Wed.Jan 29, 2020

article thumbnail

Wawa's Stolen Payment Cards Are Now for Sale

Data Breach Today

Fraud Marketplace Joker's Stash Says it Has 30 Million Cards A long-running marketplace for selling stolen payment card data claims it has 30 million stolen payment cards that experts believe are linked to the breach at Wawa convenience stores late last year. The breach is one of the largest ever involving card-related data.

Sales 280
article thumbnail

Sprint Exposed Customer Support Site to Web

Krebs on Security

Fresh on the heels of a disclosure that Microsoft Corp. leaked internal customer support data to the Internet, mobile provider Sprint has addressed a mix-up in which posts to a private customer support community were exposed to the Web. KrebsOnSecurity recently contacted Sprint to let the company know that an internal customer support forum called “Social Care” was being indexed by search engines, and that several months worth of postings about customer complaints and other issues w

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fake Factory Experiment Illustrates Attackers' Tactics

Data Breach Today

Trend Micro Project Demonstrates Targeting of Industrial Control Systems Trend Micro researchers created a phony "smart factory" that lured attackers, demonstrating how they are increasingly focusing on industrial control systems and have become adept at planting malware within vulnerable infrastructure.

257
257
article thumbnail

Digital Transformation: Start with Simple

AIIM

It’s no secret that AIIM believes every organization is on — or should be on — a Digital Transformation journey. In fact, AIIM itself is on its own Digital Transformation! But, before I get into that, let’s take a deeper look at Digital Transformation and what it actually entails. At the heart of this transformation journey, is understanding, anticipating, and redefining internal and external customer experiences.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

UN Kept Hacker Attacks Under Wraps

Data Breach Today

United Nations Downplays Significance of Hacks Revealed by News Agency This Week The United Nations did not reveal hacks last year that compromised dozens of servers and domains and may have exposed sensitive data, including information related to human rights abuses, according to The New Humanitarian news agency.

233
233

More Trending

article thumbnail

NY Times Reporter Targeted by Spyware: Report

Data Breach Today

Citizen Lab Report Links Attempted Hacking to Saudi Group A New York Times reporter apparently was targeted with spyware developed by the NSO Group as part of a campaign that may be linked to a Saudi Arabia group, which has previously been accused of hacking attempts against dissidents, journalists and human rights lawyers, according to the think tank Citizen Lab.

219
219
article thumbnail

Customer Tracking at Ralphs Grocery Store

Schneier on Security

To comply with California's new data privacy law, companies that collect information on consumers and users are forced to be more transparent about it. Sometimes the results are creepy. Here's an article about Ralphs, a California supermarket chain owned by Kroger: the form proceeds to state that, as part of signing up for a rewards card, Ralphs "may collect" information such as "your level of education, type of employment, information about your health and information about insurance coverage y

Insurance 126
article thumbnail

How Deception Technologies Enable Proactive Cyberdefense

Data Breach Today

Sizing Up the Important Role the Technologies Can Play Deception technologies offer a way to shift away from a purely defensive "detect and response" postures toward more proactive offensive approaches that draw stealth cyberattackers into the open before a breach.

113
113
article thumbnail

Account protections -- A Google Perspective

Elie

This talk provides a data driven analysis of how accounts get compromised. Then it provides an in-depth overview of the defense we found effective at Google to protect users from account compromise. In particular we will cover how to mitigate password reuse, build a risk aware login system, and how to setup an Advanced Protection Program to protect users at risk of targeted attacks.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Phantom of the ADAS – Phantom Attacks Against Advanced Driving Assistance Systems

Security Affairs

Researchers investigate a new perceptual challenge that causes the ADAS systems and autopilots of semi/fully autonomous to consider depthless objects (phantoms) as real. Abstract. The absence of deployed vehicular communication systems, which prevents the advanced driving assistance systems (ADASs) and autopilots of semi/fully autonomous cars to validate their virtual perception regarding the physical environment surrounding the car with a third party, has been exploited in various attacks sugge

article thumbnail

Why should a Voice of the Customer program matter to your organization?

OpenText Information Management

The Voice of the Customer (VoC) is a term used in business to describe the in-depth process of capturing customer’s expectations, preferences and a strong dislike. From a pragmatic point of view, the VoC refers to the way an organization collects customer feedback, analyzes the data, distributes it to the right people and acts on … The post Why should a Voice of the Customer program matter to your organization?

article thumbnail

Wawa Breach May Have Affected More Than 30 Million Customers

Threatpost

Hefty collection of U.S. and international payment cards from the incident revealed in December found up for sale on dark-web marketplace Joker’s Stash.

