Thu.Aug 09, 2018

article thumbnail

Bitfi Gets Pwnies Award for 'Lamest Vendor Response'

Data Breach Today

How John McAfee's Cryptocurrency Hardware Wallet and Company Fell Short Hubris has a new name: Bitfi. The cryptocurrency wallet-building company, backed by technology eccentric John McAfee, earned this year's not-so-coveted Pwnies Award for "Lamest Vendor Response" for how it mishandled security researchers' vulnerability disclosures. Bitfi has promised to do better.

Security 189
article thumbnail

Do you know the difference between cyber security and information security?

IT Governance

You often see people use the terms ‘ cyber security ’ and ‘ information security ’ interchangeably. That’s because, in their most basic forms, they refer to the same thing: the integrity and confidentiality of information. But there’s a crucial difference, which can be explained simply. Information security. Information is at the heart of any organisation, whether it’s business records, personal data or intellectual property.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

WhatsApp: Check Point's Flaw Findings Don't Merit Patches

Data Breach Today

Messages Can Be Manipulated, But Fixes Would Pose Privacy Risks, WhatsApp Says Check Point says it has found three ways to falsify messages in WhatsApp, which it claims could be employed by scammers and used to spread fake news. WhatsApp acknowledges the findings, but it will not engineer patches.

Privacy 157
article thumbnail

3 ways prescriptive analytics helps deliver better financial services

IBM Big Data Hub

As any financial services executive knows, improving business results with precise, timely decisions is much harder than it looks.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Numerous OpenEMR Security Flaws Found; Most Patched

Data Breach Today

Open Source Electronic Medical Records System Used Worldwide Nearly two dozen security weaknesses in OpenEMR - open source electronic medical record and practice management software - left patient data vulnerable to cyberattacks before most were patched, according to the London-based security research firm Project Insecurity.

Security 100

More Trending

article thumbnail

The Global State of Online Digital Trust

Data Breach Today

Forty-eight percent of customers drop the products and services of organizations that have had a publicly-disclosed data breach. This is but one of the findings of the new 2018 Global State of Online Digital Trust study commissioned by CA Technologies. CA's David Duncan analyzes the results.

article thumbnail

Reader Favorites August 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover: Paperlite offices, smart storage, and mergers and acquisitions. Creating the paperlite office: What you need to know This comprehensive resource is a must for any records manager looking to reduce the amount of paper in their organization. It covers: using records management best practices managing your existing [.

article thumbnail

Gaining Visibility Into Supply Chain Risk

Data Breach Today

CrowdStrike's Mike Sentonas Shares Insights From Latest Research Even though many organizations believe that supply chain cyber risk is a serious problem, very few organizations are vetting their suppliers, says CrowdStrike's Michael Sentonas.

Risk 100
article thumbnail

A New Pacemaker Hack Puts Malware Directly On the Device

WIRED Threat Level

Researchers at the Black Hat security conference will demonstrate a new pacemaker-hacking technique that can add or withhold shocks at will.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Public Cloud: Understanding Shared Responsibility Model

Data Breach Today

Microsoft's Jonathan Trull on Cloud Security Securing the public cloud is not as challenging as it used to be, but too many organizations are still taking the wrong approach, says Microsoft's Jonathan Trull. Understanding the shared responsibility model for security is critical, he says.

Cloud 100
article thumbnail

How To Protect Yourself From Hackers

Cyber Info Veritas

Would you like to know how to protect yourself from the ever-present threat of cybercrime perpetrated by black hat hackers? Yes, there are bad and good hackers. Their main aim is to exploit your “mistakes and vulnerabilities” to blackmail you into sending them money or they’ll leak your private data. If your data and online privacy are important to you, and it should be whether you use the internet for social media, shopping, making money online, or learning, read this article with keen interest

article thumbnail

Breaking Down Legacy Silos in Security

Data Breach Today

Abdallah Zabian of DXC Technologies on Taking a Holistic Approach Security silos persist because stakeholders within the enterprise security ecosystem are focused on their own key performance indicators, says Abdallah Zabian of DXC Technology, who suggests a more holistic approach is needed.

Security 100
article thumbnail

Hacking a Brand New Mac Remotely, Right Out of the Box

WIRED Threat Level

Researchers found a way to compromise a Mac the first time it connects to Wi-Fi, potentially putting scores of enterprise customers at risk.

Risk 68
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DevSecOps: The Keys to Success

Data Breach Today

Experts Offer Insights on Addressing the Challenges Although there's widespread agreement that addressing security early in the software development cycle is an essential component to any breach prevention strategy, implementing DevSecOps can prove challenging.

