Mon.Aug 13, 2018

article thumbnail

Tracking Cybersecurity Threats in Manufacturing

Data Breach Today

With the rise of the industrial internet of things comes a far broader attack surface in the manufacturing sector. Chris Morales of Vectra outlines findings of a new report on cyberattack trends in the manufacturing sector.

article thumbnail

Shorten your path to AI with Watson Knowledge Catalog

IBM Big Data Hub

Data can be an organization’s most valued asset, providing insights that help strengthen business. Knowing what works and what does not can help you invest more resources in what would work in the future. Learn more about the Watson Knowledge Catalog.

80
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are Legacy Medical Device Security Flaws Going Unfixed?

Data Breach Today

Many medical device makers appear to building better cybersecurity into their products, but some manufacturers are still avoiding fixing vulnerabilities in legacy devices that pose potential safety risks, says security researcher Billy Rios, who discusses the latest flaws in some Medtronic cardiac devices.

article thumbnail

How to Stop Google From Tracking Your Location

WIRED Threat Level

A new report shows that Google still tracks your location even if you thought you opted out.

Security 106
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

D-Link Routers In Brazil Fall To DNS Tampering

Data Breach Today

Remotely Exploitable Software Vulnerabilities To Blame For Hijacking Cybercriminals in Brazil have capitalized on older vulnerabilities in D-Link routers for financially motivated phishing attacks. The attackers changed DNS settings to use their own malicious DNS server, allowing for seamless shifts to phishing sites.

Phishing 113

More Trending

article thumbnail

Why we love distance learning (and you should too!)

IT Governance

Distance learning puts the learning power back in your hands, which is why we love it! Gone are the days when you needed to spend hours in a classroom, going over a subject at someone else’s pace and trying to fit it in around your work and life commitments. We all learn differently, and classroom-based teaching works for some people, but not for all.

article thumbnail

What’s Next in Engineering Technology?

Synergis Software

For nearly four years, I have been a guest writer here on the Synergis blog, commenting on the state of engineering document management and highlighting innovative uses of Adept. While I will still be doing that until I wear out my welcome, over the next few months I will also occasionally comment on engineering technology trends. Not just EDMS/PDM issues, but all the digital tools engineers need, and the products they will make with new technologies.

Cloud 63
article thumbnail

MPs concerned about the UK’s cyber security

IT Governance

MPs across all parties have serious fears about the UK’s cyber security defences, according to a YouGov survey. Among 100 surveyed MPs, 62 believe there is a serious risk of critical national infrastructure being compromised. This includes the possibility of the UK’s nuclear capabilities being hacked, as well as the comparably less disastrous (but still severe) threat to transport links, energy and water suppliers, hospitals and digital services.

article thumbnail

Hacked Water Heaters Could Trigger Mass Blackouts Someday

WIRED Threat Level

A new study found that just 42,000 of those hacked home devices could be enough to leave a country of 38 million people in the dark.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Faxploit – Critical flaws potentially exposes millions of HP OfficeJet Printers to hack

Security Affairs

A vulnerability in HP OfficeJet all-in-one inkjet printer can be exploited by attackers to gain control of the printer and use it as entry point into the network environment. A critical vulnerability potentially exposes millions of HP OfficeJet printers to hack, according to the experts at Check Point the attackers only need to send a fax to the vulnerable printers.

article thumbnail

When did you last perform a risk assessment?

IT Governance

With the volume of data breaches increasing, it’s important not to get complacent and think that it’s not going to happen to you. According to new government statistics , 43% of UK organisations suffered a breach or attack in the past 12 months. The risks your organisation faces are constantly evolving, so they need to be regularly assessed and addressed to prevent them from becoming a threat.

Risk 53
article thumbnail

Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!

Security Affairs

Last week Oracle disclosed a critical vulnerability in its Oracle Database product, the issue tracked as CVE-2018-3110 has received a CVSS score of 9.9, On Friday, Oracle released security patches to address a critical vulnerability affecting its Database product, the company is urging install them as soon as possible. The vulnerability resides in the Java VM component of Oracle Database Server, a remote authenticated attacker can exploit it take complete control of the product and establish a s

IT 63
article thumbnail

Medtronic Devices Fatal Flaw? Hackers Demonstrate New Attacks

Adam Levin

Security researchers at the recent Black Hat and Def Con security conferences in Las Vegas have placed malware on pacemakers as a proof-of-concept hack to highlight the potential for security vulnerabilities in IoT-enabled medical devices. Another separate demonstration revealed that patients’ vital signs could be falsified in real time. The malware attack on IoT medical devices made it possible for a hacker to deliver shocks to a target’s heart via an unencrypted connection, and as such represe

