Thu.Feb 21, 2019

article thumbnail

New Breed of Fuel Pump Skimmer Uses SMS and Bluetooth

Krebs on Security

Fraud investigators say they’ve uncovered a sophisticated new breed of credit card skimmers being installed at gas pumps that is capable of relaying stolen card data via mobile text message, thereby enabling fraudsters to collect it from anywhere in the world. One interesting component of this criminal innovation is a small cellphone and Bluetooth-enabled device hidden inside the contactless payment terminal of the pump, which appears to act as a Bluetooth hub that wirelessly gathers card

article thumbnail

11 Takeaways: Targeted Ryuk Attacks Pummel Businesses

Data Breach Today

Faulty Decryptor Often Shreds Victims' Data, McAfee and Coveware Warn A rush by some media outlets to attribute a late-2018 alleged Ryuk ransomware infection at Tribune Publishing to North Korean attackers appears to have been erroneous, as many security experts warned at the time. Rather, multiple cybercrime gangs appear to be using Ryuk, say researchers at McAfee and Coveware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Information Architecture is VITAL to Information Governance

Weissman's World

Our very own Kevin Parker has written another stellar piece on the importance of information architecture to information governance. You can read it in ARMA’s Information Management Magazine – and if you want to learn more, register for Kevin’s ARMA iMasters Webinar on February 27. He IS a busy boy! The post Why Information Architecture is VITAL to Information Governance appeared first on Holly Group.

article thumbnail

WhatsApp Flaw Could Enable iOS Message Snooping

Data Breach Today

Facebook Promises Quick Patch for Face ID and Touch ID Bypassing Problem Facebook says it will soon issue a patch for a bug in its WhatsApp messenger application that can circumvent a security feature launched just last month for Apple devices. The flaw could let someone with physical access to a device bypass Face ID and Touch ID.

Access 231
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

AIIM19 Session Preview - Bot Bootcamp: How to Manage Your Artificial Employees

AIIM

There are some important sessions planned for AIIM19 this year. Topics range from artificial intelligence to business process automation and data analytics and beyond. But none will be more informative than a session planned by David Jacopille from Massachusetts Financial Services titled “Bot Bootcamp: How to Manage Your Artificial Employees.” I spoke recently with David and asked him to give us a preview of what to expect.

More Trending

article thumbnail

Security experts released new GandCrab Decryptor for free

Security Affairs

Security experts at BitDefender have released a new version of the GandCrab decryptor able to decrypt versions of GandCrab 1, 4 and 5. Security experts at BitDefender have released a new version of the GandCrab decryptor that could be used to decrypt versions of GandCrab 1, 4 and 5, including the latest version 5.1. The GandCrab decryptor is available for free from BitDefender and from the NoMoreRansom project.

article thumbnail

Scaling Security at the Internet Edge with Stateless Technology

Data Breach Today

Organizations are taking a new approach to optimizing their security stack by ensuring their systems focus on processing the traffic they are designed to see Explore the realm of stateless technology and the Internet edge, with best practices, lessons learned, and key deployment strategies

Security 168
article thumbnail

The Russian Sleuth Who Outs Moscow's Elite Hackers and Assassins

WIRED Threat Level

Roman Dobrokhotov has been playing a dangerous game for a Russian reporter: identifying agents of the GRU military intelligence agency.

Military 111
article thumbnail

Why Cybersecurity Burnout Is Real (and What to Do About It)

Dark Reading

The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here's how to turn down the pressure.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Critical bug in WINRAR affects all versions released in the last 19 years

Security Affairs

Security experts at Check Point have disclosed technical details of a critical vulnerability in the popular file compression software WinRAR. Experts at Check Point discovered the logical bug in WinRAR by using the WinAFL fuzzer and found a way to exploit it to gain full control over a target computer. Over 500 million users worldwide use the popular software and are potentially affected by the flaw that affects all versions of released in the last 19 years.

article thumbnail

Labour reports former MP Joan Ryan over alleged data breach

The Guardian Data Protection

Party claims MP contacted its supporters after quitting for the Independence Group Labour has reported its former MP Joan Ryan to the Information Commissioner’s Office alleging she accessed party systems to contact members after resigning from the party on Tuesday to join the breakaway Independence Group. It is understood the party has informed the information commissioner about the alleged breach and that it intends to submit a full report.

article thumbnail

Quantum computing will change everyday life for the better

DXC Technology

Quantum computing is the next holy grail of computer science and engineering, promising to change everyday life for the better. Today’s smartphones have the same computing power as a military computer 50 years ago that was the size of an entire room. Yet despite the phenomenal strides we have made in technology and computing, there […].

article thumbnail

Cisco addresses flaws in HyperFlex and Prime Infrastructure

Security Affairs

Cisco released security patches that address more than a dozen issues in its products, including high severity flaws in HyperFlex, Prime Infrastructure, and Prime Collaboration Assurance. Cisco released security patches that address more than a dozen issues in its products, including high severity vulnerabilities affecting HyperFlex, Prime Infrastructure, and Prime Collaboration Assurance.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Five high notes from Think 2019

IBM Big Data Hub

At IBM's recent Think 2019, enterprises embarking upon their AI journey were squarely focused on sessions and labs focused on how to get data ready for successful AI deployments. We sent our newest, freshest team member Thomas LaMonte loose at Think during his second week at IBM to get his first impressions.