Security 100
article thumbnail

IoT Malware Discovered Trying to Attack Satellite Systems of Airplanes, Ships

Dark Reading

Researcher Ruben Santamarta shared the details of his successful hack of an in-flight airplane Wi-Fi network - and other findings - at Black Hat USA today.

IoT 63
article thumbnail

That’s Right, We are Playing Both Sides of the Key Management Game:

Thales Cloud Protection & Licensing

Thales both giveth and taketh Bring Your Own Keys (BYOK). There is no longer denying that encryption is a hot topic. Encryption is everywhere. We hear about it when the FBI can’t hack an iPhone, when countries want back doors to compromise it, and, now, every major cloud provider offers at least baseline encryption as part of their service. These newbies to the land of enterprise encryption quickly learn from their prospects that offering encryption alone doesn’t earn them trust to house their d

article thumbnail

Smartphone Voting Is Happening, but No One Knows if It's Safe

WIRED Threat Level

Online voting has major security flaws, and experts are concerned that Voatz, the platform West Virginia will use this midterm election, doesn't solve them.

IT 62
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What is Content Services?

OpenText Information Management

In a previous blog, we looked at how Enterprise Content Management (ECM) is transitioning to become content services. It’s a change driven as much by a new way of thinking about information management as it is about new technologies. While ECM focused on the preservation and protection of content, content services build on that and … The post What is Content Services?

article thumbnail

Weakness in WhatsApp Enables Large-Scale Social Engineering

Dark Reading

Problem lies in WhatsApp's validation of message parameters and cannot be currently mitigated, Check Point researchers say.

69
article thumbnail

DeepLocker – AI-powered malware are already among us

Security Affairs

Security researchers at IBM Research developed a “highly targeted and evasive” AI-powered malware dubbed DeepLocker and will present today. What about Artificial Intelligence (AI) applied in malware development? Threat actors can use AI-powered malware to create powerful malicious codes that can evade sophisticated defenses. Security researchers at IBM Research developed a “highly targeted and evasive” attack tool powered by AI,” dubbed DeepLocker that is able to co

article thumbnail

How Blackberry Does Secure Release Management

eSecurity Planet

In a Black Hat USA session, Christine Gadsby, Director of BlackBerry's global Product Security Operations Team, explained how organization can improve the product release process to reduce vulnerabilities.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Security expert discovered a bug that affects million Kaspersky VPN users

Security Affairs

A security issue exists in Kaspersky VPN <=v1.4.0.216 which leaks your DNS Address even after you’re connected to any virtual server. (Tested on Android 8.1.0). What is a DNS leaks ? In this context, with the term “DNS leak” we indicate an unencrypted DNS query sent by your system OUTSIDE the established VPN tunnel. Kaspersky VPN is one of the most trusted VPN which comes with 1,000,000+ tier downloads in the official Google Play Store, however, it was observed that when i

article thumbnail

Detecting Phishing Sites with Machine Learning

Schneier on Security

Really interesting article : A trained eye (or even a not-so-trained one) can discern when something phishy is going on with a domain or subdomain name. There are search tools, such as Censys.io , that allow humans to specifically search through the massive pile of certificate log entries for sites that spoof certain brands or functions common to identity-processing sites.

article thumbnail

Researchers find vulnerabilities in WhatsApp that allow to spread Fake News via group chats

Security Affairs

WhatsApp has been found vulnerable to multiple security flaws that could allow malicious users to spread fake news through group chats. WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security flaws that could allow malicious users to intercept and modify the content of messages sent in both private as well as group conversations.

article thumbnail

FERMI Industry Day

National Archives Records Express

On Monday, August 6, we co-hosted an Industry Day with the General Services Administration (GSA) to begin the next phase of the Federal Electronic Records Modernization Initiative (FERMI). . FERMI Industry Day on August 6, 2018. McGowan Theater, National Archives (National Archives photo by Jeff Reed). The Industry Day provided vendors with information about NARA’s Use Cases for Electronic Messages.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

BIND DNS software includes a security feature that could be abused to cause DoS condition

Security Affairs

The Internet Systems Consortium (ISC) announced the presence of a serious flaw in the BIND DNS software that can be exploited by remote attackers to cause a denial-of-service (DoS) condition. The vulnerability tracked as CVE-2018-5740 was discovered by Tony Finch of the University of Cambridge. The flaw has been assigned a CVSS score of 7.5, the expert pointed out that the flaw only affects servers that have on a feature called “deny-answer-aliases” enabled.

article thumbnail

Education technology tips for this school year

Jamf

What are the five most common education technology mistakes schools make? We explain and show you how to avoid a similar fate.

article thumbnail

Google Bug Hunter Urges Apple to Change its iOS Security Culture

Threatpost

Project Zero researcher highlights stubborn iOS bugs as an example of why Apple and the rest of the industry needs to take a fresh approach to securing systems.