Thu.Nov 15, 2018

article thumbnail

Romanian Hacker 'Guccifer' Extradited to US

Data Breach Today

Former Taxi Driver Receives Conditional Release From Prison in Romania The notorious Romanian hacker known as Guccifer, who revealed the existence of Hillary Clinton's private email server and admitted to hacking numerous email and social media accounts, has reportedly been extradited from Romania to begin serving his 52-month U.S. prison sentence.

251
251
article thumbnail

New DigiCert poll shows companies taking monetary hits due to IoT-related security missteps

The Last Watchdog

Even as enterprises across the globe hustle to get their Internet of Things business models up and running, there is a sense of foreboding about a rising wave of IoT-related security exposures. And, in fact, IoT-related security incidents have already begun taking a toll at ill-prepared companies. Related: How to hire an IoT botnet — for $20.

IoT 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Do the HIPAA Rules Hamper Coordinated Patient Care?

Data Breach Today

HHS to Seek Comments on Whether the Rules Create Barriers to Sharing Patient Information Federal regulators plan to seek public comments on whether the HIPAA rules create barriers to sharing patient information among healthcare providers, hampering the ability to coordinate care. But some regulatory experts argue the problem is not the rules, but misunderstandings about what they allow.

141
141
article thumbnail

Speaking Of: (Not Your Father’s) Capture

Weissman's World

Information capture has come a long way, baby! From stuffing paper through a scanner to taking pictures in the literal blink of an eye, it’s so much more than what we grew up with. Here, the illustrious Bob Larrivee and I talk about the “latest-and-greatest” in the world of capture, and the need to update […]. The post Speaking Of: (Not Your Father’s) Capture appeared first on Holly Group.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Chip Cards Fail to Reduce Credit Card Fraud in the US

Schneier on Security

A new study finds that credit card fraud has not declined since the introduction of chip cards in the US. The majority of stolen card information comes from hacked point-of-sale terminals. The reasons seem to be twofold. One, the US uses chip-and-signature instead of chip-and-PIN, obviating the most critical security benefit of the chip. And two, US merchants still accept magnetic stripe cards, meaning that thieves can steal credentials from a chip card and create a working cloned mag stripe car

Sales 100

More Trending

article thumbnail

What's the difference between data lakes and data warehouses?

IBM Big Data Hub

If you’ve heard the debate among IT professionals about data lakes versus data warehouses, you might be wondering which is better for your organization. You might even be wondering how these two approaches are different at all.

IT 92
article thumbnail

7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge

Dark Reading

Building cybersecurity skills is a must; paying a lot for the education is optional. Here are seven options for increasing knowledge without depleting a budget.

article thumbnail

Congress passes bill that create new Cybersecurity and Infrastructure Security Agency at DHS

Security Affairs

The U.S. House of Representatives passed the CISA bill that creates a new cybersecurity agency at the Department of Homeland Security (DHS). The U.S. House of Representatives passed the CISA bill that creates a new cybersecurity agency at the Department of Homeland Security (DHS). In October, the Senate passed the Cybersecurity and Infrastructure Security Agency (CISA) Act (H.R. 3359) , now the Congress passed the legislation unanimously and it is going to be signed by the President.

article thumbnail

UK Publication Names Thales eSecurity Global CISO to 2018 Top 25 Women in Tech List

Thales Cloud Protection & Licensing

Thales eSecurity Global CISO Bridget Kenyon was recently named one of the ‘Top 25 Women in Tech 2018’ by UK publication PCR. As stated in the write-up, which may be found in the above link and below: “Passionate about data security, Bridget was the previous head of information security at University College London and a security researcher at government DEFRA.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Senior German officials wants exclude Chinese firms from building 5G infrastructure

Security Affairs

Senior German officials are making pressure on the government to exclude Chinese firms from building the country’s 5G infrastructure. Many countries are going to build 5G infrastructure, but the approach of the government is completely different. Italian politicians seem to completely ignore the importance of 5G infrastructure for the growth of the country and the potential effects on national security, while senior German officials are planning to exclude Chinese firms such as Huawei from the t

article thumbnail

First SEC Enforcement Action Against Decentralized Digital Asset Exchange Echoes Recent Public Statements

Data Matters

In the first case of its kind, the Securities and Exchange Commission (SEC) announced an enforcement action related to EtherDelta, a decentralized digital asset trading platform that the SEC found operated as an unregistered national securities exchange. The enforcement action was brought against Zachary Coburn (Founder) of EtherDelta, rather than against any entity.

article thumbnail

Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs

Security Affairs

Chinese TEMP.Periscope cyberespionage group targeted a UK-based engineering company using TTPs associated with Russia-linked APT groups. Attribution of cyber attacks is always a hard task, in many cases attackers use false flags to masquerade their identities. Chinese hackers have targeted a UK-based engineering company using techniques and artifacts attributed to the Russia-linked APT groups Dragonfly and APT28 , according to security researchers.

article thumbnail

Cyber Crooks Diversify Business with Multi-Intent Malware

Dark Reading

The makers of malware have realized that if they're going to invest time and money in compromising cyber defenses, they should do everything they can to monetize their achievement.

