Mon.Mar 30, 2020

article thumbnail

Zoom Stops Transferring Data by Default to Facebook

Data Breach Today

Privacy Gaffe Blamed on Facebook's iOS Software Development Kit Zoom has apologized for sharing large sets of user data by default with Facebook, blaming the social network's software development kit, which it has removed from its iOS app. With COVID-19 driving unprecedented levels of remote working, video conferencing software is under the privacy and security microscope.

Privacy 345
article thumbnail

Annual Protest to ‘Fight Krebs’ Raises €150K+

Krebs on Security

In 2018, KrebsOnSecurity unmasked the creators of Coinhive — a now-defunct cryptocurrency mining service that was being massively abused by cybercriminals — as the administrators of a popular German language image-hosting forum. In protest of that story, forum members donated hundreds of thousands of euros to nonprofits that combat cancer (Krebs means “cancer” in German).

Mining 185
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Health Data Breach Tally Spikes in Recent Weeks

Data Breach Today

Will Hacking Incidents, Other Breaches Continue to Rise During COVID-19 Pandemic? The total number of health data breaches - and individuals affected - on the 2020 tally has more than doubled in recent weeks. Here are the details.

article thumbnail

Your colleague was infected with Coronavirus, this is the latest phishing lure

Security Affairs

Security experts uncovered a new Coronavirus-themed phishing campaign, the messages inform recipients that they have been exposed to the virus. Experts continue to spot Coronavirus-themed attack, a new phishing campaign uses messages that pretend to be from a local hospital informing the victims they have been exposed to the virus and that they need urgently to be tested.

Phishing 143
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

FBI: Cybercrime Gang Mailing 'BadUSB' Devices to Targets

Data Breach Today

Malicious USB Devices Accompanied by Fake Gift Cards to Entice Would-Be Victims The FBI warns that the notorious FIN7 cybercrime gang has a new trick up its sleeve: Mailing victims a $50 gift card portrayed as good for redeeming items listed on an accompanying USB storage device, which in reality downloads Griffon backdoor software to give attackers remote access.

Access 284

More Trending

article thumbnail

COVID-19 Crisis: How to Manage VPNs

Data Breach Today

Practitioners Share Insights on How They're Addressing VPN Shortcomings Security practitioners around the world are struggling to cope with the challenges posed by remote workers heavily relying on virtual private networks during the Covid-19 pandemic. Here's a look at steps to take to help enhance security.

Security 248
article thumbnail

Crooks leverage Zoom’s popularity in Coronavirus outbreak to serve malware

Security Affairs

Online communication platforms such as Zoom are essential instruments at the time of Coronavirus outbreak, and crooks are attempting to exploit their popularity. The Coronavirus outbreak is changing our habits and crooks are attempting to take advantage of the popularity of online communication platforms such as Zoom that are used by businesses, school classrooms and normal users.

article thumbnail

COVID-19 and the Human Side of Cybersecurity Leadership

Data Breach Today

Microsoft's Diana Kelley on Ensuring Care for the People Behind Those Processes and Technologies When securing the remote workforce, it's important to be mindful of the human challenges - educating children, caring for elders and dealing with the barrage of COVID-19 news, says Microsoft's Diana Kelley, who shares insights on balancing cybersecurity and compassion.

article thumbnail

OpenText 2020: Cloud, cyber resiliency and partnerships

OpenText Information Management

New deployments, features, functionality and updates are about to get easier and faster for organizations running OpenText™ solutions. As we roll out OpenText Release CE this spring as part of OpenText Release 20.2, we will bring automated management of our products in the cloud. This is just one of many new announcements in the year ahead … The post OpenText 2020: Cloud, cyber resiliency and partnerships appeared first on OpenText Blogs.

Cloud 99
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Will 5G Networks Inherit Vulnerabilities in 4G Networks?

Data Breach Today

Researchers Warn Fixes Needed to Protect Emerging Networks If vulnerabilities in 4G cellular networks that can expose them to denial-of-service and other attacks are not addressed, emerging 5G networks could inherit these same issues, the security firm Positive Technologies reports.

Security 189
article thumbnail

Zeus Sphinx spam campaign attempt to exploit Coronavirus outbreak

Security Affairs

The Zeus Sphinx malware is back, operators are now spreading it exploiting the interest in the Coronavirus outbreak. The Zeus Sphinx malware is back, it was observed in a new wave of attacks attempting to exploit the interest in the Coronavirus outbreak. Experts from IBM X-Force uncovered a hacking campaign employing the Zeus Sphinx malware, as known as Zloader or Terdot , that focus on government relief payments. .

article thumbnail

Privacy vs. Surveillance in the Age of COVID-19

Schneier on Security

The trade-offs are changing : As countries around the world race to contain the pandemic, many are deploying digital surveillance tools as a means to exert social control, even turning security agency technologies on their own civilians. Health and law enforcement authorities are understandably eager to employ every tool at their disposal to try to hinder the virus ­ even as the surveillance efforts threaten to alter the precarious balance between public safety and personal privacy on a global s

Privacy 132
article thumbnail

Virtual data science can rise to the challenge in unprecedented times

IBM Big Data Hub

As we learn to cope at a personal level with the dynamic development of the COVID-19 outbreak, we are seeing an increasing impact to businesses in every industry. Supply chains are broken, demands are shifting and resources are shrinking. How do you prepare your business for the economic and operational impact?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Voter information for 4,934,863 Georgians leaked online

