Fri.Mar 30, 2018

article thumbnail

Under Armour Reports Massive Breach of MyFitnessPal App

Data Breach Today

150 Million Accounts Exposed; Could Phishing Campaign Be Coming? Under Armour says an unauthorized intruder gained access to information for the accounts of 150 million users of its MyFitnessPal mobile app and website. Learn why some fear the breach could lead to a massive phishing campaign.

Phishing 150
article thumbnail

Lions and Tigers and Facebook – Oh My!

AIIM

Yep, that is what I am hearing these days, reminiscent of the scene from the Wizard of Oz when they are entering the forest, knowing that there are animals and possible danger hiding in the shadows. Yet they choose to enter anyway. Now we have Facebook, and news that information was collected and used by Cambridge Analytica. So how does this happen?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crypto-Locking Malware Hits Atlanta, Baltimore, Boeing

Data Breach Today

Leading the latest edition of the ISMG Security Report: Ransomware hits the city of Atlanta, Baltimore's 911 system as well as aviation giant Boeing. Plus, WikiLeaks and its Julian Assange get taken for a ride by Russian intelligence.

article thumbnail

10 Women in Security You May Not Know But Should

Dark Reading

The first in a series of articles shining a spotlight on women who are quietly changing the game in cybersecurity.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Road to GDPR Compliance: 12 Steps to Take Now

Data Breach Today

The European Union's General Data Protection Regulation will be enforced beginning May 25. Personal data must be protected or severe penalties may be imposed. Companies not located in the EU still need to prepare to comply with GDPR if they routinely execute transactions with EU citizens.

GDPR 100

More Trending

article thumbnail

Police Bust 20 Phishing Suspects in Italy, Romania

Data Breach Today

Arrests Came After a Two-Year Investigation of 'Highly Organized' Crime Group Police have charged 20 Romanian and Italian nationals with running spear-phishing attacks that stole more than $1 million from online bank customers. Phishing remains a favored criminal technique for harvesting account credentials and cryptocurrency, as well as corporate secrets.

Phishing 100
article thumbnail

The Under Armour Hack Was Even Worse Than It Had To Be

WIRED Threat Level

If Under Armour had protected all passwords equally, its 150-million-user MyFitnessPal breach wouldn’t have been nearly as bad.

IT 77
article thumbnail

Under Armour Reports Massive Breach of 150 Million MyFitnessPal Accounts

Threatpost

Under Armour is getting kudos for disclosing breach within weeks, but concerns remain over an unknown portion of credentials reportedly stored using the weak SHA-1 hashing function.

Privacy 53
article thumbnail

The SamSam Ransomware That Hit Atlanta Will Strike Again

WIRED Threat Level

Atlanta isn't the SamSam ransomware strain's first victim—and it won't be the last.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Weekly Update 80

Troy Hunt

It's a MASSIVE weekly update! The big news for me this week is the 1Password partnership and I've really tried to share more about how I came to the decision to work with them in this video. I've been so cautious with the way I've managed the image of HIBP to ensure it's always positioned in the right light and I wanted to delve more into that thinking here.

article thumbnail

The Cybersecurity Mandates Keep On Coming

Dark Reading

There's a good reason for the proliferation of mandates like the one in New York state, but companies may struggle to answer this question: "Are we in compliance?

article thumbnail

IT modernization in Government

OpenText Information Management

IT modernization has always been high on the agenda of government CIOs. US Government agencies now have a $500 million fund they can use for their modernization projects following the Modernizing Government Technology Act becoming law. This gives the potential for great progress to be made if agencies view their IT modernization project as a … The post IT modernization in Government appeared first on OpenText Blogs.

article thumbnail

Unlocking iPhones with Dead People's Fingerprints

Schneier on Security

It's routine for US police to unlock iPhones with the fingerprints of dead people. It seems only to work with recently dead people.

IT 53
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Accused LinkedIn, DropBox Hacker Appears in US Court After Diplomatic Battle

Dark Reading

Russian national indicted for the 2012 LinkedIn hack that led to the theft of 117 million passwords has been extradited from the Czech Republic to the US.

article thumbnail

Synthetic Identity Fraud Data: Why Financial Institutions Should Care

Rippleshot

Synthetic fraud isn’t a new phenomenon, but with an increase of incidents across the fraud ecosystem — from credit card fraud to identity theft — this problem isn’t going away anytime soon. In fact, it’s estimated that Synthetic ID fraud accounts for 85% of all identity fraud in the U.S., and continues to rise annually. A report from TransUnion reported that between 2016’s Q4 and 2017’s Q4, suspected synthetic fraud balances rose 5.2%.

