Tue.Sep 08, 2020

article thumbnail

Russian Indicted in Tesla Ransom Scheme

Data Breach Today

Faces Five Years in Prison If Convicted in Connection With Thwarted Scam A federal grand jury has formally indicted a Russian national in connection with a thwarted attempt at stealing corporate data from electric vehicle manufacturer Tesla so it could be used to extort a $4 million ransom.

article thumbnail

Microsoft Patch Tuesday, Sept. 2020 Edition

Krebs on Security

Microsoft today released updates to remedy nearly 130 security vulnerabilities in its Windows operating system and supported software. None of the flaws are known to be currently under active exploitation, but 23 of them could be exploited by malware or malcontents to seize complete control of Windows computers with little or no help from users. The majority of the most dangerous or “critical” bugs deal with issues in Microsoft’s various Windows operating systems and its web br

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Court Dismisses Privacy Case Against Google, Medical Center

Data Breach Today

But Judge Opens the Door to Filing an Amended Complaint A federal judge has dismissed a lawsuit filed last year against Google and the University of Chicago Medicine involving complex privacy and other issues related to the use of patients' de-identified electronic health record data. But the court left the door open to filing an amended complaint.

Privacy 331
article thumbnail

Newcastle University infected with DoppelPaymer Ransomware

Security Affairs

UK research university Newcastle University suffered a DoppelPaymer ransomware attack and took its systems offline in response to the attack. UK research university Newcastle University was infected with the DoppelPaymer ransomware, in response to the incident it was forced to take systems offline on the morning of August 30th. The Newcastle University did not provide info about the family of ransomware behind the attack, but the DoppelPaymer ransomware operators are claiming to be responsible.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Cyber Incidents Disrupt More Schools

Data Breach Today

Districts in Connecticut, Florida Among the Latest Targets The start of classroom instruction at Hartford Public Schools in Connecticut was canceled Tuesday as a result of a ransomware attack - the latest in a series of cyber incidents to disrupt schools this fall. Last week, online instruction at Miami-Dade County Public Schools in Florida was disrupted.

More Trending

article thumbnail

99 Ransomware Problems - and a Decryptor Ain't One

Data Breach Today

Criminals Keep Finding New Ways to Make Ransomware Victims Pay With apologies to Jay-Z, getting hit with ransomware might make victims feel like they have 99 problems, even if a decryptor ain't one. That's because ransomware-wielding gangs continue to find innovative new ways to extort cryptocurrency from crypto-locking malware victims.

article thumbnail

France, Japan, and New Zealand warn of a surgein Emotet attacks

Security Affairs

Cybersecurity agencies from multiple countries are warning of the surge of Emotet attacks targeting the private sector and public administration entities. Cybersecurity agencies across Asia and Europe are warning of Emotet spam campaigns targeting businesses in France, Japan, and New Zealand. The French national cyber-security agency published an alert to warn of a significant increase of Emotet attacks targeting the private sector and public administration entities in France.

article thumbnail

EMV Contactless Payment Card Flaw Facilitates PIN Bypass

Data Breach Today

Contactless Cards From Visa and Others at Risk, Researchers Warn A flaw in how contactless cards from Visa - and potentially other issuers - have implemented the EMV protocol can be abused to bypass PIN verification for high-value transactions, ETH Zurich researchers warn. But Visa says the exploits would be "impractical for fraudsters to employ" in real-world attacks.

Risk 227
article thumbnail

CIPL and DSCI Publish Report on Enabling U.S.-India Data Transfers

Hunton Privacy

The Centre for Information Policy Leadership at Hunton Andrews Kurth (“CIPL”) and the Data Security Council of India (“DSCI”) have published a report on Enabling Accountable Data Transfers from India to the United States under India’s Proposed Personal Data Protection Bill (the “Report”). CIPL and DSCI put forward this joint Report to highlight the importance of continued flows of data between India and the U.S. following the expected passage of new comprehensive data protection legislation in I

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

FCC: Rip and Replace Huawei, ZTE Gear to Cost $1.8 Billion

Data Breach Today

FCC Urges Congress to Allocate Funding to Assist Rural Carriers The U.S. Federal Communications Commission estimates the total cost for smaller and rural telecom carriers to rip and replace Huawei and ZTE gear from their networks to enhance national security will be over $1.8 billion.

article thumbnail

Next-Gen Firewalls 101: Not Just a Buzzword

Dark Reading

In a rare twist, "next-gen" isn't just marketing-speak when it comes to next-gen firewalls, which function differently than traditional gear and may enable you to replace a variety of devices.

Marketing 109
article thumbnail

Cryptobugs Found in Numerous Google Play Store Apps

Threatpost

A new dynamic tool developed by Columbia University researchers flagged cryptography mistakes made in more than 300 popular Android apps.

article thumbnail

Expert found multiple critical issues in MoFi routers

Security Affairs

Researchers found multiple vulnerabilities in MoFi Network routers, including critical flaws that can be exploited to remotely hack a device. The researchers Rich Mirch from CRITICALSTART discovered ten vulnerabilities MOFI4500 MoFi Network routers. The expert reported the issues to the vendor in May but some of the flaws have yet to be patched. Most of the flaws affect the web management interface, some of the vulnerabilities can be exploited by an unauthenticated, remote attacker with access t

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Critical Intel Active Management Technology Flaw Allows Privilege Escalation

Threatpost

The critical Intel vulnerability could allow unauthenticated attackers gain escalated privileges on Intel vPro corporate systems.

