Fri.Apr 26, 2019

article thumbnail

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise, new research has found. A map showing the distribution of some 2 million iLinkP2P-enabled devices that are vulnerable to eavesdropping, password theft and possibly remote compromise, according to new research.

IoT 258
article thumbnail

Trojanized TeamViewer Attacks Reveal Mutating Malware

Data Breach Today

Attackers' Small Malicious Code Tweaks Keep Faking Out Defenders, Researchers Warn Check Point Research has spotlighted attacks against several embassies that show how subtle changes in source code can alter how security professionals can detect and stop different types of malware.

Security 234
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK and U.S. Privacy Shield Guidance on Brexit

Data Matters

In light of the UK’s possible departure from the European Union (EU), currently scheduled for October 31, 2019 (“Exit Day”), the UK Government has passed the Data Protection, Privacy and Electronic Communications (Amendments etc) (EU Exit) (No.2) Regulations 2019 (“Regulations”) which enter into force immediately before Exit Day. Under the Regulations, transfers of personal data from the UK to the U.S., that rely on the EU to U.S.

Privacy 88
article thumbnail

Canada Says Facebook Violated Privacy Laws

Data Breach Today

Privacy Commissioner Will Go to Court to Enforce Recommendations Canada's privacy commissioner says Facebook violated its privacy laws by failing to protect users' personal data. The commissioner plans to take Facebook to federal court for allegedly refusing to implement recommendations to strengthen its privacy framework.

Privacy 211
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The strengths and weaknesses of different VPN protocols

Security Affairs

One in four internet users use a VPN regularly, but how much does the average user know about what goes on behind the software? Pulling back the curtain, a VPN runs on various VPN protocols that govern the way a VPN client communicates with a VPN server. Different protocols create different ways that connect your device and the internet through encrypted tunnels.

More Trending

article thumbnail

The SIM Swap Fix That the US Isn't Using

WIRED Threat Level

While foreign phone carriers are sharing data to stop SIM swap fraud, US carriers are dragging feet.

Security 110
article thumbnail

Privacy Peril: Facebook's Marketplace Flaw

Data Breach Today

The latest edition of the ISMG Security Report describes how a Facebook Marketplace glitch created serious privacy issues. Plus: An update on the activities of the FBI's Recovery Asset Team and HSBC whistleblower Everett Stern's preview of keynote address at upcoming ISMG Fraud and Breach Summit in Chicago.

Privacy 160
article thumbnail

Millions of IoT Devices exposed to remote hacks due to iLnkP2P flaws

Security Affairs

Experts discovered security flaws in the iLnkP2P peer-to-peer (P2P) system that exposes millions of IoT devices to remote attacks. Security expert Paul Marrapese discovered two serious vulnerabilities in the iLnkP2P P2P system that ìs developed by Chinese firm Shenzhen Yunni Technology Company, Inc. The iLnkP2P system allows users to remotely connect to their IoT devices using a mobile phone or a PC.

IoT 79
article thumbnail

Police and NCSC to Breach Victims: We Won't Tell Regulators

Data Breach Today

Incident Responders and Law Enforcement Promise Firewall With GDPR Watchdog Nearly one year after the EU's new privacy law came into effect, the U.K.'s National Cyber Security Agency continues to assist organizations that suffer cybersecurity attacks. Both NCSC and law enforcement agencies this week emphasized that they will never report breach victims to privacy watchdogs.

GDPR 160
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to Build a Cloud Security Model

Dark Reading

Security experts point to seven crucial steps companies should be taking as they move data and processes to cloud environments.

Cloud 91
article thumbnail

Weekly Update 136

Troy Hunt

Scott is still here with me on the Gold Coast lapping up the sunshine before NDC Security next week so I thought we'd do this week's video next to the palm trees and jet ski ?? But, of course, there's still a heap of stuff happening that's worthy of discussion, everything from the UK gov's NCSC doing good work to the Reply All podcast I was on this week to new data breaches to the ongoing shenanigans involving kids "smart" watches.

article thumbnail

Malware Makes Itself at Home in Set-Top Boxes

Dark Reading

Low-cost boxes that promise free TV streaming services often come complete with malware, according to a new study.

94
article thumbnail

Interview of Me in Taiwan

Schneier on Security

Business Weekly in Taiwan interviewed me. (Here's a translation courtesy of Google.) It was a surprisingly intimate interview. I hope the Chinese reads better than the translation.

IT 71
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

OpenText recognized by Siemens PLM Software as Smart Expert Partner

OpenText Information Management

We’re pleased to announce that OpenText™ Business Network has been recognized by Siemens PLM Software for achieving Smart Expert Partner status. The Siemens PLM Software Smart Expert Partner initiative recognizes Solution Provider Partners who successfully fulfill a comprehensive vetting and validation process that distinguishes them as market leaders with demonstrable business, product and industry competencies … The post OpenText recognized by Siemens PLM Software as Smart Expert P

article thumbnail

Users Urged to Disable WordPress Plugin After Unpatched Flaw Disclosed

Threatpost

Yet another WordPress plugin vulnerability has put thousands of websites at risk.

