Thu.Jul 26, 2018

article thumbnail

Shipping Giant Cosco Hit by Ransomware Attack

Data Breach Today

Networks in 8 North and South America Countries Remain Offline A "local network breakdown" - reportedly caused by a ransomware infection - has led shipping giant Cosco to shut down networks for its offices in eight North America and South America countries while it scrubs and restores systems. Some corporate websites, email and phone systems remain offline.

article thumbnail

Amazon's Facial Recognition System Mistakes Members of Congress for Mugshots

WIRED Threat Level

Amazon has marketed its Rekognition facial recognition system to law enforcement. But in a new ACLU study, the technology confused 28 members of Congress with publicly available arrest photos.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook's Security and Privacy Overhaul Comes at a Price

Data Breach Today

CEO Mark Zuckerberg Reports Decreased Profitability, GDPR Impact Facebook is making substantial investments to improve its data security and privacy practices. But the long-term cost of those investments and impact on the bottom line appeared to spook investors, leading to a 20 percent plunge in the company's stock price in after-hours trading.

Privacy 162
article thumbnail

Amnesty International creates new global human rights digital archive with Preservica

Preservica

The world’s largest grassroots human rights organization will use Preservica’s active digital preservation platform to create a global archive that will accelerate investigations into human rights violations and protect digital records of significant historical importance to the global movement. Oxford, UK and Boston, MA. July 26th 2018: Amnesty International, a recipient of the Nobel Peace Prize for its "defence of human dignity against torture,” has chosen Preservica’s active digital preservat

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Biggest Pediatric Hospital Breach Reported

Data Breach Today

105,000 Affected at Boys Town National Research Hospital A hacking incident at Boys Town National Research Hospital is the largest ever reported by a pediatric care provider or children's hospital, according to the federal health data breach tally. A wide variety of data on 105,000 individuals was exposed, opening the door to potential fraud.

More Trending

article thumbnail

Are you #BreachReady?

IT Governance

It seems like every other day we hear of another data breach, with household names including Adidas, Ticketmaster and Dixons Carphone – to name just a few – suffering at the hands of criminal hackers. In 2017, 826 million data records were reported lost or stolen, with security breaches attributing for 58 million of these cases. If you think it only happens to large organisations, think again.

article thumbnail

US-CERT warns of ongoing cyber attacks aimed at ERP applications

Security Affairs

US-CERT warns of cyber attacks on ERP applications, including Oracle and SAP, and refers an interesting report published by Digital Shadows and Onapsis. US-CERT warns of cyber attacks on Enterprise resource planning (ERP) solutions such as Oracle and SAP, both nation-state actors and cybercrime syndicates are carrying out hacking campaign against these systems.

article thumbnail

GPs and social service providers demand My Health Record protections

The Guardian Data Protection

Peak bodies want abolition of ‘loopholes’ that give access to law enforcement, Centrelink or the tax office The peak bodies for general practitioners and social services have united to call for major changes to My Health Record to ensure it can only be used for medical purposes. Malcolm Turnbull has signalled the government will make “refinements” to the My Health Record scheme, but a growing backlash has lead to calls for changes including requiring law enforcement agencies to get a warrant to

Privacy 62
article thumbnail

Gimmal is a Charter Member of Microsoft’s New Content Services Partner Program

Gimmal

The 2018 Microsoft Inspire conference was truly one for the books. As organizations and Microsoft partners from around the world converged in Las Vegas bringing together industry experts and like-minded people fueled by cloud, IoT, and AI, attendance soared well over 20,000.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Achieve ISO 27001 compliance with our implementation bundles

IT Governance

Now that the GDPR (General Data Protection Regulation) is in force, it’s important to ensure that you’re taking the necessary steps towards achieving compliance. ISO 27001 is the international standard that describes best practice for an information security management system (ISMS). Achieving accredited certification to ISO 27001 demonstrates that your organisation is following information security best practice, and provides assurance that your security controls will protect your organisation

article thumbnail

Ransomware attack disrupted some systems of the shipping giant COSCO in the US

Security Affairs

The Chinese shipping giant COSCO was reportedly hit by a ransomware based attack, the attack occurred in the American region. According to COSCO a “local network breakdown” disrupted some systems in the United States. Media confirmed the incident was the result of a ransomware attack and quoted a company spokesman as the source. “The China Ocean Shipping Co.

article thumbnail

Why you should be concerned about security incidents… even if you have a BCMS

IT Governance

As you might expect, the BCI Horizon Scan Report 2018 found that the majority of business continuity professionals were “concerned” or “extremely concerned” about the threat of cyber attacks and data breaches. In this regard, they are much like any other kind of information security professional. The increase in cyber attacks would have anybody concerned.

article thumbnail

Google Employees Use a Physical Token as Their Second Authentication Factor

Schneier on Security

Krebs on Security is reporting that all 85,000 Google employees use two-factor authentication with a physical token. A Google spokesperson said Security Keys now form the basis of all account access at Google. "We have had no reported or confirmed account takeovers since implementing security keys at Google," the spokesperson said. "Users might be asked to authenticate using their security key for many different apps/reasons.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ensure you’re #BreachReady in the media sector

