Sun.Nov 17, 2019

article thumbnail

Welcoming the Norwegian Government to HIBP

Troy Hunt

Over the last couple of years, I've been increasingly providing governments with better access to their departments' data exposed in breaches by giving them free and unfettered API access to their domains. As I've been travelling around the world this year, I've been carving out time to spend with governments to better understand the infosec challenges they're facing and the role HIBP can play in helping them tackle those challenges.

article thumbnail

Experts found undocumented access feature in Siemens SIMATIC PLCs

Security Affairs

Researchers discovered a vulnerability in Siemens SIMATIC S7-1200 programmable logic controller (PLC) that could allow attackers to execute arbitrary code on vulnerable devices. Researchers discovered an undocumented access feature in Siemens SIMATIC S7-1200 programmable logic controller (PLC) that could be exploited by attackers to execute arbitrary code on affected devices.

Access 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Lock Down Your Health and Fitness Data

WIRED Threat Level

Apps like FitBit and Apple Health collect some of the most sensitive data you have. Here's how to control what they can see, and what they can do with it.

IT 78
article thumbnail

Weekly Update 165

Troy Hunt

Yes, I'm in my car. I'm completely disorganised, rushing to the next event and really didn't plan this very well. But hey, what an awesome little soundproof booth it is! That said, I did keep this week deliberately concise. until I went to edit it and then Adobe Premiere (or the NVIDIA drivers on my laptop) decided to turn a 16 minute video clip into a multi-hour s**t-fight.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Crooks use carding bots to check stolen card data ahead of the holiday season

Security Affairs

With the advent of this year’s holiday shopping season are cybercriminals are using carding bots to test stolen payment card data before using them. Cybercriminals need to test the validity of the stolen card data before carrying out fraudulent transactions or selling them during the holiday shopping season. Cybercriminals are automating this process using carding bots that are able to make small purchases on smaller retailers’ websites. “While investigating these increasing at

Retail 68

More Trending

article thumbnail

Security Affairs newsletter Round 240

Security Affairs

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs. Bad News: AI and 5G Are Expected to Worsen Cybersecurity Risks. Boardriders and its subsidiarities QuikSilver and Billabong infected with ransomware. Major ASP.NET hosting provider SmarterASP hit by ransomware attack. Apple Mail stores parts of encrypted emails in plaintext DB.

article thumbnail

Court Denies Motion to Redact Portions of eDiscovery Teleconference: eDiscovery Case Law

eDiscovery Daily

In Pacific Biosciences of California, Inc. v. Oxford Nanopore Tech., Inc. et al., Nos. 17-275-LPS, 17-1353-LPS (D. Del. Nov. 4, 2019) , Delaware Magistrate Judge Jennifer L. Hall denied the defendants’ Motion to Redact Portions of the August 14, 2019 Discovery Teleconference and the related submissions, stating: “The public has an interest in understanding judicial proceedings, even if they have a limited interest in documents submitted in connection with discovery dispute proceedings.”.

article thumbnail

CHINA: crackdown on infringing China apps

DLA Piper Privacy Matters

China’s authorities have launched a crackdown against non-compliant mobile apps. The crackdown is taking place during November and December 2019, so businesses operating apps in China must take urgent action or else face sanctions. This campaign targets not only businesses operating apps, but also apps distributors and app stores. The authorities are adopting a three-stage process, whereby infringing apps will be systematically reviewed for compliance with the current China app regulations, as f

article thumbnail

Tianfu Cup 2019 Day 1 – Chinese experts hacked Chrome, Edge, Safari, Office365

Security Affairs

The Tianfu Cup 2019 International Cyber ??Security Competition has started, in two days white hat hackers will attempt to exploit flaws in major software. The Tianfu Cup 2019 International Cyber ??Security Competition has started, white hat hackers will attempt to devise working zero-day exploits for popular software. Each working exploit receives a cash prize and points that are assigned to the team that devised it, like the popular Pwn2Own hacking contest.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.