Tue.Jan 29, 2019

article thumbnail

Apple Rushes to Fix Serious FaceTime Eavesdropping Flaw

Data Breach Today

Callers Can Hear and See Recipients Before They Pick Up Apple is preparing a fix for a serious flaw in its FaceTime software for making audio and video calls. The software can be abused to remotely eavesdrop on and view a recipient, without their knowledge, even if they don't answer the call.

IT 261
article thumbnail

Two managers sacked, CEO fined following massive SingHealth data breach

IT Governance

Singapore’s IHiS (Integrated Health Information Systems) has sacked two managers and fined five senior staff , including CEO Bruce Liang, for their part in last year’s SingHealth data breach. The incident affected 1.5 million people – just under a third of the country’s population – with criminal hackers accessing patients’ names, dates of birth, NRIC (National Registration Identity Card) numbers, and details of their gender and race.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Japan's IoT Security Strategy: Break Into Devices

Data Breach Today

Nation to Allow Researchers to Brute-Force 200 Million Devices Japan plans to identity vulnerable internet of things devices the same way hackers do: by trying to log into them. The country wants to gauge its cybersecurity readiness for next year when it hosts the summer Olympics. If vulnerable devices are found, the plan is to notify device owners.

IoT 217
article thumbnail

Making the Case for Encryption in the Era of Digital Transformation – Highlights from our Annual Data Threat Report

Thales Cloud Protection & Licensing

Around this time each year, Thales eSecurity releases our annual Data Threat Report (DTR). Now in its sixth year, the report is squarely focused on digital transformation and what that means for organizations and their data security. Today, it’s almost impossible to do business of any kind without some sensitive data being exchanged, managed or stored in the cloud or on servers with an outgoing connection to the web.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

HIV Data Exposed Online

Data Breach Today

Singapore Authorities Allege Incident Involved an Insider Information about more than 14,000 HIV patients included in a Singapore health registry was exposed online in what appears to be an inside job. The incident illustrates the importance of safeguarding sensitive health data, such as by implementing behavioral analytics.

Analytics 179

More Trending

article thumbnail

Underestimated Risk & Overestimated Security: When All You Do Is React, it May Be Too Late

Data Breach Today

For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals. Victims can usually only react because many of the usual methods for detecting malware require knowledge about specific attack techniques, about the behavior or about signatures of specific malware families.

IT 168
article thumbnail

Protecting the bank: Key challenges and opportunities

CGI

Protecting the bank: Key challenges and opportunities. pooja.cs@cgi.com. Tue, 01/29/2019 - 22:25. Protecting the bank involves more than keeping money safe and preventing financial crime; it touches upon all parts of the bank and the banking industry. Protection today involves securing the entire banking ecosystem and the massive amounts of customer data that banks have.

article thumbnail

Government Spending on Cybersecurity: An Analysis

Data Breach Today

Around the world, many CIOs at various levels of governments expect an increase in cybersecurity spending in 2019, according to new research from Gartner. Alia Mendonsa, co-author of the report, analyzes the results of a global survey.

article thumbnail

Sofacy’s Zepakab Downloader Spotted In-The-Wild

Security Affairs

In the last weeks, the Cybaze -Yoroi ZLAB investigated a new APT28 campaign leveraging the Zepakab Downloader. In the last weeks, the Cybaze-Yoroi ZLAB investigated a new APT28 campaign discovered in January 2019. The sample has been initially identified by an Italian independent security researcher, who warned the InfoSec community and shared the binary for further analysis.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

iPhone FaceTime Vulnerability

Schneier on Security

This is kind of a crazy iPhone vulnerability : it's possible to call someone on FaceTime and listen on their microphone -- and see from their camera -- before they accept the call. This is definitely an embarrassment , and Apple was right to disable Group FaceTime until it's fixed. But it's hard to imagine how an adversary can operationalize this in any useful way.

Privacy 78
article thumbnail

Why Level 3 Building Information Modeling is about to change everything

OpenText Information Management

Building Information Modeling (BIM) is increasingly being adopted as the foundation for new projects within the architecture, engineering and construction (AEC) sector. More governments are mandating its use for public contracts and private clients are beginning to follow suite. Yet, the real power of BIM lies in the end-to-end lifecycle management of a building.

article thumbnail

Supporting a mobile workforce: Acadian Ambulance Service

Jamf

Along with a powerful mobile device management (MDM) solution, Acadian said using iPad devices in their ambulances and helicopters propelled them into the realm of how healthcare should look in the 21st century. Read their story.

