Mon.Apr 13, 2020

article thumbnail

Hackers Breach San Francisco Airport Websites

Data Breach Today

Officials Say Usernames and Passwords Stolen San Francisco International Airport has disclosed that hackers stole usernames and passwords from two of its websites in March.

Passwords 341
article thumbnail

STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

The Last Watchdog

We’ve come to rely on our smartphones to live out our digital lives, both professionally and personally. When it comes to securing mobile computing devices, the big challenge businesses have long grappled with is how to protect company assets while at the same time respecting an individual’s privacy. Reacting to the BYOD craze , mobile security frameworks have veered from one partially effective approach to the next over the past decade.

Security 175
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dutch Police Shutter 15 DDoS 'Booter' Sites

Data Breach Today

Also, 19-Year-Old Arrested in Connection With Attacking 2 Government Websites Dutch police have shut down 15 DDoS booter sites over the course of a week. Meanwhile, they've arrested a 19-year-old in connection with DDoS attacks on two government websites.

article thumbnail

500,000+ Zoom accounts available for sale on the Dark Web

Security Affairs

Zoom accounts are flooding the dark web, over 500 hundred thousand Zoom accounts are being sold on hacker forums. Over 500 hundred thousand Zoom accounts are available for sale on the dark web and hacker forums. Sellers are advertising them for.0020 cents each, in some cases they are offered for free. The huge trove of account credentials was not stolen by Zoom, instead, it appears the result of credential stuffing attacks that leverage records from third-party data breaches.

Sales 145
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cybersecurity for Remote Workers

Data Breach Today

Pamela Kubiatowski of Zscaler Discuses the Key Risk Mitigation Issues Pamela Kubiatowski of Zscaler provides guidance on mitigating the risks posed by the shift to a work-at-home environment as a result of the COVID-19 pandemic in a preview of an upcoming virtual roundtable discussion.

More Trending

article thumbnail

Coronavirus: UK Government Promises App for Contact Tracing

Data Breach Today

But Cybersecurity Adviser Dismisses Plans as Misplaced 'Do-Something-Itis' The U.K. government says it's prepping a contact-tracing app in an attempt to help contain COVID-19. But a leading cybersecurity expert argues that the proposal amounts to little more than "do-something-itis" and urges a focus, instead, on expanded testing as well as ventilator production.

article thumbnail

NHS coronavirus app: memo discussed giving ministers power to 'de-anonymise' users

The Guardian Data Protection

Exclusive: draft plans for contact-tracing app said device IDs could be used to identify users Coronavirus – latest updates See all our coronavirus coverage A draft government memo explaining how the NHS contact-tracing app could stem the spread of the coronavirus said ministers might be given the ability to order “de-anonymisation” to identify people from their smartphones, the Guardian can reveal.

article thumbnail

Sodinokibi Ransomware crew chooses Monero for ransom payments

Security Affairs

The crew behind the Sodinokibi Ransomware plans to stop accepting Bitcoin and switched on Monero cryptocurrency to hide the money trail. The gang behind the Sodinokibi Ransomware has started accepting the Monero cryptocurrency instead of Bitcoin to make it harder investigation by law enforcement agencies. The crew is planning to doesn’t allow bitcoin payments in the future.

article thumbnail

COVID-19 Records and How Long to Keep Them

The Texas Record

The analysts here at TSLAC have been getting tons of questions about how governments should be handling their COVID-19 records. The influx of these questions is understandable – we are working during extraordinary times. In fact, these may be historic times; COVID-19 records may potentially be used as documentary evidence by future researchers, historians, and citizens.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Danish pump maker DESMI reveals cyber attack

Security Affairs

DESMI, a global company specialised in the development and manufacture of pump solutions, discloses a cyber attack. Global pump maker DESMI said on Friday it was hit by cyber attack and it was restoring its IT systems after the security incident. The attack took place on the night to Thursday, during Coronavirus pandemic employees at the company are working from home.

article thumbnail

How the ethically minded consumer is impacting your bottom line

OpenText Information Management

“We can’t eat there”, my wife says, as I ask where we should grab some lunch. When I ask why, she says that they have been in the news for not fairly treating women in the workplace. In this scenario, that restaurant’s bottom line just took a hit because of an ethically minded consumer. The … The post How the ethically minded consumer is impacting your bottom line appeared first on OpenText Blogs.

IoT 107
article thumbnail

Why Email Archiving is Not Records Management

Gimmal

How w e communicate with on e another evolves as technology changes and we become a more mo bile workforce. Mobile apps like WhatsApp , text messaging and collaboration tools like Microsoft Teams and Slack are all part of our corporate communications landscape these days. But email hasn’t gone away, in fact the volume of email is inc reasing annually.

article thumbnail

Contact Tracing COVID-19 Infections via Smartphone Apps

Schneier on Security

Google and Apple have announced a joint project to create a privacy-preserving COVID-19 contact tracing app. (Details, such as we have them, are here.) It's similar to the app being developed at MIT, and similar to others being described and developed elsewhere. It's nice seeing the privacy protections; they're well thought out. I was going to write a long essay about the security and privacy concerns, but Ross Anderson beat me to it.

