Tue.Jun 25, 2019

article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn’t exactly name those responsible, but said it believes the offending vendor uses the nicknames “ Yehuo ” or “ Blazefire.” What follows is a deep dive into the identity of that Chinese vendor, which appears to have a long and storied history of pushing the envelope on mobile mal

Cloud 239
article thumbnail

Chinese Hackers Play Operator With Global Telcos

Data Breach Today

Cybereason Says Theft of Subscribers' Call Metadata Could Be Linked to Chinese APT Group Attackers - likely operating from China - have been surreptitiously hacking into global telecommunications providers' networks to quietly steal metadata and track subscribers - and those with whom they communicate - as part of an ongoing cyber espionage operation, warns security firm Cybereason.

Metadata 235
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn’t exactly name those responsible, but said it believes the offending vendor uses the nicknames “ Yehuo ” or “ Blazefire.” What follows is a deep dive into the identity of that Chinese vendor, which appears to have a long and storied history of pushing the envelope on mobile mal

Cloud 157
article thumbnail

Sen. Wyden Asks NIST to Develop Secure File Sharing Standards

Data Breach Today

Senator Says Current Methods Offer Inadequate Protections U.S. Sen. Ron Wyden, D-Ore., is urging the National Institute of Standards and Technology to create new standards and guidelines for individuals and organizations to securely share sensitive documents online. He contends current security measures are inadequate.

Security 149
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Best Practices to Gain Advantage with Intelligent Information Management

AIIM

Organizations around the world invest a great deal of time and money to manage information. The expense of hardware, software, and facilities can add up quickly and costs the average organization somewhere in the range of 3.5% to 7% of annual revenue. So, if you have a $50 million company you can anticipate that you’ll spend around $3 million or so to manage your information every year.

Marketing 112

More Trending

article thumbnail

Anonymous Belgium hacker identified after dropping USB drive while throwing Molotov cocktail

Security Affairs

Belgium police have identified a member of the Anonymous Belgium collective while investigating an arson case at a local bank. The Anonymous member is a 35-year-old man from Roeselare, Belgium, was arrested after throwing a Molotov cocktail at the Crelan Bank office in Rumbeke, back in 2014. According to ZDnet , the hacker has been exposed after dropping USB drive on the ground while throwing the Molotov cocktail.

article thumbnail

Alleged AlphaBay Moderator Faces Racketeering Charge

Data Breach Today

Investigation Into Shuttered Darknet Site Continues An alleged moderator of the AlphaBay underground marketplace has been indicted for facilitating sales on the darknet site before law enforcement shut it down.

Sales 125
article thumbnail

The cyber skills gap & the diversity debate

Thales Cloud Protection & Licensing

Originally published in ITProPortal on July 13, 2019. Scarcity in talent means there is a critical deficit in developer security training. Organisations across the globe are suffering a cybersecurity workforce “gap” of around 2.9 million employees today, according to the latest estimates from (ISC)², the world’s leading cybersecurity and IT security professional organisation.

article thumbnail

Announcing Enterprise Suite 5.0

Micro Focus

Rapid mainframe app delivery, with even greater scale and skill Digital means change and change, without care, means risk. Enter stage left the latest mainframe application modernization update from Micro Focus which, as Derek Britton explains, is designed to tackle today’s most taxing core application delivery challenges. Dealing with disruption: the DX Effect This week.

Risk 91
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Opportunity to Comment: Draft Use Cases for Social Media

National Archives Records Express

We are requesting comments on the draft Use Cases for Social Media as part of our Federal Electronic Records Modernization Initiative (FERMI). Through FERMI, we have been working to improve the way agencies acquire ERM services and solutions. The Use Cases are a part of the Electronic Records Management Federal Integrated Business Framework (ERM-FIBF) and can serve as a starting point for agencies when seeking to procure services or solutions to manage electronic records.

article thumbnail

Rethinking the detection of child sexual abuse imagery on the Internet

Elie

Over the last decade, the illegal distribution of child sexual abuse imagery (CSAI) has transformed alongside the rise of online sharing platforms. In this paper, we present the first longitudinal measurement study of CSAI distribution online and the threat it poses to society's ability to combat child sexual abuse. Our results illustrate that CSAI has grown exponentially to nearly 1 million detected events per month exceeding the capabilities of independent clearinghouses and law enforcement to

Paper 85
article thumbnail

The Rise of Silence and the Fall of Coinhive

Dark Reading

Cryptomining will exist as long as it remains profitable. One of the most effective ways to disrupt that activity is to make it too expensive to run cryptomining malware in your network.

