Tue.Sep 04, 2018

article thumbnail

For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

Krebs on Security

mSpy , the makers of a software-as-a-service product that claims to help more than a million paying customers spy on the mobile devices of their kids and partners, has leaked millions of sensitive records online, including passwords, call logs, text messages, contacts, notes and location data secretly collected from phones running the stealthy spyware.

Passwords 175
article thumbnail

Application Security: What Causes Inertia?

Data Breach Today

Joseph Feiman of WhiteHat Security on the Need for Cultural Change Application security is not improving because about 60 percent of vulnerabilities never get fixed, says Joseph Feiman of WhiteHat Security.

Security 152
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

The Last Watchdog

Most large enterprises today can point to multi-millions of dollars expended over the past two decades erecting “layered defenses” to protect their digital systems. Yet catastrophic network breaches continue apace. Turns out there’s a downside to “defense in depth.”. Related: Obsolecense creeps into legacy systems. There’s no doubt that monitoring and continually updating all parts of a multi-tiered security system is a must-do best practice.

article thumbnail

AI and ML: Hype vs. Reality

Data Breach Today

Sam Curry of Cybereason on the Need to Ask Vendors Tough Questions CISOs should ask tough questions of vendors that claim to offer machine learning and artificial intelligence capabilities so they can cut through the marketing hype to find out what's real, says Sam Curry of Cybereason.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The hidden threats facing your intellectual property

IT Governance

When we consider the damage a data breach can cause, we tend to focus on the cost of breach reporting, potential fines and loss of reputation. One of the ‘unseen’ costs is the potential loss or theft of an organisation’s IP (intellectual property). IP includes sensitive business or trading information and research and development information. The risk of losing your IP.

More Trending

article thumbnail

Google Wants to Kill the URL

WIRED Threat Level

"Whatever we propose is going to be controversial. But it’s important we do something, because everyone is unsatisfied by URLs. They kind of suck.".

article thumbnail

Building an Effective Enterprisewide Security Program

Data Breach Today

Gregory Wilshusen of the GAO Offers Lessons Learned Identifying the right controls to manage specific risks is a vital component of an enterprisewide security program, say Gregory Wilshusen of the U.S. Government Accountability Office.

Security 112
article thumbnail

What to watch for as we head into election season

Thales Cloud Protection & Licensing

It’s hard to believe we are nine weeks away from the midterm elections here in the United States. Regardless of the winners and losers, all eyes will focus on election security. And there are so many factors to consider. Just last month at Def Con and Black Hat, we found out just how easy it is to break into election machines. White Hat (ethical) hackers worked in under 15 minutes to disrupt the entire voting process from the moment someone attempted to register to vote to the point at which res

article thumbnail

The Role of Managed Detection and Response

Data Breach Today

J. Paul Haynes of eSentire on Improving Threat Hunting Managed detection and response enables organizations to use telemetry to better detect when compromises occur and then take action, says J. Paul Haynes of eSentire.

100
100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Taking intelligent and connected enterprises on the road

OpenText Information Management

Content still forms a large percentage of all data attached to an SAP® process, and if you’re only basing your machine learning and AI technologies on structured data, you’re missing a key source of knowledge. By adding properly managed unstructured content to the data in context, you can provide a full view of all information … The post Taking intelligent and connected enterprises on the road appeared first on OpenText Blogs.

article thumbnail

Fintech Apps: Consumer Privacy Concerns Remain High

Data Breach Today

Nearly one-third of U.S. banking consumers use online and mobile fintech apps to help manage their money. But those users are concerned about data privacy and want more control over the financial data their apps can access, says David Fortney of The Clearing House, who reviews the results of a survey.

Privacy 100
article thumbnail

Hackers can easily access 3D printers exposed online for sabotage and espionage

Security Affairs

Security researchers at the SANS Internet Storm Center discovered that thousands of 3D printers are exposed online without proper defense. The news is worrisome, thousands of 3D printers are exposed online to remote cyber attacks. According to the experts at SANS Internet Storm Center that scanned the internet for vulnerable 3D printers, a Shodan query has found more than 3,700 instances of OctoPrint interfaces exposed online, most in the United States (1,600).

Access 55
article thumbnail

The 'Appropriate' Use of Analytics for Breach Detection

Data Breach Today

The appropriate use of predictive analytics, going beyond a "set it and forget it" approach, could dramatically improve breach detection, says Teresa Grogan, CIO of the consultancy Vertitech IT.

Analytics 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Book Announcement: Click Here to Kill Everybody

Schneier on Security

I am pleased to announce the publication of my latest book: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. In it, I examine how our new immersive world of physically capable computers affects our security. I argue that this changes everything about security. Attacks are no longer just about data, they now affect life and property: cars, medical devices, thermostats, power plants, drones, and so on.

