Tue.Sep 01, 2020

article thumbnail

Morgan Stanley Hit With $5 Million Data Breach Suit

Data Breach Today

Poor Procedures for Discarding Old Equipment Led to Breach, Lawsuit Alleges A $5 million lawsuit seeking class action status has been filed against Morgan Stanley, claiming the financial organization failed to properly safeguard personally identifiable information when the company discarded old computer equipment.

article thumbnail

The future of retail banking: Frictionless, personalized, cohesive

DXC Technology

Following this year’s extraordinary events, our retail bank partners have been asking to rapidly implement contactless solutions that minimize touch points for customers. Current circumstances aside, research indicates that contactless is just one part of the future retail banking landscape. In the long term, banks will grow their customer bases and portfolios by offering frictionless […].

Retail 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Tale of Two Hacker Incidents

Data Breach Today

Healthcare Organizations Facing More Cyberthreats Two recent hacking incidents that each affected more than 100,000 individuals illustrate the variety of cyberthreats healthcare organizations face during these chaotic times. Security experts offer risk mitigation insights.

Risk 358
article thumbnail

France will not ban Huawei from its upcoming 5G networks

Security Affairs

French President Emmanuel Macron announced that France won’t ban the Chinese giant Huawei from its upcoming 5G telecommunication networks. French President Emmanuel Macron announced that his government will not exclude Chinese telecom giant Huawei from the building of the upcoming 5G telecommunication networks. However, Macron said that France will favor European providers of 5G technology due to security concerns.

IT 122
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Russian Election Misinformation Campaign Re-Emerges

Data Breach Today

Facebook Takes Down Accounts Associated with Russia's 'Internet Research Agency' Troll Farm Facebook says the Russian troll group that interfered in the 2016 U.S. election is at it again, using sham accounts and a fake news site to spread disinformation in advance of the November election. Facebooks says it took down the accounts involved.

IT 347

More Trending

article thumbnail

Cisco Alert: Hackers Targeting Zero-Day Flaws in IOS XR

Data Breach Today

Remote Attacker Could Exhaust Device Memory, Causing a Denial of Service Warning: Hackers are actively attempting to exploit two zero-day flaws in the IOS XR Cisco operating system that runs its carrier-grade routers. Cisco has described ways to partially mitigate the vulnerabilities while it preps patches.

IT 317
article thumbnail

Details of millions of U.S. Voters leaked to Russia’s Dark Web forum

Security Affairs

Russia’s Kommersant business newspaper reported that a database containing millions of American voters’ details has appeared on the Russian dark web. A database containing several million American voters’ personal information has appeared on the Russian dark web, Russia’s Kommersant business newspaper reported this week. The news is worrisome due to the upcoming presidential elections in the US and the fear of foreign interference.

article thumbnail

'UltraRank' Gang Sells Card Data It Steals

Data Breach Today

Group-IB Finds Hacking Group Attacked Hundreds of Checkout Sites A cybercriminal gang dubbed "UltraRank" that has planted malicious JavaScript code in hundreds of e-commerce websites around the world over the last five years to steal payment card data also takes the unusual step of selling the data on its own, the security firm Group-IB reports.

IT 214
article thumbnail

Is social media being mined for insider threats?

OpenText Information Management

This blog is co-authored by Annie John and Todd Cernetic. “Sometimes the best hiding place is the one that’s in plain sight” said Stephenie Meyer, the author of the bestselling Twilight series. Not that long-ago, social media was the “new kid on the block,” something we used to share photos with distant family members, comment … The post Is social media being mined for insider threats?

Mining 119
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cybersecurity Leaders: Planning (and Budgeting) for 2021

Data Breach Today

CEO, CISO Panel on Resiliency, Insider Risk, 5G and Prioritizing the Spend A hybrid workforce, heightened insider risk, 5G concerns over the expanded attack surface - these are the "more" that people reference when they talk about "doing more with less" in 2021. A CEO/CISO panel discusses how security leaders prioritize budget allocations for these concerns.

article thumbnail

AI on the Email Offense

Dark Reading

Mass domain purchasing enables email attackers to slip by traditional defenses. Here's how artificial intelligence can stop them.

article thumbnail

Personal Information of Millions of US Voters Available on Dark Web

Adam Levin

Databases containing the personal information of millions of U.S. voters have appeared on Russian hacking forums. According to Russian news outlet Kommersant , a hacker called Gorka9 has posted the personal information of several million registered voters in Michigan, Arkansas, Connecticut, Florida, and South Carolina.The data includes names, birthdates, gender, mailing addresses, email addresses and polling station numbers.

FOIA 112
article thumbnail

Why Are There Still So Many Windows 7 Devices?

Dark Reading

As the FBI warns, devices become more vulnerable to exploitation as time passes, due to a lack of security updates and new, emerging vulnerabilities.

