Fri.Feb 14, 2020

article thumbnail

Facebook Delays EU Dating Service Rollout After 'Dawn Raid'

Data Breach Today

Irish Data Protection Authority Questions Impact of New Service Any lonely hearts in Europe hoping to meet the person of their dreams via Facebook's dating service on Valentine's Day this year will have to wait a little longer. The social network has delayed the EU rollout of its dating service, following a Monday "dawn raid" by Irish privacy investigators.

Privacy 296
article thumbnail

A Light at the End of Liberty Reserve’s Demise?

Krebs on Security

In May 2013, the U.S. Justice Department seized Liberty Reserve , alleging the virtual currency service acted as a $6 billion financial hub for the cybercrime world. Prompted by assurances that the government would one day afford Liberty Reserve users a chance to reclaim any funds seized as part of the takedown, KrebsOnSecurity filed a claim shortly thereafter to see if and when this process might take place.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MIT Researchers: Online Voting App Has Security Flaws

Data Breach Today

Voatz Smartphone App Used in 2018 Vulnerable to Hacking, Report Alleges MIT security researchers have published a paper that describes several security flaws in Voatz, a smartphone app used for limited online voting during the 2018 midterm elections. But the maker of the app contends the research is flawed.

Security 254
article thumbnail

Signal Is Finally Bringing Its Secure Messaging to the Masses

WIRED Threat Level

The encryption app is putting a $50 million infusion from WhatsApp cofounder Brian Acton to good use, building out features to help it go mainstream.

IT 145
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Analysis: Indictments in Equifax Hack

Data Breach Today

The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection with the 2017 Equifax data breach. Also featured: Advice on implementing NIST's new privacy framework; lessons learned in a breach disclosure.

Military 226

More Trending

article thumbnail

US Charges Huawei With Stealing Trade Secrets

Data Breach Today

Prosecutors Allege Criminal Conspiracy to Obtain Intellectual Property The U.S. Justice Department has filed new charges against Huawei and several of its subsidiaries, plus its CFO, accusing them of engaging in a conspiracy to steal trade secrets from American companies.

IT 205
article thumbnail

US Govt agencies detail North Korea-linked HIDDEN COBRA malware

Security Affairs

The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) released reports on North Korea-linked HIDDEN COBRA malware. The FBI, the US Cyber Command, and the Department of Homeland Security have published technical details of a new North-Korea linked hacking operation. The government experts released new and updated Malware Analysis Reports (MARs) related to new malware families involved in new attacks carried out by North Korea-linked HIDDEN COBRA gro

Passwords 117
article thumbnail

GDPR Compliance: Should CISO Serve as DPO?

Data Breach Today

Sorting Out the Role of the Data Protection Officer As organizations settle into the third year of enforcement of the EU's General Data Protection Regulation, some are struggling to define and understand the role of a data protection officer as required under the regulation - including whether the CISO should take on the extra role of DPO.

article thumbnail

Hackers Can Seize Control of Ballots Cast Using the Voatz Voting App, Researchers Say

Threatpost

Flaws in the blockchain app some states plan to use in the 2020 election allow bad actors to alter or cancel someone’s vote or expose their private info.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

RSA Conference 2020: ISMG Spotlights Security Leaders

Data Breach Today

Over 200 Video Interviews With Experts Planned Information Security Media Group, a premier media partner at the annual RSA Conference, will conduct over 200 video interviews at this year's event with cybersecurity thought leaders, executives, CISOs and sponsors.

Security 191
article thumbnail

PoS malware infected systems at 71 locations operated by US store chain Rutter’s

Security Affairs

US store chain Rutter disclosed a security breach, 71 locations were infected with a point-of-sale (POS) malware used to steal customers’ credit card information. The Rutter’s , a U.S. convenience store, fast food restaurant, and gas station chain owner, has disclosed a security breach. The company confirmed that attackers gained access to its stores’ network system and infected payment systems at 71 locations with a point-of-sale (POS) malware.

Sales 107
article thumbnail

Watchdog Agency: Improper Use of Medicare Data Rampant

Data Breach Today

HHS OIG Plans to Expand Investigation Nationwide A federal watchdog agency next week will announce the expansion nationwide of an investigation into inappropriate access and use of Medicare beneficiaries' sensitive information for potential fraud and other unscrupulous activities.

Access 165
article thumbnail

Nedbank client data compromised in security breach at third-party provider

Security Affairs

Nedbank bank announced on Thursday that a security breach at a third-party supplier has compromised the details of as many as 1.7 million of its clients. Nedbank bank disclosed on Thursday a security breach at a third-party supplier that has compromised the details of as many as 1.7 million of its clients. The bank revealed that the service provider Computer Facilities, which is a direct marketing company that issues SMS and e-mail marketing information on behalf of Nedbank and other companies,

Security 107
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Senator Calls for Creation of Federal Online Privacy Agency

Data Breach Today

Kirsten Gillibrand's Proposal Would Take Responsibility Away From FTC U.S. Sen. Kirsten Gillibrand, D-N.Y., is proposing the creation of a new federal agency dedicated to protecting online privacy, taking that task away from the Federal Trade Commission.

