Mon.Feb 17, 2020

article thumbnail

Pay Up, Or We’ll Make Google Ban Your Ads

Krebs on Security

A new email-based extortion scheme apparently is making the rounds, targeting Web site owners serving banner ads through Google’s AdSense program. In this scam, the fraudsters demand bitcoin in exchange for a promise not to flood the publisher’s ads with so much bot and junk traffic that Google’s automated anti-fraud systems suspend the user’s AdSense account for suspicious traffic.

article thumbnail

Google Removes 500 Chrome Extensions Tied to Malvertising

Data Breach Today

Researchers Say Attackers Stole Browser Data and Redirected Users to Malicious Sites Google has removed 500 Chrome extensions from its online store after researchers found that attackers were using them to steal browser data, according to a new report from security firm Duo Security. The thefts were part of a malvertising campaign that had been active for at least a year, the researchers say.

Security 315
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Flaw in WordPress ThemeGrill Demo Importer WordPress theme plugin expose 200K+ sites to hack

Security Affairs

A serious flaw in the ThemeGrill Demo Importer WordPress theme plugin with over 200,000 active installs can be exploited to wipe sites and gain admin access to the site. Experts from the security firm WebARX have discovered a serious flaw in the WordPress theme plugin ThemeGrill Demo Importer with over 200,000 active installs. The vulnerability could be exploited to wipe sites running the vulnerable versions of the plugin and gain admin access to the site.

GDPR 115
article thumbnail

Cybersecurity Plan for 2020 US Election Unveiled

Data Breach Today

CISA Describes Its Role as Security Facilitator The U.S. Cybersecurity Infrastructure and Security Agency has released its cybersecurity plan for the run-up to the 2020 presidential election, outlining the agency's role as a facilitator that will assist federal, state and local agencies in protecting critical election infrastructure.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Voatz Internet Voting App Is Insecure

Schneier on Security

This paper describes the flaws in the Voatz Internet voting app: " The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections.". Abstract: In the 2018 midterm elections, West Virginia became the first state in the U.S. to allow select voters to cast their ballot on a mobile phone via a proprietary app called "Voatz.

More Trending

article thumbnail

How in-line address data quality delivers business ready data for AI initiatives

IBM Big Data Hub

Imagine opening your mailbox and seeing a letter addressed to “current resident,” or having your financial institution’s AI powered digital assistant inform you that your replacement card is on its way to your old address.

IT 93
article thumbnail

IBM Exits RSA Conference 2020 Over Coronavirus Worries

Data Breach Today

Covid-19 Outbreak: 8 RSA Sponsors Withdraw; Some Attendees Have Already Canceled With IBM and seven other sponsors withdrawing from next week's RSA Conference 2020 - as worries over the China-centered outbreak of the coronavirus continue - and some attendees already canceling, will others follow suit?

162
162
article thumbnail

Cyberwarfare: A deep dive into the latest Gamaredon Espionage Campaign

Security Affairs

Security experts from Yoroy-Cybaze ZLab have conducted a detailed analysis of an implant used by the Gamaredon APT group in a recent campaign. Introduction. Gamaredon Group is a Cyber Espionage persistent operation attributed to Russians FSB ( Federal Security Service ) in a long-term military and geo-political confrontation against the Ukrainian government and more in general against the Ukrainian military power. .

article thumbnail

The case for a public cloud database in a hybrid, multicloud world

IBM Big Data Hub

In the years leading to 2020, public cloud databases were commonly seen as “dev/test” environments for applications living on-premises. And while this use case is important and should continue to be implemented across IT functions, businesses must expand more workloads into cloud to realize monetary and operational benefits. However, a common question permeating every public cloud discussion has held some businesses back: “How secure is public cloud?

Cloud 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FC Barcelona and the International Olympic Committee Twitter accounts hacked

Security Affairs

The popular hacker group OurMine has hacked the official Twitter account of the FC Barcelona, along with the accounts of Olympics and the International Olympic Committee (IOC). The popular hacker group has hacked the official Twitter account of the FC Barcelona, along with the accounts of and the International Olympic Committee (IOC). On Saturday, the popular hacker collective Ourmine has hijacked the official Twitter accounts of FC Barcelona, the Olympics and the International Olympic Committee

article thumbnail

Special Master Declines to Order Defendant to Use TAR, Rules on Other Search Protocol Disputes: eDiscovery Case Law

eDiscovery Daily

In the case In re Mercedes-Benz Emissions Litig., No. 2:16-cv-881 (KM) (ESK) (D.N.J. Jan. 9, 2020) , Special Master Dennis Cavanaugh (U.S.D.J., Ret.) issued an order and opinion stating that he would not compel defendants to use technology assisted review (TAR), and instead adopted the search term protocol negotiated by the parties, with three areas of dispute resolved by his ruling.

