Wed.Sep 25, 2019

article thumbnail

Facial Recognition: Balancing Security vs. Privacy

Data Breach Today

Implementing Technology at Airports Raises Concerns Airports across the globe are increasingly leveraging facial recognition technology to verify and authenticate passengers. But some privacy advocates have raised concerns, especially in India, where several airports are ramping up facial recognition programs.

Privacy 181
article thumbnail

New Emergency Communications Plan Released by CISA

Dark Reading

The Cybersecurity and Infrastructure Security Agency's latest version of the National Emergency Communications Plan comes after a two-year process to improve the cybersecurity and flexibility of the nation's emergency communications.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST to Finalize Privacy Framework Soon

Data Breach Today

Agency Now Accepting Comments on Latest Draft The National Institute of Standards and Technology expects to release its much anticipated privacy framework by year's end. It's now accepting comments on the latest draft.

Privacy 175
article thumbnail

Czech Intelligence ‘s report attributes major cyber attack to China

Security Affairs

The Czech Intelligence agency blames China for a major cyber attack that hit a key government institution in the Czech Republic in 2018. According to a report published by the NUKIB Czech Intelligence agency, China carried out a major cyber attack on a key government institution in the Czech Republic last year. The report issued by the NUKIB agency states that the attack “was almost certainly carried out by a state actor or a related group,” and “a Chinese actor” is the m

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Did GandCrab Gang Fake Its Ransomware Retirement?

Data Breach Today

Evidence Mounts That Sodinokibi Ransomware Is GandCrab Gang's 'Retirement' Plan Did the gang behind GandCrab fake its retirement? Security experts say there's mounting evidence that the operators of the notorious ransomware-as-a-service operation only announced their retirement after ramping up the rival Sodinokibi/REvil service.

More Trending

article thumbnail

'Privacy by Design': Building Better Apps

Data Breach Today

Technology companies often don't build in controls to protect privacy during the application development process, says Jason Cronk, a lawyer and privacy engineer. But using "privacy by design" principles during software development can help avoid trouble, he says.

Privacy 169
article thumbnail

Magecart Group Targets Routers Behind Public Wi-Fi Networks

Threatpost

Magecart Group 5 has been spotted testing and preparing code to be injected onto commercial routers - potentially opening up guests connecting to Wi-Fi networks to payment data theft.

77
article thumbnail

Healthcare Cybersecurity Info Sharing Resource Unveiled

Data Breach Today

A new resource designed to help healthcare organizations of all sizes engage in cybersecurity information sharing is now available. Errol Weiss, who helped create the "cybersecurity matrix," describes how to use it.

article thumbnail

Ineffective Package Tracking Facilitates Fraud

Schneier on Security

This article discusses an e-commerce fraud technique in the UK. Because the Royal Mail only tracks packages to the postcode -- and not to the address - it's possible to commit a variety of different frauds. Tracking systems that rely on signature are not similarly vulnerable.

IT 76
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Russia-Backed APT Groups Compete With Each Other: Report

Data Breach Today

Researchers Find That State-Sponsored Cyberespionage Groups Seldom Share Code APT groups that are backed by the Russian government rarely share code with each other, fostering a competitive landscape, according to a new report. This shows that Russia is willing to push the limits of its sophisticated cyber capabilities, researchers conclude.

article thumbnail

The Beginner's Guide to Denial-of-Service Attacks: A Breakdown of Shutdowns

Dark Reading

DoS attacks come in many varieties (not just DDoS). This simple set of descriptions will help you understand how they're different - and why each and every one is bad.

78
article thumbnail

Heyyo dating app left its users’ data exposed online

Security Affairs

Another day, another embarrassing data leak made the headlines, the online dating app Heyyo left a server exposed on the internet. The online dating app Heyyo left a server exposed on the internet without protection, data were stored on an Elasticsearch instance. The exposed data included personal details, images, location data, phone numbers, and dating preferences for nearly 72,000 users.

IT 75
article thumbnail

Beginning Fuzz Cycle Automation: Improving Testing and Fuzz Development with Coverage Analysis

ForAllSecure

In my previous post , we covered using bncov to do open-ended coverage analysis tasks to inform our testing. This time we’ll take a look at how to write better tests in the form of harness programs (also known as fuzz drivers, programs written to exercise specific parts of the code) that we will use for fuzz testing.

