Mon.Sep 30, 2019

article thumbnail

Apple iOS Has Permanent Bootrom Vulnerability

Data Breach Today

'Checkm8' Exploit Poses Risk to Hundreds of Millions of Devices A security researcher has uncovered what may rank as one of the most significant iOS weaknesses ever discovered: a flaw that enables bypassing the security protections present in most Apple mobile devices. While the vulnerability can't be patched, an attacker would need physical access to exploit it.

Risk 240
article thumbnail

NEW TECH: Breakthrough ‘homomorphic-like’ encryption protects data in-use, without penalties

The Last Watchdog

Homomorphic encryption has long been something of a Holy Grail in cryptography. Related: Post-quantum cryptography on the horizon For decades, some of our smartest mathematicians and computer scientists have struggled to derive a third way to keep data encrypted — not just the two classical ways, at rest and in transit. The truly astounding feat, aka homomorphic encryption, would be to keep data encrypted while it is being actively used by an application to run computations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Former Army Contractor Gets Prison Term for Insider Attack

Data Breach Today

Judge Sentences Maryland Man to Two Years in Prison for Causing $1 Million in Damage A former Army contractor has been sentenced to two years in federal prison after admitting causing more than $1 million in damage by accessing servers and data that belonged to a Pentagon client of his employer, according to the Justice Department.

Access 211
article thumbnail

Supply-Chain Security and Trust

Schneier on Security

The United States government's continuing disagreement with the Chinese company Huawei underscores a much larger problem with computer technologies in general: We have no choice but to trust them completely, and it's impossible to verify that they're trustworthy. Solving this problem ­ which is increasingly a national security issue ­ will require us to both make major policy changes and invent new technologies.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Rheinmetall Investigating Malware Attack at Three Plants

Data Breach Today

German Defense Contractor Says Incident Costing $4 Million a Week An unspecified malware attack against the IT systems of Rheinmetall's automotive division in Brazil, Mexico and the U.S. is costing the company an estimated $4 million a week, the company says. It's one of several attacks over the last two weeks affecting defense contractors.

IT 212

More Trending

article thumbnail

Report: US Voting Machines Still Prone to Hacking

Data Breach Today

DEF CON Voting Village Study Highlights Security Loopholes in Voting Machines U.S. voting machines remain susceptible to tampering, hacking and security vulnerabilities despite warnings from ethical hackers and security researchers in the lead-up to the 2020 U.S.

Security 178
article thumbnail

Microsoft Announces Ability to Force TLS Version Compliance

Dark Reading

Transport Layer Security (TLS) can be critical for security, but it must be deployed in a current version. Microsoft now provides a mechanism for administrators to guarantee the right version in their network.

article thumbnail

Baltimore Ransomware Carnage Compounded by Local Storage

Data Breach Today

Auditor Reveals Lack of IT Policies Ensuring Employees' PCs Centrally Backed Up The city of Baltimore's ransomware outbreak - $18 million in costs and counting - led to many crypto-locked files being lost forever, because no IT policy mandated centralized file backups. But effective IT solutions exist to help solve this challenge, provided they're deployed in advance of an attack.

article thumbnail

Baltimore Reportedly Had No Data Backup Process for Many Systems

Dark Reading

City lost key data in a ransomware attack earlier this year that's already cost more than $18.2 million in recovery and related expenses.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk.

Risk 138
article thumbnail

eGobbler ‘s malvertising campaign hijacked over 1 billion ad impressions

Security Affairs

A recently observed a malvertising campaign carried out by a threat group dubbed eGobbler that hijacked roughly 1.16 billion ad impressions. Researchers at Confiant observed a malvertising campaign carried out by a threat actor dubbed eGobbler hijacked roughly 1.16 billion ad impressions to redirect victims to websites hosting malicious payloads. The campaign was observed between August 1 and September 23.

article thumbnail

PSD2 Authentication Deadline Needs to Be Firmed Up - Now

Data Breach Today

European Banking Authority Should Act Quickly to Adopt Uniform Timeline for All EU Nations Delayed enforcement of the "strong customer authentication" requirements for online transactions under the European Union's PSD2 regulation is hampering efforts to enhance security. That's why the European Banking Authority should act quickly to develop a new timeline.

article thumbnail

Arcane Stealer V, a threat for lower-skilled adversaries that scares experts

Security Affairs

Experts recently analyzed an information-stealing malware tracked as Arcane Stealer V that is very cheap and easy to buy in the Dark Web. In July 2019, researchers at Fidelis Threat Research Team (TRT) analyzed a sample of Arcane Stealer V, a.net information-stealing malware that is easy to acquire in the dark web. The author of the malware is selling it on his own website and on the Lolzteam site on the Dark Web, the researchers also found cracked versions on multiple community discussion and f

