Mon.May 27, 2019

article thumbnail

All the Ways Google Tracks You—And How to Stop It

WIRED Threat Level

Google knows more about you than you might think. Here's how to keep it from knowing your location, web browsing, and more.

IT 104
article thumbnail

APT10 is back with two new loaders and new versions of known payloads

Security Affairs

The APT10 group has added two new malware loaders to its arsenal and used in attacks aimed at government and private organizations in Southeast Asia. In April 2019, China-linked cyber-espionage group tracked as APT10 has added two new loaders to its arsenal and used it against government and private organizations in Southeast Asia. The group has been active at least since 2009, in April 2017 experts from PwC UK and BAE Systems uncovered a widespread hacking campaign, tracked as Operation Cloud H

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Shaping the future of sustainable business

OpenText Information Management

Since beginning our Corporate Social Responsibility (CSR) journey at OpenText™, I’ve had the opportunity to speak with customers, partners and employees about how best to meet the diverse needs of our stakeholders and their supply chains. These conversations have turned into a CSR movement that reinforces our cultural values of corporate sustainability and using information … The post Shaping the future of sustainable business appeared first on OpenText Blogs.

63
article thumbnail

Crooks leverages.htaccess injector on Joomla and WordPress sites for malicious redirects

Security Affairs

Security researchers are monitoring a new hacking campaign aimed at Joomla and WordPress websites, attackers used.htaccess injector for malicious redirect. Researchers at Sucuri are warning Joomla and WordPress websites admins of malicious hypertext access (.htaccess) injector found on a client website. The website was used by attackers to redirect traffic to advertising sites that attempted to deliver malware. “During the process of investigating one of our incident response cases, we fou

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

ThreatList: Top 8 Threat Actors Targeting Canada in 2019

Threatpost

Bad actors are looking to hit financial and banking firms in Canada with geo-specific campaigns touting malware like Emotet, GandCrab and Ursnif.

More Trending

article thumbnail

Court Upholds Decision Not to Compel Plaintiff to Produce Unredacted Narrative of Events: eDiscovery Case Law

eDiscovery Daily

In Kratz v. Scott Hotel Group, LLC, No. 4:17-cv-00212-TWP-DML (S.D. Ind. Apr. 29, 2019) , Indiana District Judge Tanya Walton Pratt, stating “[t]o invoke schoolyard vernacular: no do-overs” , denied the defendant’s objections to the Magistrate Judge’s decision not to compel the plaintiff to produce versions of an unredacted narrative of events associated with his hotel stays and interactions with hotel staff.

article thumbnail

Is The YOLO: Anonymous Questions App Safe For Kids? A Complete App Review For Parents

IG Guru

Description: On Wednesday, May 8, 2019, YOLO became the #1 most downloaded app in the entire Apple App Store. Even if YOLO’s fame is short lived, that alone is an achievement that millions of apps will never claim. As of the writing of this review, there’s very little existing commentary about the app. This description comes […]. The post Is The YOLO: Anonymous Questions App Safe For Kids?

article thumbnail

Chinese Spy Group Mixes Up Its Malware Arsenal with Brand-New Loaders

Threatpost

New campaigns also show modified versions of known payloads.

IT 55
article thumbnail

Non-disclosure

InfoGovNuggets

If you have information, do you need to share it? “Boeing Didn’t Advise Airlines, FAA That It Shut Off Warning System,” The Wall Street Journal , April 29, 2019. Boeing failed to advise that it had disconnected a safety warning in its 737 MAX jets. When do you have a duty to tell your customers something? Governance and Information. And certainly non-Use.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

BlueKeep scans observed from exclusively Tor exit nodes

Security Affairs

GreyNoise experts detected scans for systems vulnerable to the BlueKeep (CVE-2019-0708) vulnerability from exclusively Tor exit nodes. Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including an RDS vulnerability dubbed BlueKeep that can be exploited to carry out WannaCry -like attack. The issue is a remote code execution flaw in Remote Desktop Services (RDS) that it can be exploited by an unauthenticated attacker by connecting to the targeted system via the RDP

article thumbnail

Do you know where your children are?

