Tue.Mar 20, 2018

article thumbnail

Expedia's Orbitz Suspects 880,000 Payment Cards Stolen

Data Breach Today

Hacker May Have Also Obtained Other Customer Data in Breach, Orbitz Warns Expedia's Orbitz travel fare search engine says it may have suffered a breach that resulted in 880,000 payment cards being compromised, along with other customer data, over a two-year period. Orbitz says the apparent breach involved a legacy system no longer connected to its site.

IT 182
article thumbnail

Facebook: is it time we all deleted our accounts?

The Guardian Data Protection

The Cambridge Analytica revelations may be the final nudge we need to turn away from the social network. And it’s only the tip of the iceberg when it comes to big tech harvesting private information Sorry to break it to you, but you are probably a “dumb f**k”. This is according to statements by a young Mark Zuckerberg anyway. Back in 2004, when a 19-year-old Zuckerberg had just started building Facebook, he sent his Harvard friends a series of instant messages in which he marvelled at the fact t

IT 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook: Day of Reckoning, or Back to Business as Usual?

Data Breach Today

Social Media Users' Profiles Get Used Against Them The unfolding story of Cambridge Analytica, which shows how personal information on millions of consumers was obtained via Facebook, demonstrates the degree to which our personal data can be weaponized against us.

article thumbnail

'Utterly horrifying': ex-Facebook insider says covert data harvesting was routine

The Guardian Data Protection

Sandy Parakilas says numerous companies deployed these techniques – likely affecting hundreds of millions of users – and that Facebook looked the other way Hundreds of millions of Facebook users are likely to have had their private information harvested by companies that exploited the same terms as the firm that collected data and passed it on to Cambridge Analytica, according to a new whistleblower.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Reducing Medical Device Cyber Risks

Data Breach Today

Many medical devices, especially older ones, were not designed with cybersecurity in mind, so healthcare organizations need to take special precautions to reduce risks, says security expert Justine Bone, who describes effective strategies.

Risk 100

More Trending

article thumbnail

Alphabet's 'Outline' Homebrew VPN Software Offers Open-Source, Easy Set-Up Privacy You Control

WIRED Threat Level

Alphabet tech incubator Jigsaw wants to make it easy to run your own, more private virtual private network.

Privacy 104
article thumbnail

Gold Coast council to use wifi to harvest Facebook data during Commonwealth Games

The Guardian Data Protection

The data mining, which the council says is legal, will be used to market the city to tourists The Gold Coast council will use a new city wifi service to harvest Facebook data from visitors to next month’s Commonwealth Games. The data mining, which the council says is legal and will be used to help the city market itself to tourists, relies on visitors using their Facebook accounts to log into a new high-speed wifi service.

Mining 88
article thumbnail

How to write a GDPR-compliant data subject access request procedure

IT Governance

In the lead up to May, it is important your organisation prioritises steps to prove that you are making an effort to comply with the EU General Data Protection Regulation (GDPR). One activity that you should start without delay is writing a data subject access request (DSAR) procedure. What is a data subject access request? The GDPR introduces the ‘right of access’ for individuals and from 25 May, the compliance deadline, data subjects will have the right to request: Confirmation that their data

GDPR 77
article thumbnail

David Carroll, the US professor taking on Cambridge Analytica in the UK courts

The Guardian Data Protection

A case before the high court in London is seeking to recover personal information from the controversial data mining company An American professor who is using UK law to try to reclaim data that may be held by Cambridge Analytica has told the Guardian he is encouraged that regulatory pressures on both sides of the Atlantic could force companies to be more transparent about their handling of personal information.

Mining 81
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cambridge Analytica CEO Alexander Nix Suspended Amid Scandals

WIRED Threat Level

Alexander Nix has been suspended until further notice and replaced by Cambridge's head of data, Alexander Tayler.

article thumbnail

Think 2018: Our favorite highlights from Tuesday

IBM Big Data Hub

The excitement, insights and innovation at Think 2018 is truly astounding. Today we heard from IBM Chairman, President and CEO, Ginni Rometty, plus industry leaders and clients who are transforming whole business sectors.

71
article thumbnail

IT Governance launches webinar on penetration testing and the GDPR

IT Governance

IT Governance is running a webinar to help organisations understand how penetration testing can help improve existing security measures for securing personal information and comply with the EU General Data Protection Regulation (GDPR). Regular penetration testing can prevent cyber criminals from exploiting defects in web servers, browsers, email clients, point-of-sale (POS) software, operating systems and server interfaces, so it is an essential part of GDPR compliance.

GDPR 67
article thumbnail

Diving Into the Dark Web and Understanding the Economy Powering Cyber Attacks

PerezBox

This morning, Armor, a cloud security provider, released a great report into the cyber crime black market. Armor was formerly known as as FireHost – they were one of the leading hosts. Read More. The post Diving Into the Dark Web and Understanding the Economy Powering Cyber Attacks appeared first on PerezBox.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

AMD Acknowledges Vulnerabilities, Will Roll Out Patches In Coming Weeks

Threatpost

AMD on Tuesday acknowledged several vulnerabilities that had been reported in its Ryzen and EPYC chips, and said that it would roll out PSP firmware patches in the coming week.

