Tue.Apr 10, 2018

article thumbnail

The Burden of Business Email Compromise

Data Breach Today

Agari's Dan Hoffmann Outlines the Scale and Cost Business email compromise attacks that impersonate executives and business partners to trick employees are "the biggest security issue in all of technology today," says Dan Hoffmann of Agari.

Security 151
article thumbnail

How to check whether Facebook shared your data with Cambridge Analytica

The Guardian Data Protection

People who fear their information may have been used by Cambridge Analytica can go to a new help page Tell us how you’ve been affected by the Facebook data breach Facebook has started the process of notifying the approximately 87 million users whose data was harvested by the election consultancy Cambridge Analytica. The social network eventually hopes to inform every user who was affected with a warning at the top of their Facebook news feed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook's Zuckerberg Takes First Drubbing in D.C.

Data Breach Today

Florida Sen. Bill Nelson: 'Facebook Failed Us' Facebook CEO Mark Zuckerberg informally met with U.S. lawmakers on Monday ahead of two congressional hearings, where he is expected to face a bruising examination. One senator was blunt with Zuckerberg, contending that on data privacy "Facebook failed us.

article thumbnail

Cambridge Analytica Could Also Access Private Facebook Messages

WIRED Threat Level

A Facebook permission allowed an app to read messages between 1,500 Facebook users and their friends until October 2015—data that Cambridge Analytica could have accessed.

Access 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to Predict Insider Fraud

Data Breach Today

CMU CERT Researcher Randy Trzeciak on the Power and Promise of Emerging Technology When insider threat researcher Randy Trzeciak looks at artificial intelligence and machine learning, he sees the potential for technology to help organizations predict potentially dangerous insider behavior - not just respond to it.

More Trending

article thumbnail

Future-Proof Against Fraud

Data Breach Today

Keith Carlson of Amazon Web Services on Making Smarter Investments in Skills, Technologies How can we future-proof against fraud? Keith Carlson, general manager of payments and fraud prevention at Amazon Web Services, discusses the people, skills and technologies necessary to prevent fraud - and prepare for the unexpected.

111
111
article thumbnail

This Radio Hacker Could Hijack Emergency Sirens to Play Any Sound

WIRED Threat Level

Balint Seeber found that cities around the US are leaving their emergency siren radio communication systems unencrypted and vulnerable to spoofing.

article thumbnail

Financial Crimes Enforcement Network Issues New Frequently Asked Questions on Customer Due Diligence Requirement

Data Matters

On April 3, 2018, the Financial Crimes Enforcement Network (FinCEN) issued new frequently asked questions (FAQs) regarding its customer due diligence rule (CDD Rule). The CDD Rule applies to banks, broker-dealers in securities, mutual funds, futures commission merchants and introducing brokers in commodities (collectively, covered financial institutions or CFIs).

Retail 68
article thumbnail

The Paperless Office: How Much You Can Save

Record Nations

A paperless office can save more than just the environment with cost-reducing benefits for businesses that deal with a lot of paper (and employees managing those files). Why Go Paperless Paperwork is the largest overhead expensive in any organization, giving even more financial incentive to go paperless. Paperless offices often see immediate benefits, including cutting […].

Paper 76
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Quant Loader Trojan Spreads Via Microsoft URL Shortcut Files

Threatpost

Researchers are warning of a new email phishing campaign that launches a trojan capable of distributing ransomware and stealing passwords.

article thumbnail

Mozilla's Internet Health Report Diagnoses Life Online

WIRED Threat Level

The foundation released a broad, sweeping report Tuesday about the state of our lives online.

article thumbnail

Vulnerability in San Francisco’s Public Safety Warning Sirens Fixed

Threatpost

A patched vulnerability in San Francisco’s public safety warning siren system suggests other radio-based platforms could also be hacked.

article thumbnail

Progress your career with an ISO 27001 Lead Implementer course

IT Governance

The cyber security skills gap isn’t going away. A report by job listings site Indeed found that the UK has the second highest demand for skilled IT professionals in the world. There are a lot of theories about the best way to fill that gap, but it all boils down to finding people with the relevant skills and qualifications. IT Governance offers training and qualifications in a variety of specialist areas.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Only 53 Australians used Facebook app in massive data breach – video

