Thu.May 02, 2019

article thumbnail

Party Like Every Day Is World Password Day

Data Breach Today

Cause for Celebration: Microsoft Stops Recommending Periodic Password Changes Every day needs to be password security day - attackers certainly aren't dormant the other 364 days of the year. But as World Password Day rolls around again, there's cause for celebration as Microsoft finally stops recommending periodic password changes.

Passwords 205
article thumbnail

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

Small and midsize businesses — so-called SMBs — face an acute risk of sustaining a crippling cyberattack. This appears to be even more true today than it was when I began writing about business cyber risks at USA TODAY more than a decade ago. Related: ‘Malvertising’ threat explained However, one small positive step is that company decision makers today, at least, don’t have their heads in the sand.

Risk 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DHS: Federal Agencies Need to Patch Vulnerabilities Faster

Data Breach Today

Directive: 'Critical' Vulnerabilities Must Be Patched Within 15 Days The U.S. Department of Homeland Security is requiring that federal agencies speed up patching and remediating "critical" and "high" software vulnerabilities. Security experts say this change is long overdue. But does it go far enough?

Security 196
article thumbnail

GUEST ESSAY: Six risks tied to social media marketing that all businesses should heed

The Last Watchdog

While the internet and social media have been very positive for businesses, there remains an inherent risk when it comes to how brands manage their Facebook, Twitter, and Instagram accounts. Related: Defusing weaponized documents While social media on every platform has benefits, there remains risks that must be addressed so as to keep your companies’ image and data safe.

Risk 115
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Aussie Security Researcher Avoids Prison Over Hacking

Data Breach Today

Nik Cubrilovic Must Pay GoGet, Do Community Service An Australian security researcher who pleaded guilty to several charges related to probing the network of popular car-sharing service GoGet has avoided jail time. Nik Cubrilovic was sentenced to 400 hours of community service and must pay restitution to GoGet.

Security 196

More Trending

article thumbnail

WikiLeaks' Assange Signals He'll Fight Extradition to US

Data Breach Today

Fight Over Extradition Could Continue for Months WikiLeaks founder Julian Assange returned to court on Thursday and told a British judge that he would not voluntarily accept extradition to the U.S. to face a charge of helping to hack into a Pentagon computer, setting up a legal fight that could take months.

193
193
article thumbnail

A ‘Cyber Event’ disrupted power grid operations in three US states

Security Affairs

The Department of Energy confirmed that in March a cyber event disrupted power grid operations in California, Wyoming, and Utah. The Department of Energy confirmed that on March 2019, between 9 a.m. and 7 p.m., a cyber event disrupted energy grid operations in California, Wyoming, and Utah. The news was first reported by E&E News, a “cyber event” interrupted grid operations in parts of the western United States in March, according to a report posted by the Department of Energy.

article thumbnail

Alerts: Vulnerability in Philips Records System

Data Breach Today

Warnings Point to Cross-Site Scripting Vulnerability Federal regulators and medical device maker Philips have issued alerts about a security vulnerability in the company's Tasy electronic medical records system that could put patient data at risk. How common is this type of vulnerability?

Risk 174
article thumbnail

Why Isn't GDPR Being Enforced?

Schneier on Security

Politico has a long article making the case that the lead GDPR regulator, Ireland, has too cozy a relationship with Silicon Valley tech companies to effectively regulate their privacy practices. Despite its vows to beef up its threadbare regulatory apparatus, Ireland has a long history of catering to the very companies it is supposed to oversee, having wooed top Silicon Valley firms to the Emerald Isle with promises of low taxes, open access to top officials, and help securing funds to build gli

GDPR 92
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Malware: The Evolution of Exploits and Defenses

Data Breach Today

The good news is: The development of new malware exploits has slowed considerably. The bad news is: That's because the old ones still continue to work so effectively. Adam Kujawa of Malwarebytes Labs talks about the evolution of ransomware and other successful exploits.

article thumbnail

Industry Guide to Manufacturing: Four trends for the Intelligent and Connected manufacturer

OpenText Information Management

While the manufacturing sector has continued to grow steadily over the last decade, the forecast from the US National Association of Manufacturers is for growth in the US to slow in 2019 due to skills shortages and the high cost of raw materials. In addition, manufacturing capacity utilization remains quite low – still below 2008 … The post Industry Guide to Manufacturing: Four trends for the Intelligent and Connected manufacturer appeared first on OpenText Blogs.

article thumbnail

How to Hack Dell computers exploiting a flaw in pre-installed Dell SupportAssist

Security Affairs

A flaw in Dell SupportAssist, a pre-installed tool on most Dell computers, could be exploited by hackers to compromise them remotely. The security researcher Bill Demirkapi (17) has discovered a critical remote code execution vulnerability in the Dell SupportAssist utility that is pre-installed on most Dell computers. The vulnerability could be exploited by hackers to compromise systems remotely.

