Tue.Dec 11, 2018

article thumbnail

Fresh Google+ Bug Exposed 52.2 Million Users' Data

Data Breach Today

Google Advances Date for Mothballing Google+ Social Network for Consumers Google says a buggy API update it pushed last month for its soon-to-be-mothballed Google+ social network exposed personal information for 52.2 million users. The data-exposure alert arrives just two months after Google admitted that a March problem with the same API exposed data for 500,000 users.

IT 220
article thumbnail

Patch Tuesday, December 2018 Edition

Krebs on Security

Adobe and Microsoft each released updates today to tackle critical security weaknesses in their software. Microsoft’s December patch batch is relatively light, addressing more than three dozen vulnerabilities in Windows and related applications. Adobe has issued security fixes for its Acrobat and PDF Reader products, and has a patch for yet another zero-day flaw in Flash Player that is already being exploited in the wild.

Security 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weak Encryption Leaves Mobile Health App at Risk for Hacking

Data Breach Today

DHS, Philips Issue Advisories for HealthSuite Android Health App The lack of strong encryption in Philips' HealthSuite Health Android app leaves the mobile health software vulnerable to hacking, according to a new advisory issued by the medical device manufacturer and an alert from the Department of Homeland Security.

article thumbnail

NetSecOPEN names founding members, appoints inaugural board of directors

The Last Watchdog

SAN JOSE, Calif. – Dec. 11, 2018 – NetSecOPEN , the first industry organization focused on the creation of open, transparent network security performance testing standards, today announced that 11 prominent security vendors, test solutions and services vendors, and testing laboratories have joined the organization as founding members. Related podcast: The importance of sharing alliances.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CECPQ2

Imperial Violet

CECPQ1 was the experiment in post-quantum confidentiality that my colleague, Matt Braithwaite, and I ran in 2016. It's about time for CECPQ2. I've previously written about the experiments in Chrome which lead to the conclusion that structured lattices were likely the best area in which to look for a new key-exchange mechanism at the current time. Thanks to the NIST process we now have a great many candidates to choose from in that space.

More Trending

article thumbnail

The Connected, Inspired, Hands-on Project Sponsor – Leading the Digital Charge

AIIM

Following on from our previous article where we identified how digital disruption is breeding new roles in the project and business landscape. We are now going to focus on the hands-on Digital Project Sponsor. With digital disruption shaking up the corporate world, there are more and more initiatives, ideas, projects, and products being launched than ever before.

article thumbnail

Your DPO questions answered

IT Governance

Organisations have had to get a lot more serious about data processing and information security since the EU GDPR (General Data Protection Regulation) came into effect earlier this year. For many, that has included the mandatory appointment of a DPO (data protection officer) to ensure key requirements of the Regulation are being met. But with so many uncertainties about what effective data protection should look like, many DPOs have been thrust into the role without time to think about how best

article thumbnail

Novidade, a new Exploit Kit is targeting SOHO Routers

Security Affairs

Security experts at Trend Micro have discovered a new exploit kit, dubbed Novidade (“novelty” in Portuguese), that is targeting SOHO routers to compromise the devices connected to the network equipment. The Novidade exploit kit leverages cross-site request forgery (CSRF) to change the Domain Name System (DNS) settings of SOHO routers and redirect traffic from the connected devices to the IP address under the control of the attackers.

article thumbnail

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Fall 2018 National Meeting (Fall Meeting) in San Francisco, California, from November 15 to 18, 2018. This post summarizes the highlights from this meeting. 1. NAIC Continues its Evaluation of Insurers’ Use of Big Data. The NAIC is continuing its review of property and casualty insurers’ use of predictive modeling in rate filings and is developing related guidance materials for states to use in reviewing predictive models.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

49% of Cloud Databases Left Unencrypted

Dark Reading

Businesses also leave information vulnerable in the cloud by failing to implement MFA and configure Kubernetes settings, new research reveals.