MDM 75
article thumbnail

Google Takes Its First Steps Toward Killing the URL

WIRED Threat Level

Google wants to get rid of URLs. But first, it needs to show you why.

IT 111
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

4 things to consider when setting your fast data strategy

IBM Big Data Hub

In the study, the definition of fast data starts with the technical characteristics mentioned in our last article, but there’s more to that definition.

77
article thumbnail

FINRA Issues Its 2019 Risk Monitoring and Examination Priorities Letter

Data Matters

On January 17, the Financial Industry Regulatory Authority (FINRA) released its annual Risk Monitoring and Examination Priorities Letter (Letter), which identifies topics that FINRA will focus on in 2019. Unlike in previous years, this Letter primarily discusses new topics and priorities in areas of ongoing concern while not repeating topics that have been at the center of FINRA’s attention over the years.

Risk 60
article thumbnail

US DoJ charges Huawei sanctions violations and in technology espionage

Security Affairs

The US Justice Department charges the Chinese telecommunications giant Huawei in technology theft and violation of sanctions. The US Justice Department charges the Chinese telecommunications giant Huawei in two cases, including the one that led the arrest of a top executive in Canada on a US warrant. According to the US DoJ, the charges are the response to persistent action conducted by the Chinese company to exploit American organizations.

article thumbnail

Apple Disables Group FaceTime Following Major Privacy Glitch

Threatpost

The bug allows iPhone users to FaceTime other iOS users and eavesdrop on their conversations - even when the other end of the line doesn't pick up.

Privacy 76
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Disable FaceTime, a bug lets you hear a person’s audio before he answers

Security Affairs

A major vulnerability in the Apple FaceTime lets you hear the audio of the person you are calling … before they pick up the call. iPhone, iPad, or Mac users might disable FaceTime to avoid being spied through their devices. Experts warn that it is possible to call someone via FaceTime and listen via the microphone of their devices before they accept or reject the call. “There’s a major bug in FaceTime right now that lets you connect to someone and hear their audio without the person

Privacy 67
article thumbnail

Symantec Rolls Out New Endpoint Security Tools, Updates

Dark Reading

Today's releases include more advanced EDR tools, a new managed EDR service, and protection and hardening for Symantec's endpoint portfolio.

article thumbnail

Japan to Hunt Down Citizens’ Insecure IoT Devices

Threatpost

Japan will carry out a “survey” of 200 million deployed IoT devices, with white-hats trying to log into internet-discoverable devices using default credentials.

IoT 67
article thumbnail

Remote Access & the Diminishing Security Perimeter

Dark Reading

Where security really matters, the enterprise is only as secure as the endpoints it allows to access its sensitive core systems.

Access 77
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

FaceTime bug lets anyone spy on you; here’s how to stop them

IT Governance

A glitch in Apple’s FaceTime app allows callers to hear and see you even if you haven’t answered the phone. 9to5Mac confirmed the reports, which had been circulating on social media. This is how it is exploited: Start a FaceTime video call with an iPhone contact. While the call is dialling, swipe up from the bottom of the screen and tap Add Person. Add your own phone number in the Add Person screen.

GDPR 61
article thumbnail

Americans Worried More About Computer - Not Border - Security

Dark Reading

A new survey shows more Americans are more concerned about their computer's security than the US border's.

article thumbnail

Apple Takes Drastic Measures to Stop a Nasty FaceTime Bug

WIRED Threat Level

Group FaceTime chats let people eavesdrop on whoever they called, a bug so bad that Apple pulled the plug until it comes up with a fix.

IT 69
article thumbnail

Microsoft Exchange Vuln Enables Attackers to Gain Domain Admin Privileges

Dark Reading

Anyone with access to an Exchange mailbox can take control of domain, security researcher says.

Access 87
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

2019 and Beyond: The (Expanded) RSAC Advisory Board Weighs in on What’s Next: Pt. 2

Threatpost

Part two of RSA’s Conference Advisory Board look into the future tackles how approaches to cybersecurity must evolve to meet new emerging challenges.

article thumbnail

FaceTime Bug an AppSec Fail

Dark Reading

Apple has shut off Group FaceTime while it prepares a fix for a newly found security flaw found by a 14-year-old gamer.

article thumbnail

Feds Dismantle Dark Web Credentials Market

Threatpost

Meanwhile, authorities are aggressively going after former users of the Webstresser DDoS-for-hire service.