IoT 49
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ICS-CERT warns of critical flaws in NetComm industrial routers

Security Affairs

Security researcher has found two critical vulnerabilities in the industrial routers manufactured by the Australian company NetComm Wireless. Security researcher Aditya K. Sood has found two critical vulnerabilities in the industrial routers manufactured by the Australian company NetComm Wireless that can be exploited remotely to take control of affected devices.

article thumbnail

Introducing the Jamf Certificate SDK

Jamf

Read how the Jamf Certificate SDK makes it extremely easy for iOS app developers to request certificates from Jamf Pro.

IT 60
article thumbnail

Black Hat 2018: IoT Security Issues Will Lead to Legal ‘Feeding Frenzy’

Threatpost

A "wave of litigation over IoT liability is on the horizon," according to an attorney who has represented plaintiffs in the 2015 Jeep hack.

IoT 54
article thumbnail

Connected partners are the secret to success in the digital supply chain

OpenText Information Management

The digital supply chain can transform your business and your ability to meet your customer’s needs. Driven by digital technologies, it brings numerous benefits to both demand and supply management. To create successful digital supply chains you need to be able to connect with your suppliers, customers and partners. So, why does trading partner enablement … The post Connected partners are the secret to success in the digital supply chain appeared first on OpenText Blogs.

IT 45
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Can analytics help keep students from dropping out of school?

IBM Big Data Hub

IBM Analytics technology can help schools make the most of this raw data by gathering it, analyzing it and visualizing it in a way that is useful for educators.

article thumbnail

Black Hat Video Exclusive: Mobile APTs Redefining Phishing Attacks

Threatpost

Mike Murray, vice president of security intelligence at Lookout, discusses how mobile is redefining phishing, taking it out of the traditional inbox and into SMS and Facebook messages.

article thumbnail

Hacker Unlocks 'God Mode' and Shares the 'Key'

Dark Reading

A researcher proves that it's possible to break the most fundamental security on some CPUs.

article thumbnail

Identifying Programmers by their Coding Style

Schneier on Security

Fascinating research de-anonymizing code -- from either source code or compiled code: Rachel Greenstadt, an associate professor of computer science at Drexel University, and Aylin Caliskan, Greenstadt's former PhD student and now an assistant professor at George Washington University, have found that code, like other forms of stylistic expression, are not anonymous.

Privacy 43
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Data Security Landscape Is Shifting: Is Your Company Prepared?

Dark Reading

New ways to steal your data (and profits) keep cropping up. These best practices can help keep your organization safer.

article thumbnail

Threat Modeling in 2018: Attacks, Impacts and Other Updates

Adam Shostack

The slides from my Blackhat talk, “ Threat Modeling in 2018: Attacks, Impacts and Other Updates ” are now available either as a PDF or online viewer.

45
article thumbnail

DEF CON 2018: Voting Hacks Prompt Push Back from Election Officials, Vendors

Threatpost

The Vote Hacking Village invited attendees – including kids as young as six – to hack the voting infrastructure, including ballot machines, a voter database and more.

article thumbnail

5 Ways Small Security Teams Can Defend Like Fortune 500 Companies

IG Guru

Keep your company protected with a mix of old- and new-school technologies. The post 5 Ways Small Security Teams Can Defend Like Fortune 500 Companies appeared first on IG GURU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Preservica and AVP partner on digital preservation

Preservica

Boston, MA, Oxford, UK – Aug 13 2018 – Digital preservation specialist, Preservica , is pleased to announce that, AVP , experts in maximizing the usability of data, has become a Preservica Service Partner , joining a growing network of partners providing services and solutions around Preservica’s market-leading active digital preservation and access platform.

article thumbnail

Aretha Franklin

Adam Shostack

I remember an interview I read with Ahmet Ertegün, the founder of Atlantic Records. He was talking about Aretha, and he said that one of his producers came in, saying that she wasn’t measuring up. He asked the producer what was up, and was told that they were trying to get her to sing like the other successful soul singers, and it wasn’t working out.

IT 40
article thumbnail

Vulnerability Disclosures in 2018 So Far Outpacing Previous Years'

Dark Reading

Nearly 17% of 10,644 vulnerabilities disclosed so far this year have been critical, according to new report from Risk Based Security.

Risk 45