Fri.Oct 12, 2018

article thumbnail

Facebook Clarifies Extent of Data Breach

Data Breach Today

30 Million Affected; 14 Million Had Extensive Information Exposed Facebook now says that 20 million fewer accounts were breached than it originally believed, but the attackers accessed extensive sensitive personal information on nearly half of those affected.

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. alongside Tony Sager , senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. We talked at length about many issues, including supply chain security, and I asked Sager whether he’d heard anything about rumors that Supermicro — a high tech firm in San Jose, Calif. — had allegedly inserted hardware backdoors in technology s

Security 201
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Medtronic Cardiac Devices Recalled Due to Cyber Concerns

Data Breach Today

FDA Announces 'Voluntary Recall' Related to Vulnerabilities The FDA has announced a "voluntary recall" by Medtronic of certain internet-connected programmers for implantable cardiac devices due to cybersecurity vulnerabilities. Some security experts are hopeful that this will serve as a wake-up call for more manufacturers to take action on addressing cybersecurity issues.

article thumbnail

VR Business Applications: Branding with VR

AIIM

Virtual reality has a truly astounding trajectory. The VR hardware and software market has already tripled in size in only two years. In a few short years, Statista predicts that the market size for virtual reality software and hardware will expand to over $40 billion. Only a decade ago, virtual reality seemed like a distant dream. Now it seems that VR is more than an outlet for escapism, entertainment, and media.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Review Shows Glaring Flaws In Xiongmai IoT Devices

Data Breach Today

Consulting Firm Alleges Security Not A Priority for Vendor Millions of internet-of-things devices made by the Chinese company Xiongmai and sold in stores such as Home Depot and Wal-Mart still have glaring security problems, a security consultancy warns. The findings come two years after the Mirai botnet targeted Xiongmai devices.

IoT 200

More Trending

article thumbnail

An Assessment of Google's Data Leak

Data Breach Today

An in-depth report on the exposure of personal details for 500,00 Google+ accounts leads the latest edition of the ISMG Security Report. Also featured: an update on mitigating the risk of business email compromises and tips for protecting critical infrastructure.

Risk 172
article thumbnail

12 Free, Ready-to-Use Security Tools

Dark Reading

There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.

article thumbnail

Network vs. Endpoint Security: Striking the Right Balance

Data Breach Today

With so much focus on endpoint security, it's important not to overlook the importance of network-level security controls, says Lawrence Orans, research vice president at Gartner.

Security 140
article thumbnail

Hackers targeting Drupal vulnerabilities to install the Shellbot Backdoor

Security Affairs

A group of hackers is targeting Drupal vulnerabilities, including Drupalgeddon2, patched earlier this year to install a backdoor on compromised servers. Security experts from IBM are targeting Drupal vulnerabilities, including the CVE-2018-7600 and CVE-2018-7602 flaws, aka Drupalgeddon2 and Drupalgeddon3 , to install a backdoor on the infected systems and tack full control of the hosted platforms.

Mining 92
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Criminals' Cryptocurrency Addiction Continues

Data Breach Today

Cryptojacking Attacks Are Reshaping Today's Threat Landscape Cryptojacking - the hidden mining of virtual currencies - continues to be a focus for online attackers. As the detection of cryptocurrency mining malware continues to rise, Europol warns that cryptojacking will remain "a regular, low-risk revenue stream for cybercriminals.

Mining 140
article thumbnail

Security in a World of Physically Capable Computers

Schneier on Security

It's no secret that computers are insecure. Stories like the recent Facebook hack , the Equifax hack and the hacking of government agencies are remarkable for how unremarkable they really are. They might make headlines for a few days, but they're just the newsworthy tip of a very large iceberg. The risks are about to get worse, because computers are being embedded into physical devices and will affect lives, not just our data.

article thumbnail

Safeguarding Critical Infrastructure From Cyberattacks

Data Breach Today

The biggest challenge for any critical infrastructure facing potential cyberattacks is devising ways to maintain business continuity, says cybersecurity specialist Prashant Pillai, who calls for building resilience into network design. He'll be a speaker at ISMG's Security Summit: London, to be held Oct. 23.

article thumbnail

Fitmetrix fitness software company may have exposed millions of customer records

Security Affairs

Fitmetrix fitness software company exposed customer data online, a 119GB archive containing name, gender, email address, birth date, height, weight and more. A fitness software company Fitmetrix may have exposed a database hosted on AWS containing millions of customer records. The exposed records included name, gender, email address, birth date, home and work phone, height, weight and much more.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Language and Nature of Fileless Attacks Over Time

Lenny Zeltser

The language of cybersecurity evolves in step with attack and defense tactics. You can get a sense for such dynamics by examining the term fileless. It fascinates me not only because of its relevance to malware, but also because of its knack for agitating many security practitioners. I traced the origins of “fileless” to 2001, when Eugene Kaspersky (of Kaskersky Labs) used it in reference to Code Red worm’s ability to exist solely in memory.