Security 111
article thumbnail

Swiss-U.S. Privacy Shield No Longer Considered Adequate by Swiss DPA

Hunton Privacy

On September 8, 2020, the Swiss Data Protection Authority (the Federal Data Protection and Information Commissioner, “FDPIC”), announced in a position statement that it no longer considers the Swiss-U.S. Privacy Shield adequate for the purposes of transfers of personal data from Switzerland to the U.S. This decision follows the July 2020 ruling of the Court of Justice of the European Union (“CJEU”) in the Schrems II case , which invalidated the EU-U.S.

Privacy 89
article thumbnail

Microsoft’s Patch Tuesday Packed with Critical RCE Bugs

Threatpost

The most concerning of the disclosed bugs would allow an attacker to take over Microsoft Exchange just by sending an email.

Cloud 111
article thumbnail

CIPL Releases Paper on Top Priorities for Implementation of the Brazil LGPD

Hunton Privacy

On September 1, 2020, the Centre for Information Policy Leadership at Hunton Andrews Kurth (“CIPL”) and the Centro de Direito, Internet e Sociedade of Instituto Brasiliense de Direito Público (“CEDIS-IDP”) released a new paper (“Paper”) on the Top Priorities for Public and Private Organizations to Effectively Implement the New Brazilian General Data Protection Law (“LGPD”).

Paper 89
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Adobe fixes critical flaws in Adobe InDesign, Framemaker, and Experience Manager

Security Affairs

Adobe has released security updates to address 12 critical vulnerabilities in Adobe InDesign, Adobe Framemaker, and Adobe Experience Manager. Adobe has released security updates to address twelve critical vulnerabilities that could be exploited by attackers to execute arbitrary code on systems running vulnerable versions of Adobe InDesign, Adobe Framemaker, and Adobe Experience Manager. “Adobe has published security bulletins for Adobe InDesign ( APSB20-52 ), Adobe Framemaker ( APSB20-54 )

article thumbnail

Critical Adobe Flaws Allow Attackers to Run JavaScript in Browsers

Threatpost

Five critical cross-site scripting flaws were fixed by Adobe in Experience Manager as part of its regularly scheduled patches.

IT 106
article thumbnail

Microsoft September 2020 Patch Tuesday addresses 129 flaws

Security Affairs

Microsoft September 2020 Patch Tuesday security updates address 129 vulnerabilities, including twenty critical remote code execution issues. Microsoft September 2020 Patch Tuesday security updates address 129 vulnerabilities in Microsoft products across 15 products (Microsoft Windows, Edge (EdgeHTML-based and Chromium-based), ChakraCore, Internet Explorer (IE), SQL Server, Office and Office Services and Web Apps, Microsoft Dynamics, Visual Studio, Exchange Server, ASP.NET, OneDrive, and Azure De

article thumbnail

e-Records Conference 2020: Call for Presentations Extended

The Texas Record

Update: The deadline for submitting a presentation proposal for the 2020 e-Records Conference has been extended to Tuesday, September 15, 2020. Check out our previous blog post for details about submitting your proposal. Keep up-to-date on all event information at the conference web page: [link]. Thanks! And we’ll see you online in November! 1.

82
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Bug in Google Maps Opened Door to Cross-Site Scripting Attacks

Threatpost

A researcher discovered a cross-site scripting flaw in Google Map's export function, which earned him $10,000 in bug bounty rewards.

89
article thumbnail

VPNs: The Cyber Elephant in the Room

Dark Reading

While virtual private networks once boosted security, their current design doesn't fulfill the evolving requirements of today's modern enterprise.

article thumbnail

More on NIST's Post-Quantum Cryptography

Schneier on Security

Back in July, NIST selected third-round algorithms for its post-quantum cryptography standard. Recently, Daniel Apon of NIST gave a talk detailing the selection criteria. Interesting stuff. NOTE: We're in the process of moving this blog to Wordpress. Comments will be disabled until the move it complete. The management thanks you for your cooperation and support.

IT 104
article thumbnail

8 Frequently Asked Questions on Organizations' Data Protection Programs

Dark Reading

Adherence to data protection regulations requires a multidisciplinary approach that has the commitment of all employees. Expect to be asked questions like these.

84
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Swiss Data Protection Authority Concludes Swiss-US Privacy Shield No Longer Valid for Swiss-US Transfers

Data Matters

Following the Court of Justice of the European Union’s (“CJEU”) decision in Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems (“ Schrems II ”), the Swiss Federal Data Protection and Information Commissioner (“FDPIC”) concluded in a position paper published on 8 September that the Swiss-US Privacy Shield no longer provides a valid mechanism for the transfer of personal data from Switzerland to the US.

Privacy 68
article thumbnail

Microsoft Fixes 129 Vulnerabilities for September's Patch Tuesday

Dark Reading

This month's Patch Tuesday brought fixes for 23 critical vulnerabilities, including a notable flaw in Microsoft Exchange.

90
article thumbnail

Algorithmic Decision-making and the UK ICO’s Guidance on AI

Data Protection Report

Algorithmic decision-making has been in the news of late. From Ofqual’s downgrading of students’ A-level results [1] to the complaint lodged by None of Your Business’ against the credit rating agency CRIF for failing (amongst other things) to be transparent about the reasons why a particular applicant had been given a negative rating [2]. We have been reminded of the potential backlash that could result from decisions that are perceived as incorrect or unfair by algorithms where the workings of