Tue.Aug 14, 2018

article thumbnail

FBI Warns Of Pending Large Scale ATM Cashout Strike

Data Breach Today

Attack May Pivot On A Data Breach At 'Unknown Card Issuer' Agency Says The FBI warns that cybercriminals are planning a large-scale operation aimed at emptying ATMs, a type of attack that has caused swift and costly losses for financial institutions. The attack may utilize data from a breach of an unknown card issuer, the FBI says.

article thumbnail

Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw

Threatpost

The attack targets IKE’s handshake implementation used for IPsec-based VPN connections, opening the door for MiTM attacks or for bad actors to access data carried in VPN sessions.

Access 58
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Should Staff Ever Use Personal Devices to Access Patient Data?

Data Breach Today

Incident at Oklahoma Dept. of Veterans Affairs Spotlights Tough Choices When is it acceptable to allow healthcare workers to use their personal smartphones to access patient records? A recent incident at the Oklahoma Department of Veterans Affairs spotlights the dilemma.

Access 133
article thumbnail

Microsoft Flaw Allows Full Multi-Factor Authentication Bypass

Threatpost

This is similar to taking a room key for a building and turning it into a skeleton key that works on every door in the building.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Will AI and ML Make Security Cheaper?

Data Breach Today

Artificial intelligence and machine learning will have a significant impact on lowering the cost of securing an organization because it will reduce the need for advanced skillsets, predicts Rapid7's Richard Moseley.

More Trending

article thumbnail

'Foreshadow' Flaw Undermines the Intel CPU Secure Enclave

WIRED Threat Level

In the spirit of Meltdown and Spectre, a new vulnerability called Foreshadow could expose Intel's secure enclave to attack.

article thumbnail

Victims Lose Access to Thousands of Photos as Instagram Hack Spreads

Threatpost

In a probable quest to build a botnet, someone is hacking Instagram accounts, deleting handles, avatars and personal details, and linking them to a new email address.

Access 55
article thumbnail

Chelsea Manning to discuss Cambridge Analytica during London visit

The Guardian Data Protection

The whistleblower will speak in October at the Institute of Contemporary Arts dinner Chelsea Manning will discuss the Cambridge Analytica scandal and other issues around technology and democracy during her first appearance in the UK later this year. Manning was released from prison after being sentenced in 2013 in violation of the US Espionage Act for disclosing classified government documents to WikiLeaks.

article thumbnail

Intel CPUs Undermined By Fresh Speculative Execution Flaws

Threatpost

'Foreshadow" and other vulnerabilities in Intel processors can be exploited to steal sensitive information stored inside personal computers or personal clouds.

Cloud 54
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Key Reuse opens to attacks on IPsec IKE, Cisco, Huawei, ZyXEL products are affected

Security Affairs

Security expert demonstrated that reusing a key pair across different versions and modes of IPsec IKE open the doors to attacks. Many vendors are affected. Security researchers from the University of Opole in Poland and the Ruhr-University Bochum in Germany have devised a new attack technique that allows cracking encrypted communications. The products of several vendors, including Cisco, Huawei, ZyXEL, and Clavister, are vulnerable to the attack.

article thumbnail

Google Tracks its Users Even if They Opt-Out of Tracking

Schneier on Security

Google is tracking you, even if you turn off tracking : Google says that will prevent the company from remembering where you've been. Google's support page on the subject states: "You can turn off Location History at any time. With Location History off, the places you go are no longer stored." That isn't true. Even with Location History paused, some Google apps automatically store time-stamped location data without asking.

IT 45
article thumbnail

Ohio Law Provides Safe Harbor from Tort Claims Related to Data Breaches

Hunton Privacy

On August 3, 2018, Ohio Governor John Kasich signed into law Senate Bill 220 (the “Bill”), which provides covered entities with an affirmative defense to tort claims, based on Ohio law or brought in an Ohio court, that allege or relate to the failure to implement reasonable information security controls which resulted in a data breach. According to the Bill, its purpose is “to be an incentive and to encourage businesses to achieve a higher level of cybersecurity through voluntary action.

article thumbnail

A 20-year OpenText journey

OpenText Information Management

For Xavier Chaillot, VP of Global Enterprise Sales Operations, his career journey has involved a myriad of roles across multiple functions at OpenText™ over 20 years, as well as a relocation journey that spans close to 6,000 kilometers (or >3,700 miles!). Here’s Xavier’s OpenText story: Can you tell us about how you started out with … The post A 20-year OpenText journey appeared first on OpenText Blogs.