Access 87
article thumbnail

More than half of schools not compliant with the GDPR

IT Governance

Almost one year on from the introduction of new data protection laws, more than half of UK schools and colleges reveal they are not fully compliant. In a recent survey from edtech giant RM Learning and Trend Micro , 14% of respondents also admitted to not having a clear plan to become compliant with the GDPR (General Data Protection Regulation). On the plus side, over 80% said that they had taken steps towards becoming compliant, mostly in the form of updating policies, training staff, appointin

GDPR 83
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Security Depends on Careful Design

Dark Reading

Deploying focused edge protection on-site extends security beyond the network level to shield millions of previously exposed devices, apps, and control systems.

article thumbnail

Washington State Comprehensive Privacy Bill Loses Steam, Data Breach Law Amendment Heads to Governor’s Desk

Data Matters

As the legislative session drew to a close, what once seemed like an inevitability suddenly looked unlikely. The Washington Privacy Act, SB 5376/HB1854, failed to make its way through the legislative process. The Bill’s sponsor, Sen. Reuven Carlyle, called the game on April 17, tweeting that despite the “unprecedented 46-1 vote” in the Senate, “[u]nfortunately, House failed to pass privacy legislation this year.

article thumbnail

10KBLAZE exploits could affect 9 out of 10 SAP installs of more than 50k customers

Security Affairs

The availability of 10KBLAZE PoC exploits for old SAP configuration issue poses a severe risk of attacks for business applications. The risk of cyber attacks against SAP systems is increased after security researchers released PoC exploits for old SAP configuration flaws. SAP Message Server and SAP Gateway implements an access control list (ACL) mechanism to determine IP addresses that are allowed to register application servers.

Risk 74
article thumbnail

Facebook, Instagram Are Phishers' Favorite Social Platforms

Dark Reading

Cloud companies continue to represent the most phishing URLs, but social media saw the most growth in Q1 2019.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Tenable experts found 15 flaws in wireless presentation systems

Security Affairs

Experts at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, including flaws that can be exploited to remotely hack devices. Wireless presentation systems are used to display content on a screen or through several devices, including mobile devices and laptops. These systems are widely used in enterprises and educational organizations.

article thumbnail

World Password Day or Groundhog Day?

Dark Reading

Despite decades trying to fortify our passwords with bolt-on solutions, attackers have always found ways to defeat them. Here are four reasons why.

article thumbnail

UK businesses are reporting fewer data breaches, but is this as positive as it sounds?

IT Governance

A third of businesses and a fifth of charities were hit by a cyber attack or data breach in the past year, the UK government’s Cyber Security Breaches Survey 2019 has found. This is a marked improvement on the previous two years, in which 43% (2018) and 46% (2017) of businesses were breached, but it doesn’t tell the full story of the UK’s threat landscape.

article thumbnail

Russian national Anton Bogdanov indicted for $1.5M cyber tax fraud scheme

Security Affairs

The US DoJ indicted a Russian national for obtaining over $1.5 million in fraudulent tax refunds from the Internal Revenue Service. The US DoJ indicted the Russian national Anton Bogdanov for obtaining over $1.5 million in fraudulent tax refunds from the Internal Revenue Service. Bogdanov was charged in federal court in Brooklyn of wire fraud conspiracy, aggravated identity theft and computer intrusion in connection with a scheme in which he and other crooks used stolen personal information to f

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

D-Link Cloud Camera Flaw Gives Hackers Access to Video Stream

Threatpost

Researchers warn customers to reconsider the use of the camera’s remote access feature if the device is monitoring highly sensitive areas of their household or company.

Access 70
article thumbnail

Ladders Database Exposed 13M User Records

Security Affairs

Employment-recruitment site Ladders exposed 13M User Records. Employment-recruitment site Ladders exposed left online a misconfigured AWS-hosted database that contained 13 million user records. Sanyam Jain, a security researcher and a member of the GDI Foundation , discovered a database belonging to the employment-recruitment site Ladders left exposed online on a misconfigured AWS-hosted database.

article thumbnail

Why Are We Still Celebrating World Password Day?

Dark Reading

Calls to eliminate the password abound on this World Password Day - and the technology to change is ready. So why can't we get off our password habit?

article thumbnail

Chinese telecoms supplier Huawei banned from providing ‘core’ parts of the UK’s 5G network

IT Governance

Huawei has signed 40 commercial 5G contracts with carriers across the globe , but Japan and the US have refused its products and services for government use, and Australia has banned Huawei products altogether. Several other countries are considering bans or restrictions, and BT and Verizon are among the high-profile businesses that have refused to work with the telecoms provider.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New Exploits For Old Configuration Issues Heighten Risk for SAP Customers

Dark Reading

Exploits give attackers a way to create havoc in business-critical SAP ERP, CRM, SCM, and other environments, Onapsis says.

Risk 79
article thumbnail

Weekly Update 137

Troy Hunt

It's the last one from home for a few weeks, both for Scott and myself. Whilst I head off to the US for a couple of weeks, he's back home to the UK before other Europe travel then we'll both end up back on the Gold Coast in a few weeks time before the AusCERT conference. This week, we're talking about how kids are so good at circumventing things like parental controls and how maybe - just maybe - talking to your goods and using some social techniques is a better (or at least complimentary) appro

article thumbnail

Security Doesn't Trust IT - and IT Doesn't Trust Security

Dark Reading

How a rocky relationship between IT operations and cybersecurity teams can compound security risks.

IT 82