73
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Drafter of CCPA Ballot Initiative Filing New Privacy Proposal for the 2020 Ballot

Hunton Privacy

On September 24, 2019, Alastair Mactaggart, drafter of the 2018 California ballot initiative that served as the basis for the California Consumer Privacy Act of 2018 (“CCPA”), announced that he is filing a new initiative for California’s November 2020 ballot, the California Privacy Enforcement Act (“CPEA”). According to a press release about the initiative, the CPEA would amend the CCPA to: create new rights around the use and sale of sensitive personal information ( e.g. , health, financial, ra

Privacy 72
article thumbnail

How SMEs can improve their data protection practices

IT Governance

SMEs (small and medium-sized enterprises) tend to be the hardest hit by cyber attacks – and they only have themselves to blame. A 2018 InsuranceBee survey found that 83% of organisations didn’t have any money reserved to recover from a cyber attack, and a quarter were unaware that security incidents had significant financial consequences. Even more frustratingly, 52% of organisations didn’t think this was a problem, because they considered it unlikely that they would be the victim of a cyber att

article thumbnail

When Compliance Isn't Enough: A Case for Integrated Risk Management

Dark Reading

Why governance, risk, and compliance solutions lull companies into a false sense of security, and how to form a more effective approach.

article thumbnail

My Revolut bank accounts are disrupted - they've locked me out of them!

Collaboration 2.0

My first hand experiences being locked out of my Revolut accounts and being kept in outer space by their support

84
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Who pays in the cashless society?

CGI

Who pays in the cashless society? pooja.cs@cgi.com. Wed, 09/25/2019 - 04:12. A seemingly relentless march toward electronic money transfers across the globe means a significant decrease in transactions involving real cash. What is behind this move, especially when using cash is free and universally understood? What does it mean for banks? Understanding what happens behind a cash transaction provides insight into some of the drivers for traditional banks.

Retail 65
article thumbnail

Cybercrooks Target U.S. Veterans with Fake Hiring Website

Threatpost

A known threat actor, Tortoiseshell, is targeting U.S. military veterans with a fake veteran hiring website that hosts malware.

article thumbnail

Microsoft's Azure Sentinel SIEM Now Generally Available

Dark Reading

The cloud-native SIEM is designed to search data from users, applications, servers, and devices running on-prem and in the cloud.

Cloud 74
article thumbnail

Beginning Fuzz Cycle Automation: Improving Testing And Fuzz Development With Coverage Analysis

ForAllSecure

In my previous post , we covered using bncov to do open-ended coverage analysis tasks to inform our testing. This time we’ll take a look at how to write better tests in the form of harness programs (also known as fuzz drivers, programs written to exercise specific parts of the code) that we will use for fuzz testing. The basic idea in both unit testing and fuzzing is that we want to thoroughly test our code to increase our confidence and get reassurance that it performs as expected in the

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Future of Account Security: A World Without Passwords?

Dark Reading

First step: Convince machines that we are who we say we are with expanded biometrics, including behaviors, locations, and other information that makes "us" us.

article thumbnail

The power (and offerings) of the Jamf Marketplace

Jamf

Our recent webinar highlights seven tools/services that integrate well with Jamf to provide a great experience for end users and admins alike.

66
article thumbnail

GandCrab Developers Behind Destructive REvil Ransomware

Dark Reading

Code similarities show a definite technical link between the malware strains, Secureworks says.

article thumbnail

The power (and offerings) of the Jamf Marketplace

Jamf

Our recent webinar highlights seven tools/services that integrate well with Jamf to provide a great experience for end users and admins alike.

66
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Web Attacks Focus on SQL Injection, Malware on Credentials

Dark Reading

Attackers continue to focus on bread-and-butter tactics, according to a quarterly threat report.

78
article thumbnail

More boards, C-suites getting involved in data protection strategies

Information Management Resources

A good indicator that cyber security has become a major priority for organizations is the fact that more boards and C-suites are getting involved in efforts to strengthen data protection.

article thumbnail

‘Narrator’ Windows Utility Trojanized to Gain Full System Control

Threatpost

An active APT campaign aimed at tech companies is underway, which also uses a legitimate NVIDIA graphics function.

Access 67