Sun.Jan 20, 2019

article thumbnail

Unpatched Cisco critical flaw CVE-2018-15439 exposes small Business Networks to hack

Security Affairs

Unpatched critical flaw CVE-2018-15439 could be exploited by a remote, unauthenticated attacker to gain full control over the device. Cisco Small Business Switch software is affected by a critical and unpatched vulnerability (CVE-2018-15439) that could be exploited by a remote, unauthenticated attacker to gain full control over the device. Cisco Small Business Switch SOHO devices allow to manage small local area networks, they are widely adopted in cloud-based, managed and unmanaged “flavors.”.

article thumbnail

How to Find Your Netflix Freeloaders—and Kick Them Out

WIRED Threat Level

Sharing is caring. But it's worth checking if your streaming accounts have picked up any suspicious stragglers along the way.

IT 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iranian developer advertised BlackRouter RaaS

Security Affairs

An Iranian developer is promoting on a Telegram hacking channel the BlackRouter ransomware through a Ransomware-as-a-Service model. An Iranian developer is advertising on Telegram a Ransomware-as-a-Service called BlackRouter. The same expert advertises other malware and is believed to the author of another ransomware called Blackheart. promotes other infections such as a RAT.

article thumbnail

Here’s Something Unique at Legaltech Next Week from CloudNine: eDiscovery Best Practices

eDiscovery Daily

Hard to believe that Legalweek begins one week from today and Legaltech (the primary conference within Legalweek) begins the next day. Legaltech always has a lot to offer every year, between interesting sessions and a busy exhibit hall, but the exhibit hall will be a little busier this year, due to something unique that we have put together at CloudNine – TED-style talk sessions right from our booth with our inaugural NineForum series!

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Russian hacker Alexander Zhukov extradited by Bulgaria to US

Security Affairs

Bulgaria has extradited a Russian hacker that was indicted by a US court for mounting a sophisticated hacking scheme to the United States. According to the Russian embassy in Washington, the Russian hacker Alexander Zhukov was extradited on January 18. The Russian embassy has chosen to disclose the news on the VK social network, the Russian version of Facebook.

IT 81

More Trending

article thumbnail

Security Affairs newsletter Round 197 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Paper Copy. Once again thank you! TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal.

article thumbnail

Invisible links

InfoGovNuggets

“ Government Shutdown Hits Federal Websites, ” The Wall Street Journal, January 12, 2019. Security concerns as website certificates expire. Does this highlight the linkage between “access to information” and “security of information”? Both have value. How do you govern when you don’t have the money to keep the lights on?

article thumbnail

Delays

InfoGovNuggets

“U.S. Probes Boeing Satellite Deal Backed By China,” The Wall Street Journal , January 12, 2019. It takes the government a month to investigate potential leakage of critical satellite technology. This was the subject of an article on December 5, 2018, reported here earlier this month. Well, it was the holidays. It took me a month to report on the initial report.

article thumbnail

Words have consequences

InfoGovNuggets

“House GOP Removes Steve King From Panels Following Comments on White Supremacy,” The Wall Street Journal , January 15, 2019. Congressman King penalized for saying, “White nationalist, white supremacist, Western civilization—how did that language become offensive?”. Governance: removing someone from leadership roles based on what he/she said.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Capturing history

InfoGovNuggets

“Cockpit Voice Recorder Recovered From Indonesia’s Lion Air Crash,” The Wall Street Journal , January 15, 2019. Recorder found following the October crash. Technology is used to preserve information about what happened, when. Is this records management or information governance (or is records management an essential element of information governance)?

article thumbnail

Oh, Fudge

InfoGovNuggets

“Temple University Settles Suit Over Fudged Data on M.B.A. Ranking,” The Wall Street Journal , January 11, 2019. School allegedly “inflated student admissions-exam figures” that were submitted to U.S. News and World Report for use in ranking different MBA programs. While not admitting any wrongdoing, but paying $5+ million – ah, the lessons we learn.

article thumbnail

Information void

InfoGovNuggets

“Missing Government Data Make Job Tougher for Policy Makers, Traders, The Wall Street Journal , January 11, 2019. One of the costs of the government shutdown is a lot of information isn’t available to people and industries who are data-dependent. Does this highlight the value of that information? Does this fit with Doug Laney’s Infonomics ?

article thumbnail

Global technology, local rules

InfoGovNuggets

“Google Nears Win in Europe Over ‘Right to Be Forgotten’,” The Wall Street Journal , January 11, 2019. Is the “right to be forgotten” enforceable outside of Europe? Information – who owns information about you? Governance – Can Europe bind the world with its rules? How to resolve conflicts?

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Location, location, location

InfoGovNuggets

“T-Mobile, AT&T Pledge to Stop Location Sharing by End of March,” The Wall Street Journal , January 12, 2019. Data aggregators to be denied real-time data. Who owns your location? You’re there, or you were. But their technology tracked it. Do you both own different parts of it? Sure, privacy is a part of it, unless you’re outside, in public.

article thumbnail

No fooling

InfoGovNuggets

“American Express Suspends a Director in Foreign-Exchange Pricing Probe,” The Wall Street Journal , January 9, 2019. Apparently, AMEX and the FBI are investigating foreign-exchange pricing practices, and whether the rates customers were charged were altered after the customers got a quotation, either to increase the company’s profit or the employee bonuses.

article thumbnail

Lawyers make mistakes, too

InfoGovNuggets

“Manafort’s Lawyers Reveal New Details of His Links to Kiev Associate,” The Wall Street Journal, January 9, 2019. Lawyers attempt to “block out” part of a document (called “redact” in the trade), but some parts they attempted to keep from public disclosure showed up in the version in the court docket. If you have a duty to your client to redact certain information, what controls do you have in place to make sure the redaction is effective?

article thumbnail

In-house hacking

InfoGovNuggets

“German Hacking Arrest Quells Fears Attack Was Foreign Backed,” The Wall Street Journal , January 9, 2019. A self-taught hacker still in high school student was arrested for hacking the information of a bunch of politicians and celebrities. Sure glad it was a kid and not a foreign spy. What steps do you take to prevent your information from being hacked by a high school student with no formal IT training?

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Was this cheating?

InfoGovNuggets

“Fiat Chrysler Warns of $800 Million in Costs Related to Emissions Settlement,” The Wall Street Journal , January 11, 2019. More fallout from the manipulation of the diesel emissions tests. And so the story continues after the VW engine testing scandal, where software was used to defeat an emissions test. Is this the result of great minds thinking the same thoughts, or collusion, or just the migration of information within a single industry?

article thumbnail

How do you solve a problem like Maria?

InfoGovNuggets

“How the U.S. Can Protect Corporate America’s Tech Secrets From China,” The Wall Street Journal , January 11, 2019. Trade negotiators try to implement controls. How do you prevent people from copying your product or service? That’s different than how do you prevent people from stealing your technology or other information. Who governs this?