IT 88
article thumbnail

OSX/Linker, a new piece of Mac malware that exploits Gatekeeper bypass

Security Affairs

Mac security software firm Intego has spotted a new Mac malware dubbed OSX/Linker that exploits a recently disclosed macOS Gatekeeper vulnerability. Experts at Mac security software firm Intego discovered a new piece of Mac malware dubbed OSX/Linker that exploits a recently disclosed macOS Gatekeeper bypass vulnerability. The Apple Gatekeeper is designed to protect OS X users by performing a number of checks before allowing an App to run.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

European Commission Publishes Results of Surveys on One Year of GDPR Application

Hunton Privacy

To mark the GDPR’s one-year anniversary, the European Commission recently published the results of two surveys meant to illuminate the public’s awareness of the GDPR and its practical applications. Special Eurobarometer 487a – GDPR Report. The first survey, the special Eurobarometer 487a (the “Eurobarometer”), was meant to elucidate the public’s awareness of the GDPR, as well as the public’s practical experiences and opinions of data protection issues more generally.

GDPR 80
article thumbnail

What to do in Toronto outside of Enterprise World

OpenText Information Management

Are you heading to Enterprise World 2019 in Toronto on July 9-11? While the event will keep you busy with keynotes, learn paths, breakouts and certification, you might just have time to enjoy the beautiful city of Toronto during your trip! Take a look at these fun activities you can do to get the full … The post What to do in Toronto outside of Enterprise World appeared first on OpenText Blogs.

80
article thumbnail

Companies on Watch After US, Iran Claim Cyberattacks

Dark Reading

With the cyber conflict between the United States and Iran ramping up, companies traditionally targeted by the countries - such as those in the oil and gas and financial industries - need to bolster their security efforts, experts say.

article thumbnail

Upcoming Webinar: Consumer-Permissioned Data Sharing: Risks, Gaps and Solutions

Data Matters

Data aggregators and fintech providers are now offering services that let consumers manage their finances using information from multiple accounts at multiple financial institutions. This kind of consumer data access raises serious questions about the relationship between financial institutions and consumer-designated third parties. This webinar will cover the risks that come with consumer-permissioned information sharing, current gaps and solutions in the existing legal framework to address the

Risk 68
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Florida City Pays Ransomware

Schneier on Security

Learning from the huge expenses Atlanta and Baltimore incurred by refusing to pay ransomware, the Florida City of Riveria Beach decided to pay up. The ransom amount of almost $600,000 is a lot, but much cheaper than the alternative.

article thumbnail

ELAR at SOAS to create new online archive to safeguard the world’s disappearing languages

Preservica

ELAR at SOAS University of London, will use Preservica to protect and provide greater online access to over 16,000 hours of audio-visual recordings of endangered languages. Preservica, market leaders in active digital preservation, has announced the Endangered Languages Archive (ELAR) , part of SOAS University of London , will use its cloud-hosted digital preservation and discovery platform to safeguard and increase access to their extensive multimedia collection of endangered languages.

article thumbnail

A Pair of Foundational Concepts

ARMA International

The following is an excerpt from the ARMA Guide to the Information Profession. Words matter and word choices matter. In any profession that is looking to move forward in maturity, there are often vernacular issues that make gaining a comprehensive understanding of the profession a challenge. This is one of the reasons bodies of knowledge are so incredibly helpful: they help to clarify the vocabulary of a profession. ?

article thumbnail

Email Threats Continue to Grow as Attackers Evolve, Innovate

Dark Reading

Threat actors increasingly using malicious URLs, HTTPS domains, file-sharing sites in email attacks, FireEye says.

87
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How the IBM Integrated Analytics System makes data scientists happy at Capitalogix

IBM Big Data Hub

In part one of the Capitalogix data science story, I focused on their strategic need for a data platform that supports speed, data variety and custom-built algorithms to find advantages for their business. A key success driver: they worked to make life better for the people on the front lines of delivering insights—their data scientists.

article thumbnail

How to Avoid Becoming the Next Riviera Beach

Dark Reading

Be prepared by following these five steps so you don't have to pay a ransom to get your data back.

91
article thumbnail

Global data governance takes center stage at the Osaka G20 Summit

Information Management Resources

We’re witnessing tremendous global momentum behind data governance right now. Governments understand that everything we do with personal data should be done thoughtfully and for the right purposes.

article thumbnail

Newly-Discovered Malware Targets Unpatched MacOS Flaw

Threatpost

Researchers have found samples of malware that targets a recently-disclosed, unpatched MacOS vulnerability.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

AWS Makes Control Tower & Security Hub Generally Available

Dark Reading

Security Hub aims to manage security across an AWS environment; Control Tower handles security and compliance for multi-account environments.

article thumbnail

Evite cualquier ataque, mientras avanza en su transformación digital

DXC Technology

No importa en qué etapa está su organización en el viaje hacia la transformación digital. Tenga cuidado con los peligros que le acechan por el camino. Verá cómo otros compañeros de viaje han sufrido ataques una y otra vez, por la acción de cibercriminales que causan estragos con ransomware, ataques distribuidos de denegación de servicio, […].

article thumbnail

AWS CISO Talks Risk Reduction, Development, Recruitment

Dark Reading

Steve Schmidt says limiting access to data has dramatically changed the security posture across Amazon Web Services.

Risk 82