article thumbnail

Facebook Data Breach Update: attackers accessed data of 29 Million users

Security Affairs

Facebook data breach – The company p rovided an updated for the data breach it disclosed at the end of September, hackers accessed personal data of 29 million users. Facebook announced that hackers accessed data of 29 Million users, a number that is less than initially thought of 50 million. The hackers did not access did not affect Facebook-owned Messenger, Messenger Kids, Instagram, WhatsApp, Oculus, Workplace, Pages, payments, third-party apps or advertising or developer accounts,

article thumbnail

WannaCry Ransomware attack costs £92 million

IT Governance

The Department of Health and Social Care has estimated that the WannaCry ransomware attack , which disrupted more than 80 trusts and hundreds of GP practices last year, cost £92 million. The cost is associated with the loss of output and IT cost during the attack (£20 million) and the IT cost in the aftermath of the attack (£72 million). The Department also details the work and investment gone towards securing local infrastructure, reducing potential vulnerabilities and increasing NHS organisati

article thumbnail

DOM-XSS Bug Affecting Tinder, Shopify, Yelp, and More

Security Affairs

Our team of security researchers was researching dating apps client-side security, and one of the main focus targets was the social search mobile app Tinder. After initial reconnaissance steps were done, a Tinder domain with multiple client-side security issues was found – meaning hackers could have access to users’ profiles and details. Immediately after finding these vulnerabilities, we contacted Tinder via their responsible disclosure program and started working with them.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Three Boston-Area Hospitals Settle HIPAA Allegations Arising From On-Site Filming of Television Documentary

Data Matters

Three Boston-area hospitals collectively paid just under $1 million to settle allegations that they violated HIPAA by improperly disclosing patients’ identities and other protected health information during onsite filming of a television network documentary. According to the Department of Health and Human Services Office for Civil Rights (OCR)’s September 20, 2018 press release , the three hospitals – Boston Medical Center (BMC), Brigham and Women’s Hospital (BWH), and Massachusetts Gener

Privacy 68
article thumbnail

GAO Report on Equifax

Adam Shostack

I have regularly asked why we don’t know more about the Equifax breach, including in comments in “ That Was Close! Reward Reporting of Cybersecurity ‘Near Misses’ ” These questions are not intended to attack Equifax. Rather, we can use their breach as a mirror to reflect, and ask questions about how defenses work, and learn things we can bring to our own systems.

article thumbnail

Kanye’s Password

Roger's Information Security

Everyone and his brother, inside of infosec and outside has been chortling at Kanye’s iPhone password. Its 00000. Not everyone is in on the joke. Some express OUTRAGE. “how dare you share that man’s password” (it was on CNN, its out there now). Some (and these remind me of the 4D Chess MAGA people) theorize that Kanye is thinking 12 steps ahead.

article thumbnail

How Facebook Hackers Compromised 30 Million Accounts

WIRED Threat Level

Facebook has revealed more details about the unprecedented breach of its platform—including how hackers got away with the access tokens of 30 million users.

Access 79
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Threat Hunters & Security Analysts: A Dynamic Duo

Dark Reading

Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.

article thumbnail

10 top technology trends to watch in 2019

Information Management Resources

Automation, biometrics, blockchain and quantum computing will be among the technologies having the greatest impact on business opportunities, says a new report from CompTIA.

article thumbnail

Facebook Update: 30 Million Users Actually Hit in its Recent Breach

Dark Reading

The good news: That number is less than the original estimate of 50 million. The bad news: It might not have been the only attack.

IT 82
article thumbnail

How to Check If Your Facebook Account Got Hacked—And How Badly

WIRED Threat Level

Facebook Friday offered more details about its recent breach. Here's how to see if you were affected.

IT 93
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The BA breach: what do our ethical hackers think?

IT Governance

British Airways has released no technical details on how attackers managed to get 380,000 people’s personal information – including payment card numbers – from their systems. I’ve done some reading, though, and wanted to share my thoughts – and those of the wider ethical-hacking community – on this kind of breach and try to explain, in layman’s terms, how this was possible.

article thumbnail

Facebook Bans More Than 800 Accounts in Disinformation Purge

Threatpost

The move comes a month before the November midterm elections – and at a time when all eyes are on Facebook to see how it protects against disinformation.

IT 70
article thumbnail

Which States Have the Most Credit Card Fraud?

Rippleshot

Where is credit card fraud most rampant? Which states have the highest — and why? A new report provides some insight into these questions that every financial institution executive across the country should care about. New data from the Federal Trade Commission’s Consumer Sentinel Data Book provides some insight into just how much credit card fraud is growing across the U.S.