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to manage records during a corporate move – part 2

TAB OnRecord

In last week’s blog post we started to tackle the massive challenge of managing records during a corporate move. As we learned, there are some essential steps to take before the move begins. These include auditing the individual collections being moved, updating your records governance policies and reducing the volume of records being moved. With those measures in place, it’s time to consider how you'll manage records during and after the move.

article thumbnail

218M Words with Friends Players Compromised in Data Breach

Dark Reading

The same attacker was reportedly behind the Collection #1 and Collection #2 data dumps earlier this year.

article thumbnail

A new critical flaw in Exim exposes email servers to remote attacks

Security Affairs

Exim maintainers released an urgent security update to address a critical security flaw that could allow a remote attacker to potentially execute malicious code on targeted servers. Exim maintainers released an urgent security update, Exim version 4.92.3, to address a critical security vulnerability that could allow a remote attacker to crash or potentially execute malicious code on targeted email servers.

article thumbnail

There’s No One “Right” Version of an Emoji: A Conversation With Eric Goldman

Hanzo Learning Center

Eric Goldman, an Internet law professor, gives us an overview of emoji law, including the pros—more precise and nuanced communication—and the cons—more ambiguity and room for misinterpretation.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What you need to know about iPadOS

Jamf

While some are very familiar with Apple already, all are diving into iPadOS management for the first time. Read this asset and see how you can take full advantage of these powerful new capabilities and intuitive features.

67
article thumbnail

Microsoft will add new file types to the list of blocked ones in Outlook on the Web

Security Affairs

Microsoft announced last week it is going to expand the list of file extensions that are blocked in Outlook on the web. Microsoft announced that it will immediately block other file extensions for its Outlook web users, it will impossible for them to download this type of attachments. Microsoft pointed out that the newly blocked file types are rarely used, this means that most organizations will face no problems with the change.

article thumbnail

What you need to know about iPadOS

Jamf

While some are very familiar with Apple already, all are diving into iPadOS management for the first time. Read this asset and see how you can take full advantage of these powerful new capabilities and intuitive features.

67
article thumbnail

Getting Certified in Records Management

The Texas Record

During the course of consulting, we analysts are sometimes asked if TSLAC has a certification program for records management. The answer is that we don’t – we provide training through classes, workshops, and webinars for which you are given a certificate of completion, but we do not offer something that would be recognized as a professional certification in the field.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

8 Microsegmentation Pitfalls to Avoid

Dark Reading

Don't fall victim to these common mistakes on the path to developing better security boundaries and limiting the blast radius of security incidents.

article thumbnail

New Bug Found in NSA’s Ghidra Tool

Threatpost

Flaw in National Security Agency's Ghidra reverse-engineering tools allows hackers to execute code in vulnerable systems.

article thumbnail

Getting the most from OpenText EnCase

OpenText Information Management

Whatever your information security, forensics or eDiscovery challenges, having access to the right technology and experts is critical to getting the job done right. But sometimes it can be difficult to know where to start. Luckily, OpenText™ EnCase Consulting Services can help guide you to the next level with targeted services to meet your needs … The post Getting the most from OpenText EnCase appeared first on OpenText Blogs.

article thumbnail

Critical Exim Flaw Opens Servers to Remote Code Execution

Threatpost

A fix has been issued for a critical Exim flaw that could lead to servers crashing or remote code execution attacks being launched.

70
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Db2 12 for z/OS - Let's Talk About MAXDBAT in ZPARM

Robert's Db2

"ZPARMs" is a reference to the parameters in the Db2 for z/OS module called DSNZPARM - these are essentially the configuration parameters for a Db2 subsystem. Two of the ZPARMs that are closely related to each other are CONDBAT and MAXDBAT. CONDBAT specifies the maximum number of connections that network-attached applications (i.e., applications that access the Db2 system via the Db2 distributed data facility, aka DDF) can have with the Db2 system at any one time.

Access 48
article thumbnail

Senate Passes Bill Aimed At Combating Ransomware Attacks

Threatpost

New legislation has been approved by the U.S. senate aimed at protecting local cities and schools from ransomware attacks.

article thumbnail

NHS body criticised over Experian patient checks scheme

The Guardian Data Protection

NHS Improvement did not check rules before promoting pilot scheme to hospital trusts A NHS body urged hospitals to work with the credit reference agency Experian to check whether patients could receive free treatment, in an effort to tackle health tourism. Documents seen by the Health Service Journal (HSJ) and PA Media show NHS Improvement admitting it had not carried out its own assessment of whether the move would break data protection rules.

IT 50