Privacy 165
article thumbnail

Met removes hundreds from gangs matrix after breaking data laws

The Guardian Data Protection

How list is compiled also to be reviewed amid claims it blights life chances and is discriminatory Hundreds of young people have been removed from a controversial police list of alleged gang members after claims that it is discriminatory and blighted their life chances, the Guardian has learned. The Metropolitan police’s gangs matrix, which the force says is a vital tool in tackling violence in London, has been found to be breaking data laws.

IT 98
article thumbnail

Helix Bitcoin Mixer operator charged for laundering over $300M worth of Bitcoin

Security Affairs

An American was charged with money laundering while operating the dark web Helix Bitcoin mixer service between 2014 and 2017. Larry Dean Harmon (36), from Akron, Ohio, was charged with laundering more than $310 million worth of Bitcoin while he was operating a Darknet-based cryptocurrency laundering service between 2014 and 2017. According to three -count indictment unsealed on February 11 in the District of Columbia, the man was charged with money laundering conspiracy, operating an unlicensed

article thumbnail

How to combat rising macOS threats

Jamf

Malwarebytes recently released a report indicating that in 2019, for the first time ever, macOS threats were more prevalent than Windows. See what this means for you and how to best stay protected.

95
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DNSSEC Keysigning Ceremony Postponed Because of Locked Safe

Schneier on Security

Interesting collision of real-world and Internet security: The ceremony sees several trusted internet engineers (a minimum of three and up to seven) from across the world descend on one of two secure locations -- one in El Segundo, California, just south of Los Angeles, and the other in Culpeper, Virginia -- both in America, every three months. Once in place, they run through a lengthy series of steps and checks to cryptographically sign the digital key pairs used to secure the internet's root z

Security 130
article thumbnail

The 5 Love Languages of Cybersecurity

Dark Reading

When it comes to building buy-in from the business, all cybersecurity needs is love -- especially when it comes to communication.

article thumbnail

News Wrap: Valentine’s Day Scams and Emotet’s Wi-Fi Hack

Threatpost

Top stories of this week include a new Emotet Wi-Fi hack and Robbinhood ransomware operators using a "bring your own bug" technique.

article thumbnail

Three ways the California Consumer Privacy Act (CCPA) can help bolster your customer satisfaction

IBM Big Data Hub

Data has grown exponentially over the last decade, to the extent where it is often referred to as a “natural resource,” and its rapid and uncontrolled growth has resulted in its poor management. This exploitation is a result of the theft or breach of data, as well as the limited controls and rights that people associated with this data can exercise.

Privacy 81
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

500 Malicious Chrome Extensions Impact Millions of Users

Threatpost

The malicious Chrome extensions were secretly collecting users' browser data and redirecting them to malware-laced websites.

Security 101
article thumbnail

AI and machine learning will dominate the CIO agenda this year

Information Management Resources

Now more than ever, organizations realize that to manage their unprecedented data growth, a solid data strategy must be front and center for them to survive and thrive.

article thumbnail

SMS Phishing Campaign Targets Mobile Bank App Users in North America

Threatpost

Customers of RBC, HSBC, TD, Meridian, BNC and Chase are targeted in latest attack.

Phishing 108
article thumbnail

SEC Commissioner Peirce Proposes Blockchain Token Safe Harbor

Data Matters

On February 6, 2020, U.S. Securities and Exchange Commission (SEC or Commission) Commissioner Hester M. Peirce (Commissioner Peirce) gave a speech describing the need for more clarity on application of the securities laws to the offer and sale of blockchain tokens or digital assets. As part of the speech, she proposed a safe harbor (Proposal or Safe Harbor) exempting certain tokens from the registration requirements of the Securities Act of 1933 (Securities Act) and Securities Exchange Act of

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Eleventh Cir. Rejects Broad Reading of “Autodialer”

HL Chronicle of Data Protection

On January 27, 2020, an Eleventh Circuit panel released a landmark ruling in Glasser v. Hilton Grand Vacations Company, LLC. The key issue in the case was how to interpret ambiguous language in the Telephone Consumer Protection Act’s (TCPA) definition of “automatic telephone dialing system” (ATDS or autodialer). In recent years, imprecise statutory phrasing and the Federal Communication Commission’s (FCC) liberal reading of the legislative history empowered plaintiffs to assert TCPA claims base

article thumbnail

Huawei Controversy Highlights 5G Security Implications

Threatpost

Security experts say that 5G supply chain concerns should be taken seriously – whether it’s in the context of Huawei or not.

article thumbnail

Securing the Internet of Things in the age of 5G

Information Management Resources

The IoT poses a challenge since the majority of mistakes of the previous generation of IoT devices have not been fixed nor have lessons been learned on the part of many manufacturers.

IoT 68