Fri.Jul 13, 2018

article thumbnail

How ‘digital transformation’ gave birth to a new breed of criminal: ‘machine-identity thieves’

The Last Watchdog

There’s a new breed of identity thief at work plundering consumers and companies. However, these fraudsters don’t really care about snatching up your credentials or mine. By now, your personal information and mine has been hacked multiple times and is readily on sale in the Dark Web. This has long been true of the vast majority of Americans. Related article: 7 hacks signaling a coming global cyber war.

article thumbnail

Roadmap for the Data Gold Rush: Maintaining Qualitative Data in the IoT Environment

Thales Cloud Protection & Licensing

We have come a long way since the GPS watch. Now cities like Barcelona use sensors to monitor everything from noise pollution to waste management. We are on the brink of smart cities, smart clothing, smart farming, house automation and even the IoMT (Internet of Medical Things), which promises to radically improve healthcare. We live in the digital era of hyperconnectivity.

IoT 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Would More Telehealth Bring New Privacy, Security Concerns?

Data Breach Today

Expansion of Medicare Payments for Telehealth Services Proposed As part of a sweeping plan to "modernize" Medicare, federal regulators are also proposing to expand reimbursements for telehealth services. But what are the potential privacy and security concerns that healthcare providers need to address if they offer more telehealth services for patients?

Privacy 113
article thumbnail

Russians Found One Use for Bitcoin: Hacking the 2016 US Election

WIRED Threat Level

The 12 Russian intelligence officers accused of hacking the DNC allegedly used $95,000 worth of Bitcoin and other cryptocurrencies to fund their operation.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Australian Airport Identity Card Issuer Breached

Data Breach Today

Aviation ID Australia Says Website Accessed By Unauthorized Entity An Australian company that issues identity cards for access to airports has been notifying applicants and cardholders that their personal information may have been compromised, according to a news report. Australian federal police are investigating.

Access 145

More Trending

article thumbnail

Analysis: California's Groundbreaking Privacy Law

Data Breach Today

The latest edition of the ISMG Security Report features a discussion of California's groundbreaking new privacy law as well as an update on the potential impact of the hacker group responsible for the Ticketmaster breach.

Privacy 100
article thumbnail

Report shows increase in social engineering

IT Governance

Proofpoint’s The Human Factor 2018 Report revealed that over the past year, cyber criminals have continued to increase their use of social engineering, building up the number of attacks that rely on human interaction. Social engineering is at the core of many of today’s attacks, seeking to exploit the curiosity of unsuspecting users. Common tactics include creating a sense of urgency, impersonating trusted brands, seeking to exploit natural curiosity and taking advantage of frequent events such

article thumbnail

Robert Mueller's Indictment Today of 12 Russian Hackers Could Be His Biggest Move Yet

WIRED Threat Level

The special counsel has unleashed an international, geopolitical bombshell.

article thumbnail

CIPL Hosts Special Executive Retreat with APPA Privacy Commissioners on Accountable AI

Hunton Privacy

During the week of June 25, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP hosted its annual executive retreat in San Francisco, California. The annual event consisted of a closed pre-retreat session for CIPL members, a CIPL Panel at the APPA Forum Open session followed by a CIPL reception and dinner and a special all day workshop with data protection commissioner members of the Asia Pacific Privacy Authorities (“APPA”) on Accountable AI.

Privacy 58
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Industry Day for Electronic Messages on August 6

National Archives Records Express

We will be co-hosting an Industry Day with GSA on August 6 to launch the next phase of our Federal Electronic Records Modernization Initiative (FERMI). The Industry Day will be held from 10:00 AM to 12:00 PM Eastern in the McGowan Theater at the National Archives Building. We will announce how vendors listed on GSA Schedule 36, Special Item Number 51-600, Electronic Records Management will have the opportunity to create demos based on the draft Use Cases for Electronic Messages (Word document).

article thumbnail

Tech & Media Podcast: Client X in the Information Technology Sector

IT Governance

Episode 1. Welcome to the IT Governance Technology & Media Podcast: Client X. This week’s episode investigates governance, risk and compliance solutions for organisations in the information technology sector. Account Manager Zak Rush joins us for our first episode. Zak is a Technology & Media sector specialist at IT Governance. It’s his job to identify client obligations, discuss project scope and generally facilitate any and all client needs in the sector.

