Mon.Nov 26, 2018

article thumbnail

Half of all Phishing Sites Now Have the Padlock

Krebs on Security

Maybe you were once advised to “look for the padlock” as a means of telling legitimate e-commerce sites from phishing or malware traps. Unfortunately, this has never been more useless advice. New research indicates that half of all phishing scams are now hosted on Web sites whose Internet address includes the padlock and begins with “[link].

Phishing 274
article thumbnail

UK Parliament Seizes Internal Facebook Privacy Documents

Data Breach Today

Bikini App Developer's Lawsuit Discovery Feeds Parliament's Facebook Probe A British lawmaker has obtained sealed U.S. court documents to reveal internal Facebook discussions about data security and privacy controls, as Parliament probes Facebook and other social media firms, as well as Russian interference and fake news.

Privacy 230
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

Michigan is known as the Wolverine State in deference to the ornery quadruped that roams its wild country. However, after a recent visit to Detroit, Ann Arbor and Grand Rapids as a guest of the Michigan Economic Development Corp., or MEDC, I’m prepared to rechristen Michigan the Cybersecurity Best Practices State. Related: California’s pioneering privacy law ripples through other states.

article thumbnail

Court Approves Lenovo's $7.3 Million Adware Settlement

Data Breach Today

Manufacturer Preinstalled Superfish Visual Discovery Adware on 800,000 Laptops A court has preliminarily approved Lenovo's proposal to pay $7.3 million to settle a consolidated class action lawsuit filed over its preinstallation of Superfish adware onto laptops purchased by 800,000 consumers. Superfish, which has dissolved, already reached a $1 million settlement agreement.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware attack disrupted emergency rooms at Ohio Hospital System

Security Affairs

Ransomware attacks continue to threaten the healthcare industry, the last incident in order of time impacted the Ohio Hospital System. The ransomware attack infected computer systems at the East Ohio Regional Hospital and Ohio Valley Medical Center reportedly caused the disruption of the hospitals’ emergency rooms. The malware hit the Ohio Hospital System on Friday, Nov. 23, evening, according to The Times Ledger newspaper, the hospitals were not able to accept ER patients via emergency re

More Trending

article thumbnail

When Do You Need to Report a Data Breach?

Security Affairs

The way in which you respond to a data breach has a significant impact on how severe its consequences are. Reporting an event is one action that can help. The number of data breaches that were tracked in the U.S. in 2017 totaled 1,579, a nearly 44.7 percent increase from the previous year. Data breaches, incidents in which personal information is accidentally or unlawfully stolen, lost, disclosed, accessed, altered or destroyed, can happen to organizations of any size and sector.

article thumbnail

A Strong Message on Improper PHI Disclosure to News Media

Data Breach Today

HHS Imposes Penalty on Small Clinic and Demands Action In at least the fourth federal HIPAA case involving improper disclosure of patient information to the media, federal regulators have slapped a three-doctor practice in Connecticut with a financial penalty.

183
183
article thumbnail

More than half of consumers would consider legal action if their data was compromised during a breach

Thales Cloud Protection & Licensing

Six months on from the legal implementation of the General Data Protection Regulation (GDPR), a third of consumers have admitted they still aren’t confident that the companies they interact with comply with the regulation. Furthermore, 16% of organisations across the UK and Germany confessed to not having been ready in time for the legislation, according to our research into consumer and business perceptions of the GDPR, six months after its roll-out.

GDPR 81
article thumbnail

Linux Kernel is affected by two DoS vulnerabilities still unpatched

Security Affairs

Linux Kernel is affected by two denial-of-service (DoS) flaws, both vulnerabilities are NULL pointer deference issues. Linux Kernel is affected by two denial-of-service (DoS) vulnerabilities, the issues impact Linux kernel 4.19.2 and previous versions. Both flaws are rated as Medium severity and are NULL pointer deference issues that can be exploited by a local attacker to trigger a DoS condition.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

BELGIUM: Belgian DPA provides first status update after six months of GDPR

DLA Piper Privacy Matters

The Belgian DPA has released a first status update six months after the GDPR became applicable. Some interesting statistics relate to the number of data breach notifications and complaints received. In the six months ?since May 25th, the Belgian Data Protection Authority was notified of 317 data breaches (compared to last year when only 13 breaches were notified).

GDPR 83
article thumbnail

Experts found a new powerful modular Linux cryptominer

Security Affairs

Security experts from Russian antivirus firm Dr.Web have discovered a new strain of Linux cryptominer tracked as Linux.BtcMine.174. The Linux cryptominer has a multicomponent structure that implements a broad range of features in over 1,000 lines of code. When the Monero Linux cryptominer is first executed it checks whether the server, from which the Trojan will subsequently download additional modules, is available.

