Tue.Dec 22, 2020

article thumbnail

Former 'Silk Road' Associate Sentenced to 8 Months in Prison

Data Breach Today

DOJ: Michael Weigand Made False Statements About His Role With Darknet Market A key player in the now-defunct "Silk Road" darknet marketplace who hid his involvement with the creation and operation of the website has been sentenced to eight months in federal prison for making false statements to federal investigators.

Marketing 295
article thumbnail

How to Hit the Change Button – Lead Forward Through Change

AIIM

It’s hard to talk about change without quoting Charles Darwin. I think he said it best when he said: “It is not the strongest or the most intelligent who will survive, but those who can best manage change.”. Change is a necessary part of life and therefore a necessary part of life in business. Managing change isn’t resisting change. It’s working with it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU Launches Decryption Tool for Law Enforcement

Data Breach Today

Move Seen as Alternative to Weakening Encryption Europol, the European Union's law enforcement agency, and the European Commission are launching a new decryption platform to help law enforcement agencies decrypt data that has been obtained as part of a criminal investigation, a move seen as an alternative to weakening encryption.

article thumbnail

Eavesdropping on Phone Taps from Voice Assistants

Schneier on Security

The microphones on voice assistants are very sensitive, and can snoop on all sorts of data : In Hey Alexa what did I just type? we show that when sitting up to half a meter away, a voice assistant can still hear the taps you make on your phone, even in presence of noise. Modern voice assistants have two to seven microphones, so they can do directional localisation, just as human ears do, but with greater sensitivity.

Paper 130
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Police Dismantle Cybercrime 'Bulletproof Hosting Service'

Data Breach Today

Authorities Shut Down VPN That Supported Illegal Operations The FBI, Europol and other law enforcement agencies shut down a virtual private network Tuesday that was providing a "bulletproof hosting service" that allowed cybercriminals to conduct illegal operations, including ransomware attacks, while remaining hidden from police.

More Trending

article thumbnail

Critical Flaws Put Dell Wyse Thin Client Devices at Risk

Data Breach Today

Researchers: Vulnerabilities Could Allow Remote Code Execution, Files Access Researchers at CyberMDX have uncovered two significant vulnerabilities in certain Dell Wyse thin client devices that, if exploited, could allow threat actors to remotely run malicious code and access files on affected devices.

Risk 130
article thumbnail

Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing

Thales Cloud Protection & Licensing

Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing. sparsh. Tue, 12/22/2020 - 10:08. New EU restrictions could force companies to change data transfer practices and adopt more advanced data encryption methods. Traditionally, privacy has taken the form of a policy document created, housed, and referenced by the offices of general counsel and compliance at most organizations.

article thumbnail

5 Email Threat Predictions for 2021

Dark Reading

As domains get cheaper, account takeovers get easier, and cloud computing usage expands, email-borne attacks will take advantage.

Cloud 122
article thumbnail

Holiday Puppy Swindle Has Consumers Howling

Threatpost

Those buying German Shepherd puppies for Bitcoin online are in for a ruff ride.

Security 133
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Security News This Week: Russia’s SolarWinds Hack Is a Historic Mess via WIRED

IG Guru

Check out the article here. The post Security News This Week: Russia’s SolarWinds Hack Is a Historic Mess via WIRED appeared first on IG GURU.

article thumbnail

SolarWinds Campaign Focuses Attention on 'Golden SAML' Attack Vector

Dark Reading

Adversaries that successfully execute attack can achieve persistent anytime, anywhere access to a victim network, security researchers say.

Access 137
article thumbnail

Tech Giants Lend WhatsApp Support in Spyware Case Against NSO Group

Threatpost

Google, Microsoft, Cisco Systems and others want appeals court to deny immunity to Israeli company for its alleged distribution of spyware and illegal cyber-surveillance activities.

IT 86
article thumbnail

Get the Flash Out

Jamf

Adobe ends support of Flash Player December 31 of this year. And on January 12, 2021, it will block content from running. Are you ready?

IT 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Emotet Campaign Restarts After Seven-Week Hiatus

Dark Reading

Multiple security researchers note the return of an email campaign attempting to spread the malware, which is often used to drop the Ryuk ransomware and Trickbot banking Trojan.

article thumbnail

Patrick Wardle on Hackers Leveraging ‘Powerful’ iOS Bugs in High-Level Attacks

Threatpost

Noted Apple security expert Patrick Wardle discusses how cybercriminals are stepping up their game in targeting Apple users with new techniques and cyberattacks.

article thumbnail

Law Enforcement Disrupts VPN Services Enabling Cybercrime

Dark Reading

The United States and international partners shut down three bulletproof hosting services used to facilitate criminal activity.

