Mon.Jul 01, 2019

article thumbnail

UpGuard: Unsecured Amazon S3 Buckets Exposed 1TB of Data

Data Breach Today

Cloud-Based Databases Belonged to IT Firm Attunity Several unsecured Amazon S3 buckets belonging to IT services firm Attunity left at least 1TB of data, including files from companies such as Netflix, TD Bank and Ford, exposed to the internet, UpGuard researchers disclosed. Although the databases have been secured, an investigation is continuing.

Cloud 244
article thumbnail

NEW TECH: A couple of tools that deserve wide use — to preserve the integrity of U.S. elections

The Last Watchdog

As the presidential debate season ramps up, the specter of nation-state sponsored hackers wreaking havoc, once more, with U.S. elections, looms all too large. It’s easy to get discouraged by developments such as Sen. McConnell recently blocking a bi-partisan bill to fund better election security , as well as the disclosure that his wife, Transportation Security Elaine Chao, has accepted money from voting machine lobbyists.

Phishing 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Italy Fines Facebook $1 Million Over Cambridge Analytica

Data Breach Today

Social Network Still Faces Reckoning With US Federal Trade Commission Italy's data protection regulator has slapped a $1 million fine on Facebook for mismanaging user data and precipitating the Cambridge Analytica debacle. But that pales against the fine that's reportedly still being weighed by the U.S. Federal Trade Commission.

183
183
article thumbnail

How County Clerks are Stepping into the Future with Improved Operations

AIIM

Guest Post: Joanne E. Novak from Konica Minolta Business Solutions. For the past 3 years, the Clerk of Common Pleas Court in Clark County, OH, Melissa Tuttle, has been utilizing a content management tool to automate her business workflows. Like many Counties, Melissa and her team deal with a lot of paperwork and file types. Utilizing a content management tool has helped them eliminate the time-consuming burden of pulling paper files manually and instead utilize automation so that Melissa and her

Paper 117
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Can Patient Data Be Truly 'De-Identified' for Research?

Data Breach Today

Lawsuit Against University of Chicago, Google, Raises Important Privacy Issues A lawsuit against the University of Chicago Medical Center and Google seeking class action status points to the important privacy and security issues raised when sharing patient data for research purposes - and whether data can be truly "de-identified.

Privacy 176

More Trending

article thumbnail

Sophos Proof-of-Concept Exploit Shows Dangers of BlueKeep

Data Breach Today

Security Firm Latest to Sound the Alarm About Windows Vulnerability Sophos is the latest security firm to create a proof-of-concept exploit for the BlueKeep vulnerability in older versions of Windows. The company echoed several government agencies that have urged businesses to patch their devices.

article thumbnail

Yubico Security Keys with a Crypto Flaw

Schneier on Security

Wow, is this an embarrassing bug : Yubico is recalling a line of security keys used by the U.S. government due to a firmware flaw. The company issued a security advisory today that warned of an issue in YubiKey FIPS Series devices with firmware versions 4.4.2 and 4.4.4 that reduced the randomness of the cryptographic keys it generates. The security keys are used by thousands of federal employees on a daily basis, letting them securely log-on to their devices by issuing one-time passwords.

article thumbnail

SCHREMS 2.0 – the demise of Standard Contractual Clauses and Privacy Shield?

DLA Piper Privacy Matters

On July 9th, Europe’s highest court – the Court of Justice of the European Union (CJEU) – is set to hear a case concerning the validity of two key data transfer mechanisms: Standard Contractual Clauses (SCCs) and Privacy Shield – mechanisms widely used by businesses within the European Economic Area (EEA) to legitimise the transfer of personal data to countries outside the EEA.

Privacy 94
article thumbnail

Welcoming the Austrian Government to Have I Been Pwned

Troy Hunt

Early last year, I announced that I was making HIBP data on government domains for the UK and Australia freely accessible to them via searches of their respective TLDs. The Spanish government followed a few months later with each getting unbridled access to search their own domains via an authenticated API. As I explained in that initial post, the rationale was to help the departments tasked with looking after the exposure of their digital assets by unifying search and monitoring capabilities so

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware Hits Georgia Court System

Dark Reading

The court's IT department is meeting with external agencies to determine the scope and severity of the cyberattack.

article thumbnail

Ransomware Hits Georgia Courts As Municipal Attacks Spread

WIRED Threat Level

Almost every month in 2019 so far has seen reports of a local government falling prey to ransomware, but this series of attacks belies an even broader threat.

article thumbnail

There's a Security Incident in the Cloud: Who's Responsible?

Dark Reading

It's a valid question, and one many enterprises remain unsure of amid a mass migration that has transformed business over the past few years.