article thumbnail

How the US Government Planted 'Spy Phones' on Suspects

WIRED Threat Level

In at least one instance, DEA agents sold an encrypted BlackBerry to a suspected drug smuggler—and kept the encryption key.

article thumbnail

GandCrab Ransomware Continues to Evolve But Can't Spread Via SMB Shares Yet

Dark Reading

Recent fears that this year's most prolific ransomware threat has acquired new WannaCry-like propagation capabilities appear unfounded at the moment.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Weekly Update 95

Troy Hunt

Not only has this been a super busy blogging week, it's also the week my coffee machine decided to die ?? It's not terminal, it's just continually leaking so it's off for a service and I have to fuel my productivity through other means. But fuel it I did and I spent a big whack of the week doing things I hope to talk about next week (namely some major architectural changes to HIBP services), as well as preparing both the Pemiblanc credential stuffing list for HIBP and then pushing out Pwned Pass

article thumbnail

Indian iPhone Spy Campaign Used Fake MDM Platform

Threatpost

Cyberattackers have used a bogus mobile device management (MDM) system to target a small – but presumably high-value – set of iPhones in India in a cyberespionage campaign that has some unusual hallmarks.

MDM 43
article thumbnail

8 Big Processor Vulnerabilities in 2018

Dark Reading

Security researchers have been working in overdrive examining processors for issues - and they haven't come up empty-handed.

article thumbnail

Driving down customer bills and securing water supply for all

CGI

Driving down customer bills and securing water supply for all. p.butler@cgi.com. Fri, 07/13/2018 - 06:17. Water is an essential service for all of us. A secure and high quality service must be delivered at affordable prices. Yet England is facing water supply shortages by 2050 unless rapid action is taken to curb water use and wastage, the Environment Agency is warning us.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

FBI: Email Account Compromise Losses Reach $12B

Dark Reading

There were more than 78K business email account (BEC) and email account compromise (EAC) scam incidents worldwide between October 2013 and May 2018.

45
article thumbnail

Seats added to our class at BlackHat USA 2018!

Architect Security

Previously sold-out, seats have been added to “Achieving Security Awareness Through Social Engineering Attacks” Training by @jaysonstreet & @aprilwright Watch the preview video here: [link] And reserve your seat here: [link]

article thumbnail

Unsanctioned Apps Invite Fox into Cybersecurity Hen House

Threatpost

In this InfoSec Insider, Tim Bandos looks at why network admins will want to keep a close watch on network traffic within the enterprise.

article thumbnail

SOCs Use Automation to Compensate for Training, Technology Issues

Dark Reading

Executives and front-line SOC teams see human and technology issues in much different ways, according to two new reports.

45
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

ThreatList: Bug Bounty Payouts Increase Six Percent for Critical Vulnerabilities

Threatpost

HackerOne’s 2018 Hacker-Powered Security Report showed that the average award for critical vulnerabilities has increased.

article thumbnail

Friday Star Wars

Adam Shostack

Oddly, I am unable to find this on Etsy. Perhaps the Disney Corporation, new owners of Star Wars, doesn’t like mousetraps?

40
article thumbnail

Sextortionists Shift Scare Tactics to Include Legit Passwords

Threatpost

The scam emails offer, as proof of compromise, a password associated with the target’s online accounts.

article thumbnail

How to Structure an Enterprise-Wide Threat Intelligence Strategy

Dark Reading

To keep an organization safe, you must think about the entire IT ecosystem.

IT 50
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Morgan Stanley draws from ‘hundreds of conversations’ with experts to build its AI

Information Management Resources

To teach its automated advice platform how to help advisers communicate with clients, the company has sought to develop a bank of knowledge about psychology and other expertise beyond traditional wealth management.

IT 29
article thumbnail

Congressional Report Cites States Most Vulnerable to Election Hacking

Dark Reading

A new report details issues with 18 states along with suggestions on what can be done.

46
article thumbnail

MDM market growing but cloud-based products often disappoint

Information Management Resources

The master data management sector is worth $38 billion, with a typical customer paying $1 to $2 million on a product, and spending three to four times that on related services.

MDM 28