article thumbnail

Russian govn blocked Tutanota service in Russia to stop encrypted communication

Security Affairs

Tutanota , the popular free and open-source end-to-end encrypted email software, has been blocked by Russian authorities. The popular free and open-source end-to-end encrypted email service Tutanota has been blocked in Russia on Friday evening. Since early February, the Russian government has blocked other encrypted email and VPN services in Russia, including ProtonMail and ProtonVPN VPN service.

article thumbnail

The New Privacy Regulation That’s Sink-or-Swim for Small Business

Adam Levin

The California Consumer Privacy Act ( CCPA ) became law on January 1, 2020, and as was the case on the effective date of the General Data Protection Regulation (GDPR), the European Union’s similarly sweeping privacy legislation, it is being met with a general panic. How dare that deadline actually pass without our data practices magically being up to snuff?

Privacy 55
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Launching the First “Yomi Hunting” Challenge!

Security Affairs

About a year ago, Yoroi released the Yomi Hunter sandbox, today, they love to challenge the malware community with the first “Yomi Hunting” contest. About a year ago, we publicly released the Yomi Hunter sandbox for a few simple reasons: in Yoroi we believe in the InfoSec community value, we think it plays a central role in the fight of cyber-threats and we feel the need to support it. .

article thumbnail

The IAPP announces updated CIPT textbook

IG Guru

Interested in becoming a Certified Information Privacy Technologist? Check out the new Introduction to Information Privacy for Technologists resource introduced by the IAPP. The post The IAPP announces updated CIPT textbook appeared first on IG GURU.

Privacy 52
article thumbnail

How to Improve Customer Experience Using Web Data

Import.IO

Customer experience (or CX) is the overall perception that a consumer has when interacting with your product, service, or brand. Many companies believe that definitive experiences are created internally, then passed on to the end consumer and not changed after that. While the customer experience certainly begins within the business, The post How to Improve Customer Experience Using Web Data appeared first on Import.io.

article thumbnail

Understanding the future - a new literacy

CILIP

Understanding the future - a new literacy. Understanding the future - a new literacy. Are you on social media? Do you scroll as much as I do? Do you retweet, share.overshare? Are you scripturient? Good word, isn?t it? It means ?possessed of a violent desire to write.? I learned it last year, from Richard Seymour?s book The Twittering Machine , and I?

Risk 52
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Webinar Invitation — CCPA Modified Draft Regulations Update (Key Changes)

HL Chronicle of Data Protection

Melissa Bianchi. Mark Brennan. Bret Cohen. Scott Loughlin. Tim Tobin. The California Attorney General (CA AG) has released a notice of changes to the California Consumer Privacy Act (CCPA) draft regulations , making substantial changes to the earlier draft regulations published in 2019 (covered in a prior webinar by Hogan Lovells, here ). The CA AG will accept public comments on the modified draft regulations until Monday, February 25, 2020.

Privacy 59
article thumbnail

NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

The Last Watchdog

When it comes to defending their networks, most companies have had it drilled into them, by now, that it’s essential to erect layered defenses. Related :Promise vs. pitfalls of IoT For small- and mid-sized businesses, firewalls, antivirus suites and access management systems represent the entry stakes for participating in today’s digital economy. Security-mature SMBs go the next step and embrace incidence response and disaster recovery planning, as well Meanwhile, large enterprises pour tens of

article thumbnail

RSAC 2020: Trust in the Cloud. What Should You Do with Your Encryption Keys?

Thales Cloud Protection & Licensing

In the past decade, businesses started evaluating the pros and cons of moving to the cloud in order to meet the increased demand for the cost and IT efficiency benefits of cloud computing and Software as a Service (SaaS). Many businesses subsequently adopted a Platform as a Service (PaaS), Infrastructure as a Service (IaaS) or SaaS model, thus positioning the cloud as the foundation for digital transformation.

article thumbnail

Turning over new leaves: Can outdoor spaces help libraries grow?

CILIP

Turning over new leaves: Can outdoor spaces help libraries grow? Turning over new leaves: Can outdoor spaces help libraries grow? ?IF you have a garden and a library, you have everything you need,? observed Cicero in a letter dating from 46 B.C. In fact, some translations suggest an even more emphatic quotation: ?If you have a garden in your library, everything will be complete!?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

IDF soldiers tricked into installing malicious apps by Hamas operatives posing as attractive women

Security Affairs

Israeli Force (IDF) announced it has thwarted an attempt by the Hamas militant group to hack soldiers’ phones by posing as attractive women on social media. Israeli Defence Force (IDF) announced it has thwarted an attempt by the Hamas militant group to hack soldiers’ mobile devices by posing as attractive women on social media and instant messaging apps ( i.e.