99
article thumbnail

Joker’s Stash Carding Site Taken Down

Threatpost

The underground payment-card data broker saw its blockchain DNS sites taken offline after an apparent law-enforcement effort.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Prepare to Fight Upcoming Cyber-Threat Innovations

Dark Reading

Cybercriminals are preparing to use computing performance innovations to launch new types of attacks.

137
137
article thumbnail

Lawfare Publishes Article on “Why Schrems II Might Not Be a Problem for EU-U.S. Data Transfers”

Data Matters

Lawfare recently published “ Why Schrems II Might Not Be a Problem for EU-U.S. Data Transfers *,” written by Sidley Partner Alan Charles Raul. This article was adapted from a longer article on our Data Matters blog, “ Schrems II Concerns Regarding U.S. National Security Surveillance Do Not Apply to Most Companies Transferring Personal Data to the U.S.

article thumbnail

ACVP

Imperial Violet

If you do not know what ACVP is then you should read no further. If you think it might be useful then what you're actually looking for is Wycheproof ; ACVP is only for those who have no choice. If you're still reading and you're vaguely aware that your previous CAVP infrastructure isn't applicable any longer, and that you'll need to deal with ACVP next time, then you might be interested in BoringSSL's ACVP infrastructure.

IT 60
article thumbnail

DLA Piper comments on EDPB recommendations 01/2020 on measures that supplement transfer tools to ensure compliance with the EU level of protection of personal data

DLA Piper Privacy Matters

On 10 November 2020, the European Data Protection Board (“EDPB”) adopted its recommendations on measures that supplement transfer tools to ensure compliance with the EU level of protection of personal data. These recommendations were open for public consultation until 21 December 2020. DLA Piper has submitted comments on these recommendations which are available here.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Meet the Jamf Protect API

Jamf

Jamf Protect's new API is built on a GraphQL language, which allows admins and InfoSec to query content from the Jamf Protect console as well as make modifications.

59
article thumbnail

Security as Code: How Repeatable Policy-Driven Deployment Improves Security

Dark Reading

The SaC approach lets users codify and enforce a secure state of application configuration deployment that limits risk.

Security 102
article thumbnail

Update: DHS Looking Into Cyber Risk from TCL Smart TVs

The Security Ledger

The acting head of the U.S. Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that the devices may give the company "back door" access to deployed sets. The post Update: DHS Looking Into Cyber Risk from TCL Smart TVs appeared first on The Security. Read the whole entry. » Related Stories Episode 195: Cyber Monday Super Deals Carry Cyber Risk TV Maker TCL Denies Back Door, Promises Better Pro

Risk 52
article thumbnail

Records Management 101: What is a Record?

Gimmal

"What is a record?" - This is one of the first questions organizations have when implementing a records management solution. It might seem like a basic question to ask, but it is harder to answer than you may think. Different organizations can have varying interpretations of what a record means to them. The National Archives and Records Administration (NARA) defines records as "…materials, regardless of physical form or characteristics, made or received by an agency of the United States Governme

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

DHS Looking Into Cyber Risk from TCL Smart TVs

The Security Ledger

The acting head of the U.S. Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that the devices may give the company "back door" access to deployed sets. The post DHS Looking Into Cyber Risk from TCL Smart TVs appeared first on The Security Ledger. Related Stories Episode 195: Cyber Monday Super Deals Carry Cyber Risk TV Maker TCL Denies Back Door, Promises Better Process Security Holes Opened Bac

Risk 52
article thumbnail

Microsoft Ups Security of Azure AD, Identity

Dark Reading

A roundup of Microsoft's recent security news and updates that focus on protecting identity.

article thumbnail

Highlights from the Henry Peabody Collection

Unwritten Record

As many parts of the United States dig in for the winter months, it seemed like a good time to highlight images of unique geological formations, and botanical specimens, undisturbed by a blanket of snow. The series 79-HPS: Henry Peabody Collection, 1959 – 1960 is a collection donated to the National Parks Service in 1959, by the daughter of Henry G.