Cloud 85
article thumbnail

Sailing the cyber security waves

IT Governance

Ships have experienced a digital transformation in recent years. New technologies are helping them navigate the waters and ensure that everyone on board experiences the connectivity and convenience they expect. However, this increased volume of data has made ships an appealing target for criminal hackers. What are the challenges specific to ships? The days of ships navigating the waters with just a compass, chart and sextant for support are long gone.

article thumbnail

The Grinch Bot Before Christmas: A Security Story for the Holidays

Dark Reading

Once upon a time, buyers purchased products from certified sellers. Today, hoarders use botnets to amass goods at significant markup for a new gray-market economy.

article thumbnail

It’s time to think twice about retail loyalty programs

Thales Cloud Protection & Licensing

As I was starting to write this blog, yet another retail program data breach occurred, for Marriott’s Starwood loyalty program. In this case, it looks as though the attackers had been on the Starwood network for somewhere around three years, mining out their reservations database (keep in mind that Marriott only acquired Starwood in 2016 ). Since in Tech we often travel “for a living”, I found in my bag an older Starwood preferred guest card.

Retail 66
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Well Is Your Organization Investing Its Cybersecurity Dollars?

Dark Reading

The principles, methods, and tools for performing good risk measurement already exist and are being used successfully by organizations today. They take some effort -- and are totally worth it.

IT 65
article thumbnail

Google will shut down consumer version of Google+ earlier due to a bug

Security Affairs

Google announced it will close the consumer version of Google+ before than originally planned due to the discovery of a new security flaw. Google will close the consumer version of Google+ in April, four months earlier than planned. According to G Suite product management vice president David Thacker. the company will maintain only a version designed for businesses.

article thumbnail

Change management – what’s in it for me?

OpenText Information Management

Research suggests that user resistance is a key factor in the implementation of systems. We often hear that people don’t like change. That’s not entirely true, however – people will resist change they don’t fully understand or feel part of. If you can answer one simple question, then the entire EIM change program becomes more natural … The post Change management – what’s in it for me?

IT 61
article thumbnail

Battling Bots Brings Big-Budget Blow to Businesses

Dark Reading

Fighting off bot attacks on Web applications extracts a heavy cost in human resources and technology, according to a just-released report.

69
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The top skills needed by data scientists in 2019

Information Management Resources

The real challenge finding data scientists is not in finding the individual contributors, but instead in finding their managers.

article thumbnail

Patch Tuesday Arrives with 9 Critical CVEs, 1 Under Attack

Dark Reading

Serious bugs addressed today include a Win32K privilege escalation vulnerability and Windows DNS server heap overflow flaw.

70
article thumbnail

Data Privacy Issues Trigger Soul Searching in Tech Industry

Threatpost

Consumers are growing angry when it comes to data misuse - but the real change will need to come from the tech industry's culture when it comes to privacy.

Privacy 58
article thumbnail

Equifax Breach Underscores Need for Accountability, Simpler Architectures

Dark Reading

A new congressional report says the credit reporting firm's September 2017 breach was 'entirely preventable.

70
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Facebook Fined $11.3M for Privacy Violations

Threatpost

Italy's regulator found the social giant guilty of misleading consumers as to what it does with their data.

Privacy 68
article thumbnail

CrowdStrike: More Organizations Now Self-Detect Their Own Cyberattacks

Dark Reading

But it still takes an average of 85 days to spot one, the security firm's incident response investigations found.

article thumbnail

Idea to Insight in 30 days

OpenText Information Management

In an article published this year by Steven Levy, “Inside Amazon’s Artificial Intelligence Flywheel”, we learned how Amazon took a “leap of faith” in using advances in Artificial Intelligence (AI) and Machine Learning (ML) for every part of their business and to create new products like Alexa. Many organizations recognize the need for AI and … The post Idea to Insight in 30 days appeared first on OpenText Blogs.

article thumbnail

Attackers Using New Exploit Kit to Hijack Home & Small Office Routers

Dark Reading

Goal is to steal banking credentials by redirecting users to phishing sites.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Digital disruption takes center stage at Automotive Industry Day

OpenText Information Management

Sometimes it feels like the automotive industry is being turned upside down by digital disruption. In response to these changes, some technology providers appear to be singing the same old song. But at OpenText™, we prefer to take advantage of new technology and prepare our customers to become intelligent and connected enterprises. And for our … The post Digital disruption takes center stage at Automotive Industry Day appeared first on OpenText Blogs.

article thumbnail

Grammarly Takes Bug Bounty Program Public

Dark Reading

The private bug bounty program has nearly 1,500 participants and is ready for a public rollout with HackerOne.

66
article thumbnail

Zero-Day Bug Fixed by Microsoft in December Patch Tuesday

Threatpost

Microsoft patches nine critical bugs as part of December Patch Tuesday roundup.