Cloud 92
article thumbnail

Singapore Government will run its third bug bounty program

Security Affairs

Singapore has announced the third bug bounty program aimed at assessing the security of government systems exposed online. The government of Singapore has announced its third bug bounty program aimed at assessing the level of security implemented for government systems exposed online. The bug bounty program sees the involvement of the Cyber Security Agency of Singapore (CSA) and the Government Technology Agency of Singapore (GovTech).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

VPNs' Future: Less Reliant on Users, More Transparent, And Smarter

Dark Reading

Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the Internet of Things need protection.

Cloud 79
article thumbnail

Feature engineering in machine learning – An overview

OpenText Information Management

This blog is a first in a 3-part series that will give a glimpse into the feature engineering part of a data scientist’s daily work. When comparing machine learning to traditional software development, the main difference is that in traditional software development the developer decides which actions a software must take, under what conditions. Those … The post Feature engineering in machine learning – An overview appeared first on OpenText Blogs.

article thumbnail

DHS's Bob Kolasky Goes All in on Risk Management

Dark Reading

As director of the DHS's National Risk Management Center, measuring and managing risk for critical infrastructure across 16 industrial sectors, Kolasky stands at a busy crossroads.

Risk 76
article thumbnail

Facebook Removes Accounts Used to Infect Thousands With Malware

Threatpost

A widespread malware campaign, ongoing since 2014, was using Facebook accounts and posts to spread malware through URL links.

Access 93
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Japan’s government hacks citizens’ IoT devices

IT Governance

Earlier this year, the Japanese government launched a campaign in which it hacked into citizens’ IoT (Internet of Things) devices to see how secure the technology is. The plan was to compile a list of devices that use simple, default passwords and pass it on to authorities and relevant Internet service providers to help achieve better security. It’s a noble cause – anyone who wants to address information security should be commended – but the plan seems excessive and perhaps even dangerous.

IoT 76
article thumbnail

Thousands of Facebook Users Hit in Malware Distribution Campaign

Dark Reading

'Operation Tripoli' is another reminder why users cannot trust every link they see on social media sites.

99
article thumbnail

New variant of Dridex banking Trojan implements polymorphism

Security Affairs

Security researchers at eSentire tracked a new campaign spreading a variant of the Dridex banking Trojan that shows polymorphism. Security experts at eSentire observed a new campaign spreading a variant of the Dridex banking Trojan that implements polymorphism. The Dridex banking Trojan that has been around since 2014, it was involved in numerous campaigns against financial institutions over the years and crooks have continuously improved it.

article thumbnail

Thousands of Facebook Users Hit in Malware Distribution Campaign

Dark Reading

'Operation Tripoli' is another reminder why users cannot trust every link they see on social media sites.

99
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The customer experience trends most likely to shape the industry in 2020

DXC Technology

We know business today is changing faster than ever. A few years ago customers made purchase choices based on the flyers they found in their mailboxes. They also felt more loyalty towards brands, partly because it was both difficult and time consuming to switch from one to another. Those days are over. Today’s ‘intelligent’ customers […].

article thumbnail

The Case for Software-Defined Secondary Storage

Quest Software

Trying to decide on the best technologies to boost your backup and recovery strategy but reluctant to invest in yet another expensive system? Secondary storage systems are flooding the market these days since most can store 10 or 20 times the capacit.( read more ).

article thumbnail

Consumer Data, Upcoming Elections Are at Risk, Black Hat Survey Says

Dark Reading

Newly published '2019 Black Hat USA Attendee Survey' recommends users stay off social media and remain wary of products that promise to solve security problems.

Risk 73
article thumbnail

Cyber Defense Magazine – July 2019 has arrived. Enjoy it!

Security Affairs

Cyber Defense Magazine July 2019 Edition has arrived. We hope you enjoy this month’s edition…packed with over 168 pages of excellent content. Cyber Defense Magazine July 2019 Edition has arrived. Tips, tricks, ideas, secrets and insider information on the best practices in cybersecurity. Please read it and share it with your friends. With much appreciation to our sponsors. 168 pages packed with excellent content.

IT 65
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Ransomware Hits Georgia Court System

Dark Reading

The court's IT department is meeting with external agencies to determine the scope and severity of the cyberattack.

article thumbnail

City Council of Somerville bans facial recognition technology

Security Affairs

City Council of Somerville, a Boston suburb, has voted to ban the use of facial recognition system by police and other city offices. The City Council of Somerville, Massachusetts, a Boston suburb, has decided to ban the use of facial recognition system by police and other city departments. Last week, the Somerville City Council expressed a unanimous vote (11-0) to prohibit the use of facial recognition technology.

Privacy 65
article thumbnail

Attunity Data Leak Exposes Sensitive Files at Ford, TD Bank

Dark Reading

Three unsecured Amazon S3 storage buckets compromised more than 1TB of data belonging to Attunity and its high-profile clients.

IT 82