40
article thumbnail

Information-driven work

MIKE 2.0

I’ve recently spoken to several executives who have more than two thousand unread emails. They all said roughly the same thing: “If someone really wants me they’ll keep trying”. Others have said the opposite, they are keen to be easy to reach. There must be a better way. Last month, I wrote about personal skills (see White collar productivity ). However, the capability of the individual is only part of the story, with the interface between roles and activities reflecting the efficiency of the wh

article thumbnail

Microsoft Fixes Bad Patch That Left Windows 7, Server 2008 Open to Attack

Threatpost

Microsoft released an out-of-band security update that corrected a faulty patch that left Windows 7 and Windows Server 2008 open to attack.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Microsoft Rushes Out Fix for Major Hole Caused by Previous Meltdown Patch

Dark Reading

Issue affects Windows 7 x64 and Windows Server 2008 R2 x64 systems.

53
article thumbnail

The Shifting Threat Landscape: From Adobe to Microsoft

eSecurity Planet

Several recent studies demonstrate significant changes in the types of threats facing companies worldwide.

40
article thumbnail

Under Armour App Breach Exposes 150 Million Records

Dark Reading

A breach in a database for MyFitnessPal exposes information on 150 million users.

46
article thumbnail

Under Armour says 150M MyFitnessPal accounts hacked

Information Management Resources

Though no payment-related or government-issued ID information was obtained, the sheer scope of the attack would make it one of the larger breaches on record.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Los datos que tiene GOOGLE sobre ti

Archives Blogs

Punto por punto: lo que Google sabe de ti sin que siquiera lo sospeches. [link]. Últimamente los medios han divulgado la información de que Facebook podría violar las reglas de privacidad accediendo a los datos personales de los usuarios. No obstante, un experto en informática revela que Google aparentemente sabe mucho más sobre sus usuarios. Un especialista en informáticas arrojó la luz sobre la actividad de Google luego del destape del caso Facebook y Cambridge Analytica.

20
article thumbnail

3 Steps to Asset Management and Software Auditing

Data Breach Today

Protecting Critical Endpoints Is Paramount for Your Business With the explosion of laptops, IoT, tablets, smartphones and other smart technologies, endpoints are the single largest group of devices inside your network today. Managing all of your assets and their software requires three foundational steps.

IoT 165
article thumbnail

El nuevo Archivo General de La Nación: de carcel a Archivo

Archives Blogs

De cárcel a espacio histórico: así se transforma el expenal de Caseros en el nuevo Archivo General de la Nación. [link]. Operarios trabajando en la losa del quinto piso y de fondo se ve el edificio original de la cárcel que fue declarado patrimonio porteño Fuente: LA NACION – Crédito: Ricardo Pristupluk. LA NACION recorrió la obra , que estaría finalizada para fin de año.

20
article thumbnail

Alabama Passes Data Breach Notification Law; Breach Laws Now on the Books in All 50 States

Data Matters

And then there were none. Alabama has joined the ranks of the other 49 states with breach notification requirements by enacting the Alabama Data Breach Notification Act of 2018 (the “Act”). The Act, which was signed into law by Alabama Governor, Kay Ivey on March 28, 2018, requires companies to provide Alabama residents with notification of a breach within 45 days of discovery.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Apagón Tecnológico: La Ciudad de Atlanta tomada por los hackers

Archives Blogs

Hackers toman como rehén al gobierno de Atlanta; piden bitcoins de rescate [link]. Qué pasaría si un grupo de criminales cibernéticos logran tener acceso a tu computadora? Un grupo de hackers conocido como SamSam, podría entrar sin problemas a tu sistema. Después, ellos mismos bloquearán todos tus archivos, les cambiarán el nombre a “Lo Siento” y tendrás una semana para pagarles miles de dólares en bitcoins; si no cumples sus demandas, los pierdes para siempre.

Sales 20
article thumbnail

Friday Squid Blogging: Market Squid in Alaskan Waters

Schneier on Security

Rising sea temperatures is causing market squid to move north into Alaskan waters. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

article thumbnail

Muerte del ex jefe de la ONU Dag Hammarskjold en 1961: ¿posible asesinato?

Archives Blogs

Jefe de ONU insta por búsqueda de archivos en investigación sobre muerte de ex secretario general. [link]. NACIONES UNIDAS, 27 mar (Xinhua) — El secretario general de las Naciones Unidas, Antonio Guterres, hizo un llamamiento este martes para que los países miembros revisen sus archivos en búsqueda de posibles evidencias sobre la muerte del ex jefe de la ONU Dag Hammarskjold en 1961.

20