81
article thumbnail

Expert found a DoS flaw in Windows Servers running IIS

Security Affairs

Windows servers running Internet Information Services (IIS) are vulnerable to denial-of-service (DoS) attacks carried out through malicious HTTP/2 requests. Microsoft revealed that Windows servers running Internet Information Services (IIS) are vulnerable to denial-of-service ( DoS ) attacks. Attackers can trigger a DoS condition by sending specially crafted HTTP/2 requests, the CPU usage will temporarily spike to 100% forcing the IIS into killing the malicious connections. “Microsoft is a

article thumbnail

Reverse Location Search Warrants

Schneier on Security

The police are increasingly getting search warrants for information about all cellphones in a certain location at a certain time: Police departments across the country have been knocking at Google's door for at least the last two years with warrants to tap into the company's extensive stores of cellphone location data. Known as "reverse location search warrants," these legal mandates allow law enforcement to sweep up the coordinates and movements of every cellphone in a broad area.

Privacy 77
article thumbnail

CVE-2019-6340 Critical flaw in Drupal allows Remote Code Execution

Security Affairs

Security expert found a “highly critical” vulnerability (CVE-2019-6340) in the popular Drupal CMS that could be exploited for remote code execution. Drupal released security updates that addresses a “highly critical” vulnerability in the popular Drupal CMS, tracked as CVE-2019-6340, that could be exploited for remote code execution. The CVE-2019-6340 flaw is caused by the lack of proper data sanitization in some field types, an attacker could exploit the flaw to execute arbitrary PHP code. ̶

CMS 78
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Security Analysts Are Only Human

Dark Reading

SOC security analysts shoulder the largest cybersecurity burden. Automation is the way to circumvent the unavoidable human factor. Third in a six-part series.

article thumbnail

Adobe released second fix for the same Adobe Reader flaw

Security Affairs

Adobe released a second patch to address the CVE 2019-7089 flaw in Adobe Reader after an expert found the way to bypass the first fix. Adobe on Thursday released a second patch to address a critical information disclosure vulnerability in Adobe reader, tracked as CVE 2019-7089 , after the expert who initially discovered the flaw devised a method to bypass the first fix.

article thumbnail

Weekly podcast: Password managers, unpatched vulnerabilities, formjacking and Wendy’s

IT Governance

This week, we discuss a security flaw affecting 1Password, Dashlane, KeePass and LastPass; the prevalence of historic vulnerabilities in corporate IT systems; the increase in formjacking attacks; and Wendy’s $50 million data breach settlement. Hello, and welcome to the IT Governance podcast for Thursday, 21 February 2019. Here are this week’s stories.

article thumbnail

How to beat the creative content crunch

OpenText Information Management

With the demand for creative content to support an ever-increasing volume of campaigns and programs on the rise, marketers turn to digital asset management (DAM) solutions to address their creative challenges. A DAM platform like OpenText™ Media Management helps marketers organize and store large volumes of digital media content. But to solve both halves of … The post How to beat the creative content crunch appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Protect Data Stored on Premises and in Azure — with NetVault

Quest Software

Level up your backup and recovery strategy including your hybrid data center. See how NetVault Backup provides advanced, cloud-ready data protection.( read more ).

Cloud 75
article thumbnail

19-Year-Old WinRAR Flaw Plagues 500 Million Users

Threatpost

Users of the popular file-compression tool are urged to immediately update after a serious code-execution flaw was found in WinRAR.

83
article thumbnail

Digital Transformation In Retail: The Retail Apocalypse

erwin

Much like the hospitality industry , digital transformation in retail has been a huge driver of change. One important fact is getting lost among all of the talk of “the retail apocalypse” and myriad stories about increasingly empty shopping malls: there’s a lot of money to be made in retail. In fact, the retail market was expected to grow by more than 3 percent in 2018 , unemployment is low, and wages are at least stable.

article thumbnail

Why you should join Jamf Nation

Jamf

If you aren't already leveraging the largest Apple IT community on the planet, this systems engineer wants to fill you in on what you're missing.

IT 73
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Attack Campaign Experiments with Rapid Changes in Email Lure Content

Dark Reading

It's like polymorphic behavior - only the changes are in the email lures themselves, with randomized changes to headers, subject lines, and body content.

IT 73
article thumbnail

The vision for Db2 and other announcements from Think 2019

IBM Big Data Hub

At the Think 2019 conference, IBM hosted a plethora of data-management-focused sessions with several announcements that will undoubtedly impact the data management strategy of many businesses.

67
article thumbnail

Cyber Extortionists Can Earn $360,000 a Year

Dark Reading

Extortion scams capitalize on compromised credentials, sensitive data, and technical vulnerabilities on Internet-facing applications to pressure victims to pay up.

67