Mon.Jun 15, 2020

article thumbnail

Delivery Hero Confirms Foodora Data Breach

Data Breach Today

Personal Details on 727,000 Accounts in 14 Countries Leaked Delivery Hero, the online food delivery service, has confirmed a data breach of its Foodora brand. Breached information includes personal details for 727,000 accounts - names, addresses, phone numbers, precise location data and hashed passwords - in 14 countries.

article thumbnail

Norway suspends virus-tracing app due to privacy concerns

The Guardian Data Protection

Smittestopp had limited effect because of the small number of users, says data agency Coronavirus – latest updates See all our coronavirus coverage Norway’s health authorities said they suspended an app designed to help trace the spread of coronavirus after the country’s data protection agency said it was too invasive of privacy. Launched in April, the smartphone app Smittestopp (“infection stop”) was set up to collect movement data to help authorities trace the spread of Covid-19, and inform us

Privacy 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Claire's: Magecart E-Commerce Hackers Stole Card Data

Data Breach Today

Magecart Gangs Targeting Larger Organizations During Lockdown, Researcher Warns Jewelry retailer Claire's says Magecart attackers hits its e-commerce store, hosted on Salesforce Commerce Cloud, and stole an unspecified number of customers' payment card details. Security firm Sansec, which discovered the breach, says Magecart attacks have grown more targeted during lockdown.

Retail 302
article thumbnail

Flaws in mobile Internet protocol GTP allow hackers to target 5G users

Security Affairs

Security vulnerabilities in modern communication protocol GTP used by mobile network operators can be exploited by attackers to target 4G/5G users. Researchers at cybersecurity firm Positive Technologies Security have discovered several vulnerabilities in communication protocol GPRS Tunnelling Protocol ( GTP ), that is used by mobile network operators (MNOs).

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Italian Security Firm Allegedly Pushed Malware: Report

Data Breach Today

Check Point Research Claims Firm Sold CloudEyE Dropper Trojan An Italian cybersecurity company allegedly was a front for a criminal gang selling access to a dropper Trojan known as CloudEyE, according to analysts at the security firm Check Point Research.

Security 285

More Trending

article thumbnail

After Guilty Plea, DDoS Attacker Gets 5-Year Prison Term

Data Breach Today

Prosecutors Say Andrew Rakhshan Was Responsible for Series of Attacks A federal judge has sentenced an Iranian-born, U.S. naturalized citizen to five years in prison for one in a series of DDoS attacks.

255
255
article thumbnail

Accessories giant Claire’s is the victim of a Magecart attack, credit card data exposed

Security Affairs

Hackers breached the websites of the U.S. accessory giant Claire’s, and its subsidiary Icing, and gained access to customer’s credit card data. Threat actors have hacked the websites of the U.S. based jewelry and accessory giant Claire’s, and its subsidiary Icing, the security breach took place in April and attackers may have gained access to customer’s credit cards.

Retail 106
article thumbnail

A Tale of 2 Health Data Breaches: Persistent Challenges

Data Breach Today

Protecting Legacy Systems, Email Proves Difficult for Many Two recently reported health data breaches illustrate persistent security challenges - defending against ransomware attacks as well as unauthorized access to email - that sometimes can expose years' worth of data.

article thumbnail

Ex-Ebay Execs Allegedly Made Life Hell for Critics

WIRED Threat Level

Surveillance. Harassment. A live cockroach delivery. US Attorneys have charged six former Ebay workers in association with an outrageous cyberstalking campaign.

Security 106
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

COVID-19: 'Are We Done Yet?'

Data Breach Today

Pandemic Expert Regina Phelps Explains Why the First Wave Has Yet to End Temperatures (and tempers) are rising, and nations and states alike are starting to relax their COVID-19 restrictions. But pandemic expert Regina Phelps says it's too early to be celebrating victory and reopening offices because the first wave of the virus has yet to end.

IT 179
article thumbnail

Conditional Access – Deployment Best Practices

Daymark

Conditional Access in Azure AD provides a level of security required to maintain appropriate controls over who can access confidential and privileged information. It was the topic of discussion at our most recent “ Ask the Engineer Q&A Roundtable ” where attendees learned tips for a successful Conditional Access deployment and got answers to their specific questions.

Access 96
article thumbnail

OnDemand Webinar | 4 Challenges of the Modern Endpoint Network: Beyond (traditional) Corporate Boundaries

Data Breach Today

Managing Endpoint Complexity: A Discussion on Cyber Visibility, Resilience & Accountability Register and attend this webinar to learn how security teams are structuring their integrated endpoint and server workload security monitoring program.

Security 147
article thumbnail

Jamf releases enhancements to Jamf Parent app, mobile restrictions and more

Jamf

In Jamf Pro 10.22, we are excited to deliver new enhancements for Jamf Pro, including updates to the Jamf Parent app, Apple School Manager support, mobile restrictions updates and more.