Mining 81
article thumbnail

The Fifth Edition of The Privacy, Data Protection and Cybersecurity Law Review is Available

Data Matters

The fifth edition of The Privacy, Data Protection and Cybersecurity Law Review takes a look at the evolving global privacy, data protection and cybersecurity landscape in a time when mega breaches are becoming more common, significant new data protection legislation is coming into effect, and businesses are coming under increased scrutiny from regulators, Boards of Directors and their customers.

article thumbnail

Hacker stole $1m from Silicon Valley executive via SIM swap

Security Affairs

Nicholas Truglia, a 21-years-old man from New York, has stolen $1 million from Silicon Valley executive via SIM swap, and targeted other indivisuals. Nicholas Truglia, a 21-years-old man from New York, has been accused of stealing $1 million from Silicon Valley executive via SIM swap. He gained access to his phone number and used it impersonate the executive and steal $500,000 from two accounts he had at Coinbase and Gemini.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Ransomware Attack Forced Ohio Hospital System to Divert ER Patients

Dark Reading

Malware infection fallout sent ambulances away from East Ohio Regional Hospital and Ohio Valley Medical Center over the Thanksgiving weekend.

article thumbnail

UK Parliament seized confidential Facebook docs to investigate its data protection policies.

Security Affairs

UK Parliament Seizes seized confidential Facebook documents from the developer of a now-defunct bikini photo searching app to investigate its data protection policies. A British lawmaker obliged a visiting tech executive to share the files ahead of an international hearing that parliament is hosting on Tuesday to gather info into disinformation and “fake news.”.

IT 78
article thumbnail

Buckle Up: A Closer Look at Airline Security Breaches

Dark Reading

Cyberattacks on airports and airlines are often unrelated to passenger safety - but that's no reason to dismiss them, experts say.

article thumbnail

Belgian DPA Publishes Post-GDPR Activity Review

Hunton Privacy

On November 23, 2018, the Belgian Data Protection Authority (the “Belgian DPA”) published a review of its activities since the EU General Data Protection Regulation (“GDPR”) became applicable on May 25, 2018 (the “Review”). The Review is available in French and in Dutch. In the Review, the Belgian DPA makes the following observations: The GDPR in Numbers.

GDPR 72
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

GDPR fine for German chat app platform

IT Governance

Knuddels, a German chat app, has been fined €20,000 (£17,700) for breaching more than 300,000 login credentials. It’s the first fine for a violation of the EU GDPR (General Data Protection Regulation) issued by the LfDI (Baden-Wüttemberg data protection authority). Some have criticised the apparent leniency of the fine, citing the organisation’s clear violations of the Regulation’s requirements concerning encryption.

GDPR 70
article thumbnail

7 Real-Life Dangers That Threaten Cybersecurity

Dark Reading

Cybersecurity means more than bits and bytes; threats are out there IRL, and IT pros need to be prepared.

article thumbnail

Deployed in the cloud, OpenText Media Management delivers new features and functionality

OpenText Information Management

Successful marketing departments know the value of the cloud. To succeed in today’s competitive, digital world, you need a Digital Asset Management (DAM) solution that keeps up with billions of assets, thousands of users, and hundreds of channels, no matter where they’re kept. With OpenText™ Release 16 Enhancement Pack 5 (EP5), we’ve taken OpenText™ Media Management … The post Deployed in the cloud, OpenText Media Management delivers new features and functionality appeare

Cloud 65
article thumbnail

USPS Web Vuln Exposes Data of 60 Million

Dark Reading

The US Postal Service recently fixed a security bug that allowed any USPS.com account holder to view or change other users' data.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CIPL Responds to NTIA Request for Comment on Developing the Administration’s Approach to Consumer Privacy

Hunton Privacy

The Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP recently submitted formal comments to the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) in response to its request for public comments on developing the administration’s approach to consumer privacy. In its comments , CIPL commends NTIA for initiating a renewed national debate on updating the U.S. privacy framework, and notes that its approach—starting with the in

Privacy 61
article thumbnail

User Confidence in Smartphone Security Abysmal

Threatpost

Sixty-six of percent of phone users said they had suffered data-related harm: 11 percent suffered identity theft, 22 percent account hacking, 14 percent credit cards hacking and 12 percent financial fraud. .

article thumbnail

Understanding the new ePrivacy Directive and how it differs from GDPR

Information Management Resources

The ePR is expected to address electronic communications, including text messages, email, chat applications and IoT devices. Think of the ePR as the traffic cop for data as it travels between controllers and processors governed by GDPR.

GDPR 63
article thumbnail

Increased automation in OpenText Media Management delivers significant benefits

OpenText Information Management

All marketers know that time is money. Whether you’re putting in a marketing request or scheduling media delivery, reducing the time it takes to complete each action can lead to significant cost and resource savings. That’s why we’ve made strategic innovations to automation in the latest release of OpenText™ Media Management (OTMM) – and that’s … The post Increased automation in OpenText Media Management delivers significant benefits appeared first on OpenText Blogs.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Transforming into a CISO Security Leader

Dark Reading

Are you thinking of changing your career route from techie to CISO? Are you making the right choice? Only you know for sure.

article thumbnail

USPS, Amazon Data Leaks Showcase API Weaknesses

Threatpost

The incidents affected millions, just as Black Friday, Cyber Monday and the holiday shopping season kicked off.

Cloud 70
article thumbnail

Books which are worth your time: Q4

Adam Shostack

Nonfiction. The Brothers: John Foster Dulles, Allen Dulles, and Their Secret World War is a fascinating biography of the Dulles brothers, and how the world changed through their lives and actions. One ran the State department, the other the CIA. Weapons of Math Destruction by Cathy O’Neil is an interesting overview of problems with machine learning and the ways in which it is often mis-applied.

IT 45