Wed.Oct 10, 2018

article thumbnail

Suspected NASA Hacker Busted After Boasting About Exploits

Data Breach Today

Suspect Allegedly Led Team of Self-Styled 'Master Italian Hackers' Memo to hackers: Boasting about your exploits on social media channels is a good way to get caught. Indeed, Italian police say they busted a suspected hacker after he bragged not only about defacing the NASA homepage but also about being part of a group calling itself "Master Italian Hackers Team.

186
186
article thumbnail

[Podcast] Artificial Intelligence Training for Information Professionals

AIIM

For me, "Artificial Intelligence" used to conjure up images of the latest Sci-Fi movie or things like the talking car KITT from the 80's TV show Knight Rider. It wasn't until fairly recently that I began to see this shift from Sci-Fi movie topic to business value. Techopedia defines Artificial intelligence (AI) as: An area of computer science that emphasizes the creation of intelligent machines that work and react like humans.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Magecart Card-Stealing Gang Hits 'Shopper Approved' Plug-In

Data Breach Today

Supply Chain Hack Targets Customer Rating Plug-In Used by Thousands of Sites A notorious group of payment card-stealing gangs called Magecart has been tied to another series of online attacks, this time against Shopper Approved, an e-commerce service used by thousands of sites to gather reviews from customers.

174
174
article thumbnail

Amazon And The Bridge Too Far

John Battelle's Searchblog

Yesterday, I lost it over a hangnail and a two-dollar bottle of hydrogen peroxide. You know when a hangnail gets angry, and a tiny red ball of pain settles in for a party on the side of your finger? Well, yeah. That was me last night. My usual solution is to stick said finger into a bottle of peroxide for a good long soak. But we were out of the stuff, so, as has become my habit, I turned to Amazon.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Defending Against Business Email Compromise Attacks

Data Breach Today

What can organizations do to thwart business email compromise attacks? In an interview, David Stubley, CEO of the consultancy 7 Elements, outlines several key steps. He'll be a featured speaker at Information Security Media Group's Security Summit: London, to be held Sept. 23.

More Trending

article thumbnail

HHS OIG Launches Cybersecurity Web Page

Data Breach Today

Site Highlights Watchdog Agency's Cyber Activities A Department of Health and Human Services watchdog agency has launched a new web page to draw attention to the growing importance of its cybersecurity-related activities, ranging from security audits to fraud investigations.

article thumbnail

Security Vulnerabilities in US Weapons Systems

Schneier on Security

The US Government Accounting Office just published a new report: " Weapons Systems Cyber Security: DOD Just Beginning to Grapple with Scale of Vulnerabilities " (summary here ). The upshot won't be a surprise to any of my regular readers: they're vulnerable. From the summary: Automation and connectivity are fundamental enablers of DOD's modern military capabilities.

article thumbnail

Pentagon Weapons Systems Are Easy Cyberattack Targets, New Report Finds

WIRED Threat Level

A new report says the Department of Defense "likely has an entire generation of systems that were designed and built without adequately considering cybersecurity.".

article thumbnail

AI – Four Key Ingredients

OpenText Information Management

Artificial intelligence (AI) is the great hope of software today: It can do everything. At OpenText, we have developed a low cost, easy to use AI tool called OpenText Magellan. We want to make its application practical, so that it adds value instantly. There are four key ingredients required for AI to add business value: … The post AI – Four Key Ingredients appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hackers can compromise your WhatsApp account by tricking you into answering a video call

Security Affairs

Hackers can compromise your WhatsApp account by tricking you into answering a video call, the company fixed the flaw in September. WhatsApp has addressed a vulnerability in the mobile applications that could have been exploited by attackers to crash victims instant messaging app simply by placing a call. The vulnerability is a memory heap overflow issue that was discovered by Google Project Zero white hat hacker Natalie Silvanovich in August.

article thumbnail

Meet 5 Women Shaping Microsoft's Security Strategy

Dark Reading

Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity.

Security 103
article thumbnail

Group-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacks

Security Affairs

Security firm Group-IB has estimated that in H2 2017-H1 2018 cyber attacks caused $49.4 million (2.96 billion rubles) of damage to Russia’s financial sector. Group-IB, an international company that specializes in preventing cyber attacks, has estimated that in H2 2017-H1 2018 cyber attacks caused $49.4 million (2.96 billion rubles) of damage to Russia’s financial sector.

article thumbnail

California and Preemption

Data Matters

As one of the epicenters of the Information Age and largest state in the Nation, California’s regulatory decisions can have an outsize impact on the data economy. Recently, the State has tried to use this pride of place to stamp its imprint on two important public debates. First, on September 30, 2018, Governor Brown signed into law the California Internet Consumer Protection and Net Neutrality Act of 2018 (Senate Bill 822), which seeks to impose, as a matter of state law, net neutrality regul

Privacy 68
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Security Affairs

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber crime syndicates. Security experts from security firm SEC Consult have identified over 100 companies that buy and re-brand video surveillance equipment (surveillance cameras, digital video recorders (DVRs), and network video recorders (NVRs)) manufactured by the Chinese firm Hangzhou Xiongmai Technology Co., Ltd.