InfoGovNuggets

“Parents Can’t Monitor Autistic Son with GPS Tracker at School, Nevada Ruling Says,” The Wall Street Journal , April 29, 2019. School rules that autistic student can’t wear a tracking device capable of recording conversations. This was after a teacher was arrested for beating him. One can understand why the school doesn’t want parents to be able to listen in to what goes on at school.

article thumbnail

First American Financial exposed 16 years’ worth of personal and financial documents

Security Affairs

The US real-estate insurance biz, First American Financial, accidentally leaked customers’ highly personal files online, hundreds of millions of documents. The US real-estate insurance company First American Financial Corp. accidentally leaked hundreds of millions of documents. The company has more than 18,000 employees and brought in more than $5.7 billion in 2018.

article thumbnail

Weakest link

InfoGovNuggets

Who do you share information with? Do they protect it as well as you would? “U.S. Would Rethink Intelligence Ties if Allies Use Huawei Technology,” The Wall Street Journal , April 30, 2019. US says it may not share intelligence data with countries who use equipment that the US deems insecure. How do you deal with your business partners?

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Incidental taking

InfoGovNuggets

NSA doesn’t collect information on US citizens, right? “NSA Reports 75% Increase in Unmasking U.S. Identities Under Foreign Surveillance Law in 2018,” The Wall Street Journal , May 1, 2019. Nearly 17,000 US persons (citizens and companies) had their data intercepted AND their identities disclosed last year. How secure are your communications?

article thumbnail

Government controls

InfoGovNuggets

“Elon Musk: Judge Approves Deal Spelling Out Oversight of Tesla CEO’s Tweets,” The Wall Street Journal , May 1, 2019. After a long-running feud with the SEC, Tesla now has agreed to control it’s CEO’s tweets. Interesting interplay of old rules (First Amendment, Securities Exchange Act, etc.) and new technologies (Twitter). Governance and Information and Compliance.

article thumbnail

Leaker fired

InfoGovNuggets

“U.K. Prime Minister Theresa May Fires Defense Secretary Gavin Williamson Over Huawei Leak,” The Wall Street Journal , May 2, 2019. He allegedly leaked sensitive information about the use of Huawei equipment in the UK’s 5G network. One wonders what will happen if the equipment leaks, too. Information. Security. Compliance. Governance.

article thumbnail

Banned

InfoGovNuggets

“Facebook Bans Louis Farrakhan, Alex Jones and Others as ‘Dangerous’,” The Wall Street Journal , May 3, 2019. Facebook bans selected individuals from the platform. If a government did this, there would be problems. But is it okay for a private party with nearly monopoly power in a bit of social mediaverse? How will these people be able to communicate to their audiences?

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

$5 billion privacy fine?

InfoGovNuggets

“Potential Facebook Settlement With FTC Likely to Include WhatsApp,” The Wall Street Journal , May 3, 2019. Privacy settlement over misuse and disclosure of users’ information may include WhatsApp, but maybe not Instagram. The government steps in to apply privacy protections to Facebook and its subparts. That’s potentially good for your information security.

Privacy 28
article thumbnail

TMI?

InfoGovNuggets

Does having too much information limit your “reach”? “The Online Tool That Helps—and Hinders?—College Applicants,” The Wall Street Journal , May 4, 2019. Application shows where earlier classes report what colleges they applied to and where they got accepted. May result in students not applying to schools that they might get into.

IT 28
article thumbnail

What’s wrong with this picture?

InfoGovNuggets

“In Reversal, NIH to Allow Doctors to Speak to Investigators,” The Wall Street Journal , May 4, 2019. The National Institutes of Health (a government body) was refusing to allow two senior doctors to speak to safety investigators from another federal government body. How can one government agency think it has the power to prevent its employees from talking to federal investigators from another agency?