IT 61
article thumbnail

Going Agile with OpenText Content Server

OpenText Information Management

At first glance I know what you’re thinking. “This post is only really intended for down-and-dirty software developers that poke around in the deepest darkest places that Content Server has to offer. It’s nothing to do with me”. Yes, to a certain extent I’m talking to you. But to a greater degree I’m talking to … The post Going Agile with OpenText Content Server appeared first on OpenText Blogs.

IT 56
article thumbnail

Telegram Ordered to Hand Over Encryption Keys to Russian Authorities

Threatpost

Popular secure messaging service Telegram loses battle with Russian courts and now must hand over encryption keys or face being blocked from the country.

article thumbnail

Today at Think 2018: What you can’t miss Tuesday

IBM Big Data Hub

The second day of Think 2018 is here, and there’s an abundance of things to see and do at the Cloud & Data Campus. Here are the not-to-miss Think 2018 keynote speeches, demos, panels, training labs and other hands-on activities for Tuesday, March 20, both at the event and by tuning in online.

Cloud 51
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Experts Call Facebook’s Latest Controversy a Social Media ‘Breach Of Trust’

Threatpost

Security experts are calling for a higher prioritization of data security in the wake of Facebook's Cambridge Analytica scandal.

article thumbnail

The Case for Integrating Physical Security & Cybersecurity

Dark Reading

Aggregating threat intel from external data sources is no longer enough. You must look inside and outside your traditional knowledge base for the best way to defend against attacks.

article thumbnail

Richard Thomas Selected as Chair for Guernsey’s New Data Protection Authority

Hunton Privacy

Hunton & Williams LLP is pleased to announce that Richard Thomas , Global Strategy Advisor to the Centre for Information Policy Leadership (“CIPL”), has been selected as Chair for the Bailiwick of Guernsey’s new data protection authority. Adding the appointment to his position at CIPL, Thomas will be formally appointed in May and will work with the Data Protection Commissioner and the States of Guernsey to support the island’s regulatory framework in conjunction with the introduction of its

Privacy 48
article thumbnail

Critical Infrastructure: Stop Whistling Past the Cyber Graveyard

Dark Reading

An open letter to former colleagues in Homeland Security, peers in private sector cybersecurity firms, those who own and operate critical systems, academics, and politicians.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

ABBYY Joins TWAIN Working Group as an Associate Member

Info Source

. Raleigh, NC – March 20, 2018 – The TWAIN Working Group (TWG), a not-for-profit organization designed to provide and foster a universal public standard which links applications and image acquisition devices, today announced the addition of ABBYY as an Associate member of the TWAIN Working Group. ABBYY, a global provider of intelligent capture solutions to improve business outcomes has joined the Group to provide its technical expertise to the further development of the TWAIN Dir

article thumbnail

7 Spectre/Meltdown Symptoms That Might Be Under Your Radar

Dark Reading

The Spectre/Meltdown pair has a set of major effects on computing but there are impacts on the organization that IT leaders might not have considered in the face of the immediate problem.

IT 46
article thumbnail

Will data science, machine learning and AI ‘save’ IT security?

Information Management Resources

The importance of identifying data sources, collecting those sources, and applying them wisely is key to prevention, the reduction of threat actor dwell time, and threat mitigation.

article thumbnail

Programs Controlling ICS Robotics Are ‘Wide Open’ to Vulnerabilities

Threatpost

Dewan Chowdhury, founder of MalCrawler, talks at SAS about the risks that companies face when securing their industrial control systems and robotics.

Risk 46
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Brett Burney of Burney Consultants LLC: eDiscovery Trends 2018

eDiscovery Daily

This is the third of the 2018 Legaltech New York (LTNY) Thought Leader Interview series. eDiscovery Daily interviewed several thought leaders at LTNY this year (and some afterward) to get their observations regarding trends at the show and generally within the eDiscovery industry. Today’s thought leader is Brett Burney. Brett is Principal of Burney Consultants LLC , and focuses the bulk of his time on bridging the chasm between the legal and technology frontiers of electronic discovery.

article thumbnail

Azure Guest Agent Design Enables Plaintext Password Theft

Dark Reading

Researchers find attackers can abuse the design of Microsoft Azure Guest Agent to recover plaintext administrator passwords.

article thumbnail

How To Change Your Facebook Settings To Opt Out of Platform API Sharing

Architect Security

In case you missed it, news that “private” user data was harvested from 50 million profiles by a company called Cambridge Analytica hit the major news media this week. Data was gathered through a “survey” that exposed data about the user and their friends/connections. Short of quitting social media altogether, you should be wary of any of […].

IT 40