrity issues that could affect patient safety.

177
177

More Trending

article thumbnail

Ursnif: Long Live the Steganography and AtomBombing!

Security Affairs

Yoroi ZLab – Cybaze uncovered a new wave of Ursnif attacks using a variant that implements an exotic process injection technique called AtomBombing. Another wave of Ursnif attacks hits Italy. Ursnif is one of the most active banking trojans. It is also known as GOZI, in fact, it is a fork of the original Gozi-ISFB banking Trojan that got its source code leaked in 2014 updating and evolving Gozi features over the years.

article thumbnail

Ransomware Attack Via MSP Locks Customers Out of Systems

Dark Reading

Vulnerable plugin for a remote management tool gave attackers a way to encrypt systems belonging to all customers of a US-based MSP.

article thumbnail

Analyst’s view: OpenText named a leader

OpenText Information Management

OpenText™ is thrilled to be recognized by Gartner as a Leader in the 2018 Magic Quadrant for Web Content Management. In its annual review, Gartner evaluated 18 web content management vendors on objective criteria supported by customer references. The report ensures “decision makers keen to deliver effective digital experiences will be better placed to identify … The post Analyst’s view: OpenText named a leader appeared first on OpenText Blogs.

article thumbnail

ThreatList: Latest DDoS Trends by the Numbers

Threatpost

Trends in DDoS attacks show a evolution beyond Mirai code and point to next-gen botnets that are better hidden and have a greater level of persistence on devices – making them "far more dangerous.".

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A third of companies are largely unprepared for cybersecurity attacks: eSecurity Planet Survey

eSecurity Planet

A third of companies are unprepared for some of the most damaging cyber attacks, such as APTs, insider threats, ransomware and DDoS attacks.

article thumbnail

Moving toward an open future of data and AI

IBM Big Data Hub

A faster journey to AI for the enterprise? What’s the secret? In this interview with Dinesh Nirmal, IBM vice president of analytics development, he shares the highlights of his upcoming Think session: “Modernizing Your Data Estates for an AI and Multicloud World.” On Wednesday, 13 February, he and David Bernert from The Boeing Company will discuss advancements in data that will give enterprises the edge.

article thumbnail

China's AI Strategy and its Security Implications

Schneier on Security

Gregory C. Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China's AI strategy, commercial, government, and military. There are numerous security -- and national security -- implications.

article thumbnail

Senators Grill Facebook, Google, and Apple Over Invasive Apps

WIRED Threat Level

Lawmakers want more information about Facebook’s Project Atlas program, which collected data from teens and sidestepped device makers’ privacy policies.

Privacy 79
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Weekly podcast: Metro Bank, Student Loans Company, GDPR breaches and seals

IT Governance

This week, we discuss the compromise of Metro Bank’s two-factor authentication system, nearly one million cyber attacks on the Student Loans Company, nearly 60,000 GDPR breaches and a surprising discovery for some marine biologists. Hello, and welcome to the IT Governance podcast for Thursday, 7 February 2019 – and thanks to Paula for stepping in last week while I was away.

GDPR 72
article thumbnail

Brexit and the UK Automotive Industry: Understanding the impact

OpenText Information Management

Uncertainty around the final Brexit deal between the UK and the EU still remains. This is particularly true for the automotive industry where OEMs such as Ford, Honda and Renault-Nissan have all publicly raised their concerns. To find out what was happening within the industry, and the trading options available to automotive companies, OpenText™ and … The post Brexit and the UK Automotive Industry: Understanding the impact appeared first on OpenText Blogs.

70
article thumbnail

Security Bugs in Video Chat Tools Enable Remote Attackers

Dark Reading

Lifesize is issuing a hotfix to address vulnerabilities in its enterprise collaboration devices, which could give hackers a gateway into target organizations.

article thumbnail

Small Breaches Can Make Big News: How to Protect Your Organization

Adam Levin

A recent leak compromised the personal data of all 4,557 active students at the California State Polytechnic University Science School. This was not a case of hackers gaining access through illicit means or an accidental exposure of an unsecured database. The data was inadvertently sent in a spreadsheet as an email attachment by a university employee.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

US Law Enforcement Busts Romanian Online Crime Operation

Dark Reading

Twelve members of 20-person group extradited to US to face charges related to theft of millions via fake ads other scams.

76
article thumbnail

Flaw in Multiple Airline Systems Exposes Passenger Data

Threatpost

Up to eight airlines do not encrypt e-ticketing booking systems - leaving personal customer data open for the taking.

article thumbnail

Master the Latest Exploits and Security Vulnerabilities at Black Hat Asia

Dark Reading

In cybersecurity it pays to stay on top of the latest exploits, and there's no better place to do that than Black Hat Asia in Singapore next month.

article thumbnail

Jamf ranks #4 on Okta’s Fastest Growing Apps List

Jamf

Humbled to once again be ranked on Okta's annual Businesses @ Work 2019 Report. Read this for more details.

66
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

When 911 Goes Down: Why Voice Network Security Must Be a Priority

Dark Reading

When there's a DDoS attack against your voice network, are you ready to fight against it?

article thumbnail

Go Update iOS Right Now To Fix That Very Bad FaceTime Bug

WIRED Threat Level

Apple has just released iOS 12.1.4, which fixes a group chat FaceTime bug that let callers eavesdrop on targets.

article thumbnail

DDoS Mitigation Pioneer Launches Network Security Startup

Dark Reading

Barrett Lyon is co-founder of Netography, which emerged today with $2.6M in seed funding from Andreessen Horowitz.

article thumbnail

Google's Making It Easier to Encrypt Even Cheap Android Phones

WIRED Threat Level

Adiantum will help millions of low-end Android smartphones receive the same encryption protections as flagships.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Carbonite Announces Webroot Purchase

Dark Reading

The purchase will add WebRoot's cloud-based security to the cloud-based data backup and recovery platform of Carbonite.

Cloud 65
article thumbnail

Preservica and History Associates partner to provide a one-stop solution for planning, implementing and sustaining a long-term digital archive program

Preservica

Boston, MA and Rockville, MD – Feb 7, 2019 – Digital preservation market leaders, Preservica, and History Associates, a leading consulting firm that specializes in the management and use of historical and information resources, have announced an exciting new partnership. This joint venture provides organizations with a world-class, one-stop solution for planning, implementing and, sustaining a long-term digital archive program.

article thumbnail

UK: Liability Limits for GDPR in commercial contracts – the law and recent trends

DLA Piper Privacy Matters

Given the potential financial exposure under GDPR, it is no surprise that a great deal of time is being spent working out how to allocate the risk and liability when negotiating commercial contracts. Here is our take on the underlying law and the recent trends. Obligations – the source of liability. Before we look at limiting liability, we need to first consider how liability can arise in the first place in the context of GDPR.

GDPR 49