69
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

7 questions boards need to ask about artificial intelligence

Information Management Resources

From employee training needs, to security threats, to monetization opportunities, the impacts and risks of new and disruptive technologies is growing. Here's what directors need to know.

article thumbnail

Data privacy concerns as DeepMind Health is absorbed by Google

IT Governance

There are concerns about a deal that sees Google extending its access to NHS patient data. DeepMind Health, a health and AI focused subsidiary of Google’s parent company, Alphabet, reported that it will be absorbed into Google Health, a newly formed subsidiary of Google. In June, an independent ethics committee raised concerns over DeepMind’s independence from Google or Alphabet.

article thumbnail

Weekly Update 113

Troy Hunt

Bit of a change of scenery this week; I've gone to the other end of the house whilst invasive palm tree roots are water blasted out from beneath my office window as part of our garden renos. But hey, that's a nice place to be on a day like this ?? Other than the location, it's business as usual. There's been some interesting discussion on biometric this morning, I'm appealing to developers of extensions and add-ons to whitelist themselves when a CSP is present and I'm talking about Google's U2F

article thumbnail

Legal Center leads matter and document management capabilities in the Cloud

OpenText Information Management

Firms continue to follow manual steps that lead to errors setting up new clients and performing tasks in a timely manner, which may lead to a malpractice suits, lack of consistency in their activities from matter to matter and a lack of metrics to help them become more efficient. OpenText™ Legal Center process flows aid … The post Legal Center leads matter and document management capabilities in the Cloud appeared first on OpenText Blogs.

Cloud 65
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What are the Data Subject Rights under the GDPR?

IT Governance

Updated 15 November 2018. This blog was originally published before the GDPR took effect in May 2018. The EU GDPR (General Data Protection Regulation) gives individuals eight rights relating to their personal data. Organisations must let individuals know how they can exercise these rights, and meet requests promptly. Failure to do so is a violation of the GDPR and could lead to disciplinary action.

GDPR 64
article thumbnail

From Reactive to Proactive: Security as the Bedrock of the SDLC

Dark Reading

Secure code development should be a priority, not an afterthought, and adopting the software development life cycle process is a great way to start.

article thumbnail

Kaspersky Lab opens first Transparency Center in Zurich

Security Affairs

Kaspersky Lab starts data processing for European users in Zurich and also launched the first Transparency Cente under the announced Transparency Initiative. From today, malicious and suspicious files shared by users of Kaspersky Lab products in Europe will start to be processed in data centers in Zurich, initiating the first part of a relocation commitment made by the company in late 2017 under its Global Transparency Initiative.

article thumbnail

More Than 50% of Free Mobile VPN Apps Have Chinese Ties

Dark Reading

In addition, most have "unacceptable" privacy policies and "non-existent user support.

Privacy 85
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

OpenText Release 16 EP5 for Content Suite delivers business value in 3 key areas

OpenText Information Management

Organizations are struggling to manage and extract business value from ever-increasing amounts of information flowing from ever-diversifying sources, systems and platforms. And, while users want the tools they use at work to be as simple to use as the tools (apps) they use in their personal lives, enterprises want cost effective and accelerated abilities to … The post OpenText Release 16 EP5 for Content Suite delivers business value in 3 key areas appeared first on OpenText Blogs.

article thumbnail

Japan Cyber Minister Says He Has Never Used a Computer

Dark Reading

Yoshitaka Sakurada, who recently took on the role after a cabinet shuffling, says it's up to the government to deal with it.

article thumbnail

Connected Wristwatch Allows Hackers to Stalk, Spy On Children

Threatpost

"Our advice is to stop using this watch" as mitigations are not available, researchers told Threatpost.

IoT 68
article thumbnail

Learn How to Better Protect your Network at Black Hat Europe

Dark Reading

Whether you're sussing out vulnerabilities or defending enterprise networks, Black Hat Europe's lineup of Briefings, Trainings, and Arsenal tools will help you take things to the next level.

48
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Threat Modeling in 2018 (video release)

Adam Shostack

Blackhat has released all the 2018 US conference videos. My threat modeling in 2018 video is, of course, amongst them. Slides are linked here.

56
article thumbnail

Ahead of Black Friday, Rash of Malware Families Takes Aim at Holiday Shoppers

Threatpost

As consumers skip the store crowds in favor of online deals, cyberattackers have geared up to victimize them.

article thumbnail

How to Control API Security Risks

eSecurity Planet

Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks.

Risk 55