Security Affairs

Voter information for 4,934,863 Georgians has been published on a hacker forum over the weekend. According to the data breach notification service Under the Breach , on Saturday a file containing voter information for more than 4.9 million Georgians, including deceased citizens, has been published on a hacking forum. Georgia has 3.7 million citizens, but the voting population is around one third.

article thumbnail

Ask the Expert: What is Information Governance

Gimmal

Now more than ever, Information Governance has become a high priority a ctivity for most organizations. With information growing at a rapid rate, the potential risks that accompany this growth can pose a threat to sensitive information and business functions across various industries. This information chaos has pushed organizations to consider implementing an information governance program, but the question that often arise are “What is Information Governance ?

article thumbnail

Securing Your Remote Workforce: A Coronavirus Guide for Businesses

Dark Reading

Often the hardest part in creating an effective awareness program is deciding what NOT to teach.

Security 107
article thumbnail

How to create quality content using the latest AI & ML tools

OpenText Information Management

Wouldn’t it be magnificent if you could create quality content, which is intelligent and smart and at the same time make it rich using the latest Artificial Intelligence (AI) & Machine Learning (ML) tools? Intelligent content creation is a way to create content that can be semantically rich, reused, readapted and reconfigured by content marketers … The post How to create quality content using the latest AI & ML tools appeared first on OpenText Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Gender equality in the workplace — 4 principles for change

DXC Technology

The path toward gender equality in the workplace has been long and arduous. Undoubtedly, we have made progress—this I have witnessed first-hand over the course of more than two and a half decades in the workforce. But I also recognize that our journey is far from over, and there is much work yet to be […].

74
article thumbnail

Chambers 2020 Global Practice Guides for Data Protection & Privacy and Cybersecurity Available

Data Matters

The updated 2020 Chambers Global Practice Guides for Data Protection & Privacy and Cybersecurity, edited Alan Charles Raul, are available , covering important developments across the globe and bringing expert legal commentary for businesses. Read the intros to each Guide here and here. The post Chambers 2020 Global Practice Guides for Data Protection & Privacy and Cybersecurity Available appeared first on Data Matters Privacy Blog.

Privacy 68
article thumbnail

Ensuring EIM resilience and continuity

OpenText Information Management

Mercedes F1 has just developed a breathing aid for COVID-19 patients after receiving regulatory approval and moving into production in under a week. This is just one example of new business models spun up on the fly to meet the new requirements of the COVID-19 pandemic. The ability to adapt to uncertain operating conditions relies … The post Ensuring EIM resilience and continuity appeared first on OpenText Blogs.

70
article thumbnail

Db2 for z/OS Online LOAD REPLACE - Minimizing Impact on Transactions

Robert's Db2

A couple of years ago, IBM introduced an important enhancement for the Db2 for z/OS LOAD utility, via the fix for an APAR (the APARs are PI69095 for Db2 12, and PI67793 for Db2 11). This enhancement provided a capability that is popularly known as "online LOAD REPLACE," but is more formally referred to as LOAD REPLACE SHRLEVEL REFERENCE. I'll provide an overview of this functionality in a moment, but I'll first get to the impetus for my writing this blog entry: recently I've worked with Db2 peop

Access 62
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Millennial perspective on driving innovation and mentorship

OpenText Information Management

Deep in digital transformation, the insurance industry must lean into the future to meet the needs of a modern workforce and user base. The conditions call for ingenuity; and, as a millennial woman in technology, Nidhi Ramakant relishes the challenge. She serves as Technical Product Manager for MedPro Group, the leading provider of healthcare liability … The post Millennial perspective on driving innovation and mentorship appeared first on OpenText Blogs.

article thumbnail

Zoom Kills iOS App’s Data-Sharing Facebook Feature

Threatpost

Zoom removed its Facebook SDK for iOS feature after a report found the app sending Facebook "unnecessary" user data.

IT 86
article thumbnail

COVID-19: the implications for industries

OpenText Information Management

The Coronavirus (COVID-19) outbreak is first and foremost a human tragedy, affecting hundreds of millions of people worldwide. It is also having a huge impact on the global economy, with most organizations being impacted – from an operations, customer and employee perspective. Also impacted are services where an interruption would endanger life, health or personal … The post COVID-19: the implications for industries appeared first on OpenText Blogs.

IT 67
article thumbnail

Zeus Sphinx Banking Trojan Arises Amid COVID-19

Threatpost

The malware is back after three years, looking to cash in on interest in government relief efforts around coronavirus.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Researchers Spot Sharp Increase in Zoom-Themed Domain Registrations

Dark Reading

Attackers are attempting to take advantage of the surge in teleworking prompted by COVID-19, Check Point says.

89
article thumbnail

Honoring Women’s History Month: Real stories from Women of Collibra

Collibra

With the entire world focused on the impact of this global pandemic, we’ve been on the lookout for inspiration to keep us feeling positive and motivated. Throughout the month of March, our Employee Resource Group, Women of Collibra, invited Collibrians to participate in a virtual Q&A session to share what inspires them, fills them with confidence, and makes them feel proud.

Sales 59
article thumbnail

5 steps to business resilience through virtual learning

OpenText Information Management

Many areas are currently being disrupted by the COVID-19 pandemic but workplace learning and training have been particularly affected. Many classroom-style courses have been canceled to protect the safety of tutors and learners. With so much focus on employee safety and business continuity, the importance of continued workplace learning can be overlooked.

57