95
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Intel Adds Anti-Malware Protection in Tiger Lake CPUs

Threatpost

Intel's Tiger Lake CPUs will come with Control-flow Enforcement Technology (CET), aimed at battling common control-flow hijacking attacks.

article thumbnail

Standard Bank Group is preparing to embrace Africa’s AI opportunity

IBM Big Data Hub

Africa is no stranger to the challenges of infectious diseases. Since 2015, hawse have addressed the likes of Bubonic Plague, Dengue Fever, Ebola, Measles, Middle East Respiratory Syndrome (MERS), Yellow Fever, and Zika Virus—at the cost of hundreds of thousands of lives across the continent. As COVID-19 bears down on the globe, Africa again braces herself for the human and economic challenges ahead.

84
article thumbnail

Twitter Disrupts Wide-Ranging Political Disinformation Campaigns

Threatpost

This removal, of 32K accounts, is not the first time Twitter has taken action to protect its users from influence operations. Researchers weighed in on the practice with Threatpost.

IT 80
article thumbnail

Yes, You will Have to Hustle

PerezBox

I continue to see the rise in the “anti-hustle” movement in tech startup. While it is one perspective, I don’t think it’s an absolute for all. Honestly, I think it. Read More. The post Yes, You will Have to Hustle appeared first on PerezBox.

IT 80
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Turn AI talent gaps into opportunities at the Data and AI Virtual Forum

IBM Big Data Hub

Keeping up with modern business. Business analysts today are expected to deliver insights and decisions on demand. Yet with continually increasing data complexity and volume, business analysts find it more and more challenging to produce accurate results in a timely fashion.

IT 82
article thumbnail

Now-Former eBay Security Team Members Charged in Bizarre Cyberstalking Campaign

Dark Reading

A bloody pig mask, doxing threats, and a foiled surveillance attempt were among the actions six ex-eBay employees took against an editor and publisher of a newsletter.

article thumbnail

The role of neurodiversity in the workplace

Micro Focus

At the start of June Micro Focus launched its INSPIRE 20 Podcast series with an interview from Adriana Gascoigne, founder and CEO of Girls in Tech, a not for profit, talking about how she’s helping women acquire the skills and learn about careers in tech so that we can help bring more balance to the. View Article.

IT 76
article thumbnail

Security and governance payback with Cloud Pak for Data

IBM Big Data Hub

In today’s digital world, there is a guiding principle when it comes to enterprise information management – data privacy. Every regulation builds around it and CIOs consider it a common-sense business practice that is built into the fiber of their IT systems. Let’s think about the daunting challenges posed by the need for data privacy and why businesses go to such lengths to adopt it.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Claire’s Customers Targeted with Magecart Payment-Card Skimmer

Threatpost

The Magecart group targeted the tween accessories specialist starting the day after it shuttered its retail locations due to coronavirus.

Retail 88
article thumbnail

From ‘ghost chasing’ to intelligent operations for energy companies

OpenText Information Management

Like every industry, the energy sectors are undertaking digital transformation. But despite years of pursuing operational excellence, many energy companies are still struggling to create an integrated and optimized environment within operations. Premier Oil has quoted research showing that 86% of all maintenance is either reactive or unnecessary. The study found that almost one in … The post From ‘ghost chasing’ to intelligent operations for energy companies appeared first on OpenText Blog

article thumbnail

Who’s Balancing Privacy Against Public Health and Everything Else?

Data Matters

*Article first appeared in The Hill on June 13, 2020. Concerns over the use of location tracking and contact tracing of infected individuals to help mitigate the spread of COVID-19 have once again placed “privacy” at the forefront of public attention. And even though Congress declared privacy to be a fundamental right in 1974 , it established no cabinet office or institutional framework to focus on the role of data protection and digital technology in our society.

Privacy 68
article thumbnail

Examining the US Cyber Budget

Schneier on Security

Jason Healey takes a detailed look at the US federal cybersecurity budget and reaches an important conclusion: the US keeps saying that we need to prioritize defense, but in fact we prioritize attack. To its credit, this budget does reveal an overall growth in cybersecurity funding of about 5 percent above the fiscal 2019 estimate. However, federal cybersecurity spending on civilian departments like the departments of Homeland Security, State, Treasury and Justice is overshadowed by that going t

Military 103
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

WFH Alert: Critical Bug Found in Old D-Link Router Models

Threatpost

Researchers find six bugs in consumer D-Link DIR-865L Wireless AC 1750 Dual Band Cloud Router.

Cloud 101
article thumbnail

2020.2 Release Empowers Enterprises to be more Responsive and Productive

Reltio

If anything current challenges have made businesses realize, it is the importance of a responsive business strategy and the ability to pivot to maintain business continuity. Yes, we have heard this before, but never quite realized the importance till recently, with no choice but to adapt. Responsive customer-centric businesses strive to understand their customers, adapt quickly to the changing customer needs, regulations, or macroeconomic business conditions.

article thumbnail

WFH Alert: Critical Bug Found in Old D-Link Router Models

Threatpost

Researchers find six bugs in consumer D-Link DIR-865L Wireless AC 1750 Dual Band Cloud Router.

Cloud 94