Privacy 145
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Detecting Insecure Application Updates on macOS

Jamf

Applications, such as software updaters, are still using the AuthorizationExecuteWithPrivileges API against Apple’s recommendation and do so. Recent research has shown that this can be leveraged by attackers to compromise endpoints in real-world scenarios. Jamf has been busy investigating how security teams can monitor for malicious use of this API.

article thumbnail

WooCommerce Sites Targeted by E-Skimming Attacks

Adam Levin

Researchers at the cybersecurity firm Sucuri have uncovered a new set of e-skimming attacks targeting websites using the WordPress WooCommerce e-commerce plugin. E-skimming attacks typically use injected code on websites to intercept customer data as it is being entered by customers. This allows hackers to bypass otherwise secure encryption and steal credit card and personal information. .

article thumbnail

Dell Releases Security Tool to Defend PCs from BIOS Attacks

Dark Reading

The SafeBIOS Events & Indicators of Attack tool gives admins visibility into BIOS configuration changes and alerts them to potential threats.

Security 142
article thumbnail

Overlay Malware Leverages Chrome Browser, Targets Banks and Heads to Spain

Threatpost

The Grandoreiro banking malware uses remote overlay and a fake Chrome browser plugin to steal from banking customers.

115
115
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Free Webcast 4/14 at Noon Central: “Cybersecurity and IG” via ARMA Dallas

IG Guru

Dear ARMA Members and Friends, Please join us for our lunch webinar tomorrow, April 14 at 12 noon tilted “Cybersecurity and IG” presented by Andrew Ysasi. This is a FREE event brought to you by your ARMA Dallas Chapter. Please contact info@armadallas.com or igguru@protonmail.com for event information. The post Free Webcast 4/14 at Noon Central: “Cybersecurity and IG” via ARMA Dallas appeared first on IG GURU.

article thumbnail

Oracle Tackles a Massive 405 Bugs for Its April Quarterly Patch Update

Threatpost

Oracle will detail 405 new security vulnerabilities Tuesday, part of its quarterly Critical Patch Update Advisory.

IT 113
article thumbnail

The Consequences of Underfunded Records Management via IDM

IG Guru

Thursday, March 26, 2020 – 16:40By Michael Schloman, Miktysh “We recently undertook a survey of Records and Information Management Professionals across Australia, which found only 5% claimed they have enough budget. If you believe your department is underfunded, one of the driving factors could be that your understanding of records and information management is very different from […].

article thumbnail

EDPB Assigns Mandates to Develop Guidance on Data Processing and COVID-19

Hunton Privacy

On April 7th, the European Data Protection Board (the “EDPB”) announced that it had assigned mandates to its expert subgroups to develop guidance on several aspects of data processing amidst the COVID-19 crisis. In particular, the EDPB assigned a mandate to the technology expert subgroup to focus on geolocation and other tracking tools. The EDPB indicated that the guidance will focus on several issues, including (1) the use of aggregated and anonymized location data, (2) applying data protection

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What’s new in OpenText EnCase Forensic and Endpoint Investigator Cloud Edition (CE) 20.2

OpenText Information Management

When Apple introduced the T2 Security Chip in 2018, it set the computer forensics community back for years. Since then, Mac investigations have lagged behind, requiring physical possession of the device and even custom implementations of the OS itself, all at the cost of time, agency resources and, worse still, volatile forensic data. OpenText™ EnCase™ … The post What’s new in OpenText EnCase Forensic and Endpoint Investigator Cloud Edition (CE) 20.2 appeared first on OpenText Blogs.

Cloud 73
article thumbnail

Cybercrime May Be the World's Third-Largest Economy by 2021

Dark Reading

The underground economy is undergoing an industrialization wave and booming like never before.

143
143
article thumbnail

What’s new in OpenText Documentum Cloud Edition (CE) 20.2

OpenText Information Management

OpenText™ Documentum™ now runs anywhere with cloud-native technologies that simplify deployments and upgrades. New functionality also introduces a host of new features that improve compliance and collaboration. Documentum Server Documentum continues to build on its long-standing leadership position with important, new cloud advances. Customers can run Documentum on any hyperscaler and take advantage of high-performance … The post What’s new in OpenText Documentum Cloud Edition (CE) 20.2 ap

Cloud 67
article thumbnail

Pandemic Could Make Schools Bigger Targets of Ransomware Attacks

Dark Reading

Most have had to implement distance learning, making them much more vulnerable, Armor says.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

EU Commission Recommends a Common Approach to Using Mobile Apps and Location Data to Combat and Exit COVID-19

Hunton Privacy

On April 8, 2020, the European Commission adopted a recommendation to develop a common European approach to using mobile applications and mobile location data in response to the coronavirus pandemic (the “Recommendation”). The Recommendation sets out a process by which the European Union (“EU”) Member States can adopt a toolbox of practical measures, with a focus on the following priorities: A pan-European, coordinated approach to using mobile apps that empower citizens to take effective and mor

article thumbnail

Network Data Shows Spikes, Vulnerability of Work-at-Home Shift

Dark Reading

Traffic on the public Internet has grown by half this year, and videoconferencing bandwidth has grown by a factor of five, all driven by remote-work edicts.

103
103
article thumbnail

Reducing Shadow IT Through Digital Transformation

Rocket Software

All businesses today have a hybrid IT environment. They pay for collections of servers, be they UNIX servers, Windows servers, cloud servers or mainframe servers. Other IT spending includes mobile, desktop and end-user devices. In many cases, those budgets might be by server domain, so the mainframe budget is separate and independent of the rest of their IT infrastructure.