Security 109
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Norway ‘s Parliament, Stortinget, discloses a security breach

Security Affairs

Hackers breached Norway ‘s Parliament, Stortinget, and accessed to email for a small number of parliamentary representatives and employees. Norway’s parliament announced Tuesday that it was the target of a major cyber-attack that allowed hackers to access emails and data of a small number of parliamentary representatives and employees. “The parliament has recently been targetted in a vast cyber attack,” reads a statement from Norway’s parliament. “There have b

article thumbnail

FAQ: Can I destroy a paper original after scanning?

The Texas Record

Of all the FAQs we get, this might be the most FAQiest of them all! Both local governments and state agencies want to know if they ‘go paperless’ — if they digitize their essential records — can they get rid of the original paper or film copies? Yes! Records management laws and rules applicable to state agencies and local governments do allow for records to be kept electronically in addition to, or instead of, physical copies.

Paper 98
article thumbnail

U.S. Voter Databases Offered for Free on Dark Web, Report

Threatpost

Some underground forum users said they're monetizing the information through the State Department's anti-influence-campaign effort.

Phishing 110
article thumbnail

ISO 27701 Paves the Way for a Strategic Approach to Privacy

Dark Reading

As the first certifiable international privacy management standard, ISO 27701 is a welcome addition to the existing set of common security frameworks.

Privacy 105
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google and Apple Change Tactics on Contact Tracing Tech

WIRED Threat Level

The companies will handle more of the technology for notifying people who may have been exposed to the coronavirus. Privacy won't be affected, they say.

Privacy 96
article thumbnail

California Legislature Passes Bill to Establish the Genetic Information Privacy Act, Pending Governor’s Signature

Hunton Privacy

On August 31, 2020, the California Senate joined the Assembly in passing SB-980 , as amended, a bill to establish the Genetic Information Privacy Act (the “Act”), which would require direct-to-consumer genetic testing companies to comply with certain privacy and data security provisions, including providing consumers with prescribed notice; obtaining consumers’ express consent regarding the collection, use and disclosure of genetic data; and enabling consumers to access and delete their genetic

Privacy 85
article thumbnail

Iran-linked APT group Pioneer Kitten sells access to hacked networks

Security Affairs

Iran-linked APT group Pioneer Kitten is now trying to monetize its efforts by selling access to some of the networks it has hacked to other hackers. Iran-linked APT group Pioneer Kitten, also known as Fox Kitten or Parisite, is now trying to monetize its efforts by selling access to some of the networks it has hacked to other hackers. The Iranian hacker group has been attacking corporate VPNs over the past months, they have been hacking VPN servers to plant backdoors in companies around the worl

Access 81
article thumbnail

FBI: Ring Smart Doorbells Could Sabotage Cops

Threatpost

While privacy advocates have warned against Ring's partnerships with police, newly unearthed documents reveal FBI concerns about 'new challenges' smart doorbell footage could create for cops.

Privacy 81
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Anti-Phishing Startup Pixm Aims to Hook Browser-Based Threats

Dark Reading

Pixm visually analyzes phishing websites from a human perspective to detect malicious pages people might otherwise miss.

Phishing 106
article thumbnail

P3iD Technologies, Inc. Joins TWAIN Working Group Board of Directors

Info Source

Newest working group member to enhance the TWAIN Direct specification with consulting and development services. Raleigh, NC – September 1, 2020 – The TWAIN Working Group (TWG), a not-for-profit organization designed to provide and foster a universal public standard which links applications and image acquisition devices, today announced the addition of P3iD Technologies to the TWAIN Working Group Board of Directors.

article thumbnail

North Korea ATM Hack

Schneier on Security

The US Cybersecurity and Infrastructure Security Agency (CISA) published a long and technical alert describing a North Korea hacking scheme against ATMs in a bunch of countries worldwide: This joint advisory is the result of analytic efforts among the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), the Federal Bureau of Investigation (FBI) and U.S.

Analytics 111
article thumbnail

Tor launches Tor Project Membership Program to financially support its work

Security Affairs

The Tor Project announced the launch of the Tor Project Membership Program to financially support the work of the organizations. The Tor Project launched the Tor Project Membership Program to financially support its work. The move aims at diversifying funding in the budget of the organization and to increase unrestricted funds for the software development of tor and other tools.

IT 77
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New APT Pioneer Kitten Linked to Iranian Government

Dark Reading

The group's targets have primarily been North American and Israeli entities, with a focus on technology, government, defense, and healthcare.

article thumbnail

Tightening Mainframe Access and Security: Part 2

Micro Focus

In our first blog we discussed how the mainframe must meet new demands in connectivity and security. In the second of our three blogs, Barbara Ballard looks at how the enterprise is using access control and data privacy to extend enterprise-level security to the mainframe. Access Control Access control is a combination of authentication and. View Article.

Access 73
article thumbnail

Apple Signs Shlayer, Legitimizes Malware

Dark Reading

Shlayer, a common macOS Trojan, received Apple's notary certification and place in the App Store -- twice.

103
103