IT Governance

While the sassy summer sunshine shines, you should be shielded in the shade for sure. A ferocious summer heatwave continues to dominate the majority of the UK’s social media posts and entertainment news stories. But despite increased excitement and relaxed engagement online, it’s important to remember that your media-rich content requires its own SPF (security protection factor) to defend against a costly data-breach burn… especially during the holiday months when your workforce is reduced

article thumbnail

Experts discovered a Kernel Level Privilege Escalation in Oracle Solaris

Security Affairs

Security expert discovered Kernel Level Privilege Escalation vulnerability in the Availability Suite Service component of Oracle Solaris 10 and 11.3. Security researchers from Trustwave have discovered a new high severity vulnerability, tracked as CVE-2018-2892, that affected the Availability Suite Service component in Oracle Solaris 10 and 11.3. The flaw could be exploited by a remote authenticated attacker to execute code with elevated privileges. “A local kernel ring0 code execution vu

article thumbnail

8 Steps Toward Safer Elections

Dark Reading

Here's some advice from leading authorities on how state and local governments can adapt to an environment where election systems will inevitably be hacked.

article thumbnail

Kronos Banking Trojan resurrection, new campaigns spotted in the wild

Security Affairs

Researchers from Proofpoint have discovered a new variant of the infamous Kronos banking Trojan that was involved in several attacks in the recent months. The infamous Kronos banking Trojan is back, and according to the experts from Proofpoint it was involved in several attacks in the last months. The malware was first spotted in 2014 by researchers at security firm Trusteer that discovered an adv on the Russian underground market regarding a new financial Trojan dubbed Kronos. .

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Double-Edged Sword of Artificial Intelligence in Security

Dark Reading

AI is revolutionizing cybersecurity for both defenders and attackers as hackers, armed with the same weaponized technology, create a seemingly never-ending arms race.

article thumbnail

DARPA Wants Research into Resilient Anonymous Communications

Schneier on Security

DARPA is funding research into resilient anonymous communications systems.

article thumbnail

OCR Issues Guidance on Disclosures to Family, Friends and Others

Hunton Privacy

In its most recent cybersecurity newsletter , the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) provided guidance regarding identifying vulnerabilities and mitigating the associated risks of software used to process electronic protected health information (“ePHI”). The guidance, along with additional resources identified by OCR, are outlined below: Identifying software vulnerabilities.

article thumbnail

India to investigate alleged Cambridge Analytica data breach

The Guardian Data Protection

Inquiry to determine if data of Indian voters and Facebook users was compromised India’s federal investigating agency will determine whether personal data from Indian voters and Facebook users was compromised by the political consultant company Cambridge Analytica. The minister of electronics and information technology, Ravi Shankar Prasad, said the Central Bureau of Investigation would look at whether the British company violated Indian laws.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Sen. Wyden Urges Government Ban on Adobe Flash

Threatpost

Senator sends letter to NSA and NIST urging a mandate to stop using Adobe Flash by August 2019.

article thumbnail

ARMA announces this year’s keynote speaker, Dr. Jennifer Golbeck, Ph.D.

IG Guru

ARMA is pleased to announce this year’s keynote speaker, Dr. Jennifer Golbeck, Ph.D. Jennifer is the Director of the Social Intelligence Lab at the University of Maryland and a web security expert. Her 2013 TED Talk, “Your Social Media ‘Likes’ expose more than you think,” uncovers the data exposure that social media can create. Watch […]. The post ARMA announces this year’s keynote speaker, Dr.

article thumbnail

Bugs in Samsung IoT Hub Leave Smart Home Open To Attack

Threatpost

Researchers found 20 flaws in Samsung’s SmartThings Hub controller - opening up supported third-party smart home devices to attack.

IoT 49
article thumbnail

3 Common HIPAA Violations to Avoid

Armstrong Archives

Every healthcare provider in the country must abide by strict Health Insurance Portability and Accountability Act (HIPAA) regulations. The Act became law in 1996, aiming to simplify healthcare, prevent fraud, and increase efficiency. The list of HIPAA regulations is long, with many opportunities for mistakes and violations. Learn the most common reasons for compliance breaches to keep your establishment on the right side of the law.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Threat Modeling Thursday: 2018

Adam Shostack

Since I wrote my book on the topic, people have been asking me “what’s new in threat modeling?” My Blackhat talk is my answer to that question, and it’s been taking up the time that I’d otherwise be devoting to the series. As I’ve been practicing my talk*, I discovered that there’s more new than I thought, and I may not be able to fit in everything I want to talk about in 50 minutes.

IT 40
article thumbnail

Off-Site vs. On-Site Shredding: A Head-to-Head Comparison

Archive Document Data Storage

A corporate data security policy needs to include reliable and secure document disposal practices. As identity theft and business fraud rates rise, there’s a bevy of on-site and off-site shredding vendors competing for your business. But which privacy protection option offers the best overall value for your organisation? In this blog, we offer a head-to-head comparison of off-site vs. on-site shredding so you can decide for yourself.

GDPR 40
article thumbnail

Breaking the Ice on DICE: scaling secure Internet of Things Identities

The Security Ledger

In this Spotlight Podcast, sponsored by Trusted Computing Group*, Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of solving a range of security and identity problems on low cost, low power IoT endpoints. Among them: establishing strong device. Read the whole entry. » Related Stories Expert says: Hack your Smart Home to Secure It Fitness apps: Good for your health, not so much for military se

IoT 40