Sales 79
article thumbnail

NIST Releases Version 1.0 of Privacy Framework to Help Organizations Manage Privacy Risks and Improve Protection of Personal Data

Data Matters

With issues around the collection and handling of personal data becoming the focus of increased scrutiny among regulators, policymakers, and consumers, interest has continued to grow among organizations to better understand and address privacy risk. Seeking to support innovation in the market and to accommodate the increasingly global nature of data processing ecosystems, the National Institute of Standards and Technology (“NIST”) released Version 1.0 of the NIST Privacy Framework: A Tool for I

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

CVE-2020-7247 RCE flaw in OpenSMTPD library affects many BSD and Linux distros

Security Affairs

Security researchers have spotted a vulnerability, tracked as CVE-2020-7247, that affects a core email-related library used by many BSD and Linux distributions. Security experts from Qualys have discovered a flaw, tracked as CVE-2020-7247, in OpenSMTPD. OpenSMTPD is an open-source implementation of the server-side SMTP protocol as defined by RFC 5321, it includes also some additional standard extensions.

article thumbnail

9 Things Application Security Champions Need to Succeed

Dark Reading

Common elements to highly effective security champion programs that take DevSecOps to the next level.

article thumbnail

Study cautions against investing too much, too soon in AI technology

Information Management Resources

Decision makers oftentimes do not fully understand the technology and have not thought through the true costs of implementing artificial intelligence in their organization.

article thumbnail

Aftermath of a Major ICS Hacking Contest

Dark Reading

Pwn2Own Miami could help spur more research on and attention to the security of industrial control system products, experts say.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Top Cloud Security Companies

eSecurity Planet

Cloud computing has brought enormous benefits - and risks. Here are the vendors leading the way with state-of-the-art cloud security products.

Cloud 67
article thumbnail

Number of Botnet Command & Control Servers Soared in 2019

Dark Reading

Servers worldwide that were used to control malware-infected systems jumped more than 71% compared to 2018, Spamhaus says.

79
article thumbnail

DataOps is the key to success in the era of AI and machine learning

Information Management Resources

While the business value of AI is easy to understand and evangelize, the operational implications of these trends are far more complex than is generally understood.

article thumbnail

Subject Matter Experience And Product Quality Are Dead

Reltio

One fine day the water dispenser of my two-year-old, French-door refrigerator stopped working. No problem, I thought, as I had enough foresight to sign up for a home warranty policy literally a month prior. Aside from having a practically-new appliance break, it took five weeks and three different service visits with hundreds-of-dollars or parts being shipped to my house to fix the issue.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Commercial Insights for Government Solutions — Smart Cities Implications

Interactive Information Management

More and more often, governments (local, state, Federal) are finding the most current, useful and high-performing solutions (particularly in the IT space) are created through very collaborative engagement of the commercial ecosystem. Bringing " commercial insights for government solutions " to bear, is actually essential at this time, for example in designing, building and improving Smart City initiatives.

article thumbnail

Preparing for the Worst

Rocket Software

At a previous job, one of our systems notified us there had been a disk failure. I was not too concerned, as we had redundancy built into the disk array. In short order; however, we had several other disks fail, and the system came down hard. We would later find out there was a manufacturing issue that caused so many disks to fail in such a short amount of time.

article thumbnail

Connecting with Us

National Archives Records Express

Switchboard Pictures. Photographs of Marshall Plan Programs, Exhibits, and Personnel, 1948 – 1967, National Archives Identifier: 19996695. The Office of the Chief Records Officer is changing how we communicate! We are moving to a new tool to manage contact information and send out email communications from our office. . Previously, we used a GSA-listserv.

article thumbnail

Video: Zoom Researcher Details Web Conference Security Risks, 2020 Threats

Threatpost

Maya Horowitz with Check Point Research discussed recently-disclosed Zoom vulnerabilities that could have opened up web conferencing meetings to hackers.

Risk 55
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Heather Gardner shines a light on analytics and the energy industry

IBM Big Data Hub

The latest edition for the Analytics Hero blog series.

article thumbnail

How Enterprises Are Developing and Maintaining Secure Applications

Dark Reading

The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.

article thumbnail

Critical Flaws in Magento e-Commerce Platform Allow Code-Execution

Threatpost

Admins are encouraged to update their websites to stave off attacks from Magecart card-skimmers and others.