Sales 45
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

ThreatList: Almost All Security Pros Believe Election Systems Are at Risk

Threatpost

Respondents in a survey from Venafi said they believe voting machines, encrypted communications from polling stations and databases that store voter registration data are all vulnerable.

Risk 43
article thumbnail

Flaws in Mobile Point of Sale Readers Displayed at Black Hat

Dark Reading

While security is high overall for mPOS tools from companies like Square, PayPal, and iZettle, some devices have vulnerabilities that attackers could exploit to gather data and cash.

Sales 43
article thumbnail

Black Hat Exclusive Video: The IoT Security Threat Looms for Enterprises

Threatpost

Armis' CTO discusses the top IoT security issues in the marketplace today - and whether device manufacturers will start to prioritize security.

IoT 46
article thumbnail

Election Websites, Backend Systems Most at Risk of Cyberattack in Midterms

Dark Reading

Both adult and kid hackers demonstrated at DEF CON how the hackable voting machine may be the least of our worries in the 2018 elections.

Risk 49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Metadata from Photos Leads to Dismissal of Case Against New York City: eDiscovery Case Law

eDiscovery Daily

In Lawrence v. City of New York, et al., No. 15cv8947 (S.D.N.Y. July 27, 2018) , New York Senior District Judge William H. Pauley, III granted in part and denied in part the defendants’ motion for sanctions, ruling to dismiss the case against the defendants, but denying the motion for sanctions against the plaintiff’s counsel and denying the motion for reimbursement of attorney’s fees, stating “an award of attorney’s fees ‘would be a hollow victory … as it would likely be uncollectible.’”.

article thumbnail

Microsoft ADFS Vulnerability Lets Attackers Bypass MFA

Dark Reading

The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service.

article thumbnail

Episode 108: DEF CON’s Car Hacking Village and is the Open Source Model Failing on Security

The Security Ledger

In this week’s podcast (#108), sponsored by CA Veracode: hacker summer camp wrapped up on Sunday, as the 26th annual DEF CON conference concluded at Caesar’s Palace in Las Vegas. Hacks of connected and smart vehicles were a big theme again this year. We sat down with the organizers of DEF CON’s Car Hacking Village to see what was news at. Read the whole entry. » Related Stories Can Self Driving Cars Be Secured?

article thumbnail

Now Available, Square 9 Releases GlobalSearch 4.5.2

Info Source

NEW HAVEN, CONN., August 14, 2018 – Square 9 Softworks, a leading provider of award-winning process automation solutions, has announced the latest release of its Enterprise Content Management software, GlobalSearch 4.5.2. Slated as a summer maintenance release, several new feature enhancements have been added to the software to excite both the reseller and user communities.

Mining 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Are you ready to fire up your IT investments?

OpenText Information Management

Microsoft’s’ annual Ignite conference takes place from September 24-28, 2018 at the Orlando Orange Convention Center. This annual gathering attracts over 26,000 IT professionals and decision makers and OpenText™ will once again be attending. Stop by the OpenText booth #1910 to learn about the newest products and solutions from OpenText product experts, and find out what’s … The post Are you ready to fire up your IT investments?

IT 40
article thumbnail

Google Services Track User Movements In Privacy Faux Pas

Threatpost

A recent report found that Google services - with functions like checking maps, the weather, and search - are tracking users even when they deny permission.

Privacy 43
article thumbnail

Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms

Dark Reading

Both adult and kid hackers demonstrated at DEF CON how the hackable voting machine may be the least of our worries in the 2018 elections.

Risk 45
article thumbnail

Patch Tuesday: Microsoft Addresses Two Zero-Days in 60-Flaw Roundup

Threatpost

Microsoft rolled out 60 patches for its Patch Tuesday release, impacting 19 critical flaws and 39 important flaws.

IT 43
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

'Election Protection' Aims to Secure Candidates Running for Office

Dark Reading

The kit is designed to prevent credential theft targeting people running for federal, state, and local elected offices.

article thumbnail

Podcast: Black Hat and DEF CON 2018 Wrap

Threatpost

The Threatpost team debriefs on the top news and topics from last week's Black Hat and DEF CON conferences.

IoT 41
article thumbnail

Equifax Avoided Fines, but What If.?

Dark Reading

Let's imagine the consequences the company would have faced if current laws had been on the books earlier.

45