Cloud 79
article thumbnail

Hackers Hold Instagram Influencers’ Accounts Hostage with Ransomware

Adam Levin

High-profile Instagram accounts are being targeted by ransomware attacks and phishing schemes, with evidence suggesting that many account holders are paying the attackers. According to a Motherboard report, hackers are infiltrating and gaining access to Instagram accounts by posing as representatives from branding giants to purport a proposed partnership with the victim.

article thumbnail

New Gallmaker APT group eschews malware in cyber espionage campaigns

Security Affairs

A previously unknown cyber espionage group, tracked as Gallmaker, has been targeting entities in the government, military and defense sectors since at least 2017. A new cyber espionage group tracked as Gallmaker appeared in the threat landscape. According to researchers from Symantec, who first spotted the threat actor, the group has launched attacks on several overseas embassies of an unnamed Eastern European country, and military and defense organizations in the Middle East.

article thumbnail

Is your data strategy being hurt by these 3 cloud myths?

IBM Big Data Hub

Aberdeen reports that nearly 80% of businesses in their study are now using public cloud. But that still leaves over 20% of businesses that are not availing themselves of the benefits of public cloud.

Cloud 76
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why customers don’t trust your organisation with their personal data

IT Governance

An ICO (Information Commissioner’s Office) report has found that 45% of customers don’t trust organisations with their personal data. This is hardly surprising, given the constant news stories about cyber attacks and organisations mishandling personal data. In the past few days alone, Facebook has been embroiled in another security incident , Uber was fined $148 million (about £114 million) for covering up a data breach , Bupa was fined £175,000 and the Conservative Party disclosed a security vu

article thumbnail

GAO report reveals new Pentagon weapon systems vulnerable to hack

Security Affairs

According to a new report published by the Government Accountability Office (GAO) almost any new weapon systems in the arsenal of the Pentagon is vulnerable to hack. The new generation of weapon systems developed by the Pentagon is heavily computerized and for this reason more exposed to cyber attacks. According to a new 50-page report published by the GAO revealed that the presence of several vulnerabilities in the weapon systems that were never fixed. “In operational testing, DOD routine

article thumbnail

New Threat Group Conducts Malwareless Cyber Espionage

Dark Reading

Gallmaker group is relying exclusively on legitimate tools and living-off-the-land tactics to make detection very difficult.

86
article thumbnail

Insights from EU Data Protection Regulators – Update from Munich

HL Chronicle of Data Protection

The IAPP conference in Munich on 19 September 2018 provided important insights into the work and views of the European Data Protection Board (EDPB). Isabelle Vereecken (Head of the EDPB Secretariat) and Bas Van Bockel (Head of Department of International, Policy and Strategy, Dutch Data Protection Authority) addressed key topics such as data protection impact assessments (DPIA), international data transfers and the one-stop-shop principle.

GDPR 65
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Russian Hacking Groups Intersect in Recent Cyberattacks

Dark Reading

Two different hacking teams best known as Turla and Fancy Bear employed the same stealthy attack method in an unusual overlap of hacking activity.

75
article thumbnail

CIPL Hosts Workshop on Accountability Under the GDPR in Paris

Hunton Privacy

On October 5, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP hosted a workshop on how to implement, demonstrate and incentivize accountability under the EU General Data Protection Regulation (“GDPR”), in collaboration with AXA in Paris, France. In addition to the workshop, on October 4, 2018, CIPL hosted a Roundtable on the Role of the Data Protection Office (“DPO”) under the GDPR at Mastercard and a pre-workshop dinner at the Chanel School of Fashion, sp

GDPR 65
article thumbnail

Imperva to Be Acquired by Thoma Bravo for $2.1 Billion

Dark Reading

But two law firms are investigating whether the security vendor breached its fiduciary duty to shareholders by not actively seeking buyers offering a higher price.

article thumbnail

Facebook Patches Major WhatsApp Vulnerability

Adam Levin

Facebook announced today that a security bug in its WhatsApp messaging service that allowed hackers to take control of users’ phones has been fixed. The vulnerability affected the WhatsApp app on both iPhone and Android devices.It allowed hackers to take control of accounts simply by having their victims answer a video call. The bug was initially discovered by Google Project Zero, and reported by ZDNet and the Register in late August, but was not fixed until this week, leaving the service’s 1.2

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hunton Insurance Head Comments on Hotel Data Breach Coverage Dispute

Hunton Privacy

As reported on the Insurance Recovery Blog , Hunton Andrews Kurth insurance practice head Walter Andrews recently commented to the Global Data Review regarding the infirmities underlying an Orlando, Florida federal district court’s ruling that an insurer does not have to defend its insured for damage caused by a third-party data breach. The decision in St.

article thumbnail

When good B2B Managed Services turns bad

OpenText Information Management

The promise of B2B Managed Services is great. According to Ovum, good B2B Managed Services can cut operating costs by at least 40% over doing it yourself, in addition to allowing you to re-deploy your IT staff to other activities. Over 95% of companies in a global Stanford Business study found managed services success had increased the … The post When good B2B Managed Services turns bad appeared first on OpenText Blogs.

B2B 55
article thumbnail

Security Researchers Struggle with Bot Management Programs

Dark Reading

Bots are a known problem, but researchers will tell you that bot defenses create problems of their own when it comes to valuable data.