Sales 54
article thumbnail

Many misconfigured Tor sites expose the public IP address via SSL certificates

Security Affairs

Security researcher discovered that many misconfigured Tor sites using SSL certificated could expose the public IP addresses of underlying servers. Yonathan Klijnsma , a threat researcher at RiskIQ, has discovered that many misconfigured Tor sites using SSL certificated could expose the public IP addresses of underlying servers. Properly configured servers hosting hidden services have to listen only on the localhost (127.0.0.1) instead of any other public IP address. “The way these guys a

article thumbnail

Jon Kyl Will Take McCain's Senate Seat

WIRED Threat Level

The governor of Arizona announced Tuesday that Jon Kyl will replace the Senate seat vacated by the late John McCain. He may now further push to regulate tech giants like Facebook.

article thumbnail

Parental control spyware app Family Orbit hacked, pictures of hundreds of monitored children were exposed

Security Affairs

The company that sells the parental control spyware app Family Orbit has been hacked, pictures of hundreds of monitored children were left online. The company that sells the parental control spyware app Family Orbit has been hacked, the pictures of hundreds of monitored children were left online only protected by a password. According to Motherboard that first reported the news, the Family Orbit spyware left exposed nearly 281 GB of data online.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Senator Mark Warner Is Not Happy With Google

WIRED Threat Level

The vice chairman of the Senate Intelligence Committee talks about the search giant's glaring absence at this week's committee hearings, and the White House's #stopthebias campaign.

article thumbnail

Compromising Proxy Call Session Control Function (P-CSCF) using VoLTE

Security Affairs

The IP Multimedia Subsystem (IMS) facilitates telecom operators in delivering multimedia applications and voice traffic over IP transport. Proxy Call Session Control Function (P-CSCF) is the first node in IMS Platform (figure 1) to interact with the User Equipment (UE) when initiating a VoLTE call. figure 1 – Placement of Proxy Call Session Control Function in IMS Platform.

Access 46
article thumbnail

Collection Management: a Crash-Course

The Security Ledger

Effective collection management is integral to the success of an intelligence operation. What is it and how does it work? Thomas Hofmann, the Vice President of Intelligence at Flashpoint offers a crash-course in creating an effective collection management program. Collection management is one of the most overlooked and misunderstood aspects of an. Read the whole entry. » Related Stories From Mainframes to Connected Cars: How Software drives the Automotive Industry Opinion: With Internet of

IoT 40
article thumbnail

Google paid million dollars to track offline purchases using Mastercard Data

Security Affairs

Google has paid Mastercard millions of dollars to access offline transactions of its users, the news was revealed by Bloomberg. New problems for Google, experts discovered a secret agreement of the tech giant with Mastercard to track user purchases offline. Google has paid Mastercard millions of dollars to access offline transactions of its users. The embarrassing agreement was revealed by Bloomberg that cited four unidentified people with knowledge of the deal.

Sales 44
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Humans of OpenText: Vicci Jenkins and Michelle Stevens

OpenText Information Management

Meet Vicci and Michelle, OpenText™ friends and colleagues from Waterloo, Canada. They met through their love of singing and have shared many stages together in a variety of prestigious choir performances across Southern Ontario. Read their Humans of OpenText story below to learn more about this talented duo! Where did your love of singing come … The post Humans of OpenText: Vicci Jenkins and Michelle Stevens appeared first on OpenText Blogs.

40
article thumbnail

Authentication Grows Up

Dark Reading

Which forms of multi-factor authentication (MFA) are working, which are not, and where industry watchers think the market is headed.

article thumbnail

How to Watch Twitter and Facebook Testify Before Congress Wednesday

WIRED Threat Level

Twitter CEO Jack Dorsey and Facebook COO Sheryl Sandberg will field questions about foreign interference, perceived bias, and more.

article thumbnail

Attackers Employ Social Engineering to Distribute New Banking Trojan

Dark Reading

CamuBot is a sophisticated banking malware aimed at the business customers of major Brazilian banks.

53
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How Google Chrome Spent a Decade Making the Web More Secure

WIRED Threat Level

Ten years after Chrome debuted, a look back at how the browser redefined security online.

article thumbnail

Lean, Mean & Agile Hacking Machine

Dark Reading

Hackers are thinking more like developers to evade detection and are becoming more precise in their targeting.

49
article thumbnail

ThreatList: 60% of BEC Attacks Fly Under the Radar

Threatpost

The report also found that simply protecting employees in sensitive departments is not sufficient to protect against BEC.