The Guardian Data Protection

Facebook has revealed that only 53 users in Australia installed the Facebook app This is Your Digital Life. But 311,127 Australians had their private data harvested. This means that for every person who took the personality quiz, almost 6,000 people had their private data accessed Continue reading.

article thumbnail

DARPA Funding in AI-Assisted Cybersecurity

Schneier on Security

DARPA is launching a program aimed at vulnerability discovery via human-assisted AI. The new DARPA program is called CHESS (Computers and Humans Exploring Software Security), and they're holding a proposers day in a week and a half. This is the kind of thing that can dramatically change the offense/defense balance.

article thumbnail

Pillsbury Winthrop Shaw Pittman LLP leads the pack integrating AI and Predictive Coding

OpenText Information Management

Why have law firms and lawyers been so keen to integrate machine learning into their practice? We asked OpenText™ Axcelerate™ customer, Pillsbury Winthrop Shaw Pittman LLP (Pillsbury), an Am Law 100 law firm advising and counseling the world’s largest companies across their litigation portfolios. It comes down to the significant time and resources saved from … The post Pillsbury Winthrop Shaw Pittman LLP leads the pack integrating AI and Predictive Coding appeared first on OpenText Blogs.

article thumbnail

Ransomware Dominates Verizon DBIR

Threatpost

Verizon pegged ransomware as the most prevalent malware in its 2018 Data Breach Investigations Report.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

89% of Android Users Didn't Consent to Facebook Data Collection

Dark Reading

A new survey shows most Android users did not give Facebook permission to collect their call and text data.

article thumbnail

Adobe Patches Four Critical Bugs in Flash, InDesign

Threatpost

Critical vulnerabilities are divided into four CVEs tied to Adobe Flash Player and Adobe InDesign CC.

article thumbnail

20 Ways to Increase the Efficiency of the Incident Response Workflow

Dark Reading

Despite all the good intentions of some great security teams, we are still living in a "cut-and-paste" incident management world.

article thumbnail

Canada’s Mandatory Privacy Breach Reporting Requirements coming into force November 1, 2018

Data Protection Report

As of November 1, 2018, organizations across Canada subject to the Personal Information Protection and Electronic Documents Act (PIPEDA) will be required to provide notice of certain privacy breaches. Through an Order in Council , the Federal Government has announced that previous PIPEDA breach notification amendments will come into force this November.

Privacy 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

'SirenJack' Vulnerability Lets Hackers Hijack Emergency Warning System

Dark Reading

Unencrypted radio protocol that controls sirens left alert system at risk.

Risk 64
article thumbnail

Microsoft Fixes 66 Bugs in April Patch Tuesday Release

Threatpost

Microsoft's April Patch Tuesday release includes fixes for 66 bugs, 24 of which are rated critical.

51
article thumbnail

On-Premise Security Tools Struggle to Survive in the Cloud

Dark Reading

Businesses say their current security tools aren't effective in the cloud but hesitate to adopt cloud-based security systems.

Cloud 49
article thumbnail

Graph databases and machine learning will revolutionize MDM strategies

Information Management Resources

These technologies will become widely adopted in 2018 and 2019, and will augment master data management and data governance to provide increased agility and scalability.

MDM 42
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

HTTP Injector Steals Mobile Internet Access

Dark Reading

Users aren't shy about sharing the technique and payload in a new attack.

Access 63
article thumbnail

DEF CON Beijing 2018

Architect Security

I am speaking at the very first DEF CON in Beijing China [BETA] – Hope to see you there! The dates for #DEFCONBeijing are May 11-13, 2018.

article thumbnail

Chris Dale of the eDisclosure Information Project: eDiscovery Trends 2018

eDiscovery Daily

This is the eleventh (and final) of the 2018 Legaltech New York (LTNY) Thought Leader Interview series. eDiscovery Daily interviewed several thought leaders at LTNY this year (and some afterward) to get their observations regarding trends at the show and generally within the eDiscovery industry. Today’s thought leader is Chris Dale. Chris is Editor of the eDisclosure Information Project.

GDPR 39