Risk 99
article thumbnail

Go Medieval to Keep OT Safe

Dark Reading

When it comes to operational technology and industrial control systems, make sure you're the lord of all you survey.

IT 80
article thumbnail

Facial Recognition ‘Consent’ Doesn’t Exist, Threatpost Poll Finds

Threatpost

Half of Threatpost readers surveyed in a recent poll don't believe that consent realistically exists when it comes to facial recognition.

IT 75
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Age Appropriate Design: ICO Issues Draft Code of Practice for Online Services Used by Children

Hunton Privacy

On April 15, 2019, the UK Information Commissioner’s Office (the “ICO”) issued for public consultation a draft code of practice , “Age Appropriate Design,” that will regulate the provision of online services likely to be accessed by children in the UK. Given the extraterritorial reach of the UK Data Protection Act 2018, organizations based outside of the UK may be subject to the code, which is expected to take effect by the end of 2019.

article thumbnail

GoDaddy Shutters 14,000 Subdomains Tied to ‘Snake Oil’ Scams

Threatpost

GoDaddy worked with researchers to shut down 15,000 domain-shadowing websites tied to bogus affiliate marketing offers promoted via spam campaigns.

article thumbnail

Slack Warns of Big, Bad Dangers in SEC Filing

Dark Reading

A filing prior to an IPO lists nation-state dangers to Slack's services and customers as a risk for investors.

Risk 76
article thumbnail

News Wrap: Amazon Echo Privacy, Facebook FTC Fines and Biometrics Regulation

Threatpost

On this week's Threatpost news wrap, the team discusses Facebook's FTC fine for its data security practices, a report that Amazon is collecting Echo users' geolocation data, and more.

Privacy 58
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How will 5G change patient engagement?

DXC Technology

Few things have fueled the hype curve more in recent years than the coming widespread availability of 5G transmission speeds on mobile devices. Many other telecommunications trends have been evolutionary, but I sense that 5G is seen by many as revolutionary. The healthcare industry could be a major beneficiary of this extra speed, given the […].

IoT 58
article thumbnail

Beapy Cryptojacking campaign leverages EternalBlue exploit to spread

Security Affairs

Security experts uncovered a new cryptojacking campaign tracked as Beapy that leverages the NSA’s DoublePulsar backdoor and the EternalBlue exploit. Security experts at Symantec have uncovered a new cryptojacking campaign tracked as Beapy that leverages the NSA’s DoublePulsar backdoor and the EternalBlue exploit to spread a cryptocurrency malware on enterprise networks in Asia. “Beapy is a cryptojacking campaign impacting enterprises that uses the EternalBlue exploit and stolen

Mining 55
article thumbnail

Critical Flaws in Sierra Wireless 5G Gateway Allow RCE, Command Injection

Threatpost

The wireless gateways are used in PoS, industrial IoT and distributed enterprise settings.

IoT 77
article thumbnail

Feelings, trends and value: Three key elements of sentiment analysis

OpenText Information Management

Do you want to know what your customers think about your product? How about validating why and when your employees started to complain about the new intranet logging policy? Or perhaps you’d like to capture how the mood in social media is changing before an upcoming referendum? With web and social media crawlers – tools … The post Feelings, trends and value: Three key elements of sentiment analysis appeared first on OpenText Blogs.

Mining 53
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Db2 12 for z/OS Statistics Profiles: Just What the Optimizer Ordered

Robert's Db2

Here is an interesting story for you: not long ago, an analytics-type query was executed on a Db2 for z/OS system that had recently been migrated to Db2 12. The query was cancelled after it had run for 23 hours. A DBA noticed that there was a row for a table targeted by the query in SYSIBM.SYSTABLES_PROFILES in the Db2 catalog. He ran RUNSTATS for the table, specifying USE PROFILE so that the utility would pick up the options specified in the aforementioned statistics profile.

Access 48
article thumbnail

FTC Settles with Two Online Operators for Failing to Secure Customers’ Data

Hunton Privacy

On April 24, 2019, the Federal Trade Commission announced two data security cases involving online operators—one, an online rewards website, and the second, a dress-up games website—that were alleged to have failed to take reasonable steps to secure consumers’ data, which allowed hackers to breach both websites. ClixSense Case. The FTC’s case against ClixSense and the company’s owner involved deceptive statements that the site, which collected personal information from users (including, in some

article thumbnail

OpenText powers the #1 cloud platform for SAP users

OpenText Information Management

OpenText™ and SAP® have partnered for more than 25 years, working together to deliver innovative solutions to over 5,000 joint customers across every vertical and industry sector. Our strategic partnership has enabled us to combine our strengths and deliver greater co-innovation, roadmap alignment, and development with SAP. Throughout our partnership, OpenText has become the market … The post OpenText powers the #1 cloud platform for SAP users appeared first on OpenText Blogs.

Cloud 49