Mon.Oct 03, 2022

article thumbnail

GUEST ESSAY: Restore Us Institute (RUI) aims to protect Americans from online harms and crimes

The Last Watchdog

How did America and Americans regress to being much less secure than before the Internet? Everyone knows the many amazing conveniences, benefits, and advances the Internet has enabled. What everyone doesn’t know is how irrational the Internet’s utopian founding premises have proven to be concerning America’s and Americans’ security over the last quarter century.

article thumbnail

Detecting Deepfake Audio by Modeling the Human Acoustic Tract

Schneier on Security

This is interesting research : In this paper, we develop a new mechanism for detecting audio deepfakes using techniques from the field of articulatory phonetics. Specifically, we apply fluid dynamics to estimate the arrangement of the human vocal tract during speech generation and show that deepfakes often model impossible or highly-unlikely anatomical arrangements.

Paper 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Finnish intelligence warns of Russia’s cyberespionage activities

Security Affairs

The Finnish Security Intelligence Service ( SUPO ) warns Russia will highly likely intensify its cyber activity over the winter. The Finnish Security Intelligence Service ( Suojelupoliisi or SUPO ) warn of a highly likely intensification of cyberespionage activities conducted by Russia-linked threat actors over the winter. According to the SUPO, future NATO membership will make the country a privileged target for Russian intelligence and influence operations.

article thumbnail

ZINC Hackers Leverage Open-source Software to Lure IT Pros

eSecurity Planet

ZINC, a sub-group of the notorious North Korean Lazarus hacking group, has implanted malicious payloads in open-source software to infiltrate corporate networks, Microsoft’s threat hunting team has reported. PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and the muPDF/Subliminal Recording software installer have been backdoored to perform a wide range of social engineering campaigns that started in April 2022.

IT 114
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

German Police Collar Alleged Phishing Cybercriminals

KnowBe4

The Bundeskriminalamt (BKA), Germany's federal criminal police, raided three homes on Thursday, September 29th, in the course of an investigation of a cyber criminal operation the BKA says netted approximately €4,000,000 from its victims by using phishing tactics. Two suspects were arrested and charged; the disposition of the third individual will depend upon the results of further investigation. .

Phishing 108

More Trending

article thumbnail

CHINA: Clarifications of data classification and grading requirements

DLA Piper Privacy Matters

Under the Data Security Law, organisations are required to classify the data they process according to their level of significance. Albeit a draft, the recent Draft Standard on Information Security Technology Network Data Classification and Grading Requirements (“ Draft ”) highlights the principles and methods for different industries, fields, localities, departments, and data processors to classify and grade data.

article thumbnail

The High Cost of Living Your Life Online

WIRED Threat Level

Constantly posting content on social media can erode your privacy—and sense of self.

Privacy 125
article thumbnail

How AWS, Cisco, Netflix & SAP Are Approaching Cybersecurity Awareness Month

Dark Reading

This year's theme is "See Yourself in Cyber," and these security folks are using the month to reflect on the personal factor in cybersecurity.

article thumbnail

Trustworthy Data - How to Leverage Jamf to Satisfy ISO/IEC 19770-1

Jamf

This JNUC presentation will demonstrate how to leverage the Jamf discovery and reporting to meet and exceed the 19770-1 requirements and achieve the cost optimization results ITAM programs promise.

52
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Name That Edge Toon: Mumbo Dumbo

Dark Reading

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

81
article thumbnail

App Therapy 101

Jamf

Take your Apple MDM at school to the next level by learning how to turn your collection of apps into a well-curated and easy-to-navigate app catalog with Jamf Self Service in this JNUC 2022 educational session.

MDM 52
article thumbnail

Trustworthy AI helps provide equitable preventative care for diabetics

IBM Big Data Hub

There are over 30 million people in America who have diabetes, and people with diabetes need to remain vigilant about their health. They need the extra attention and resources provided by their healthcare systems because, unfortunately, around 38% to 40% of people with diabetes end up visiting the ER due to complications. Healthcare organizations – both providers and payers – across the nation are seeking transformative new ways to render quick aid to vulnerable members.

Risk 52
article thumbnail

I say setup, you say reset

Jamf

Learn how a speech pathology clinic expanded the reach of their therapy for children and families with iPads and Apple device management including Jamf Setup and Jamf Reset.

52
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Data Protection Professionals like it Hot – 7 Hot topics and trends in data Privacy Today via LinkedIn

IG Guru

Check out the post here.

article thumbnail

Running Jamf Pro at scale for macOS and iOS devices

Jamf

Discover the lessons learned by SAP admins while scaling up their Jamf Pro instances for macOS and iOS devices, in this JNUC 2022 session.

52
article thumbnail

List of Data Breaches and Cyber Attacks in September 2022 – 35.6 Million Records Breached

IT Governance

Welcome to our September 2022 list of data breaches and cyber attacks. Compared to August, it was a comparatively quiet month, as we identified 88 publicly disclosed security incidents and 35,566,046 compromised records. As always, you can find the full list below – although, perhaps for the last time, they are broken down into their respective categories.

article thumbnail

Reflected XSS bugs in Canon Medical ’s Vitrea View could expose patient info

Security Affairs

Trustwave researchers discovered two XSS flaws in Canon Medical ’s Vitrea View tool that could expose patient information. During a penetration test, Trustwave Spiderlabs’ researchers discovered two reflected cross-site scripting (XSS) vulnerabilities, collectively as CVE-2022-37461, in third-party software for Canon Medical’s Vitrea View. The Vitrea View tool allows viewing and securely share medical images through the DICOM standard.

Access 86
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.