Wed.Nov 13, 2019

article thumbnail

Report Calls for Enforcing Voting Machine Standards

Data Breach Today

Study Recommends Federal Certification Program for Vendors Providing Election Infrastructure A new report calls for the creation of a federal certification program that makes sure vendors that build election infrastructure - including voting machines - meet cybersecurity standards.

article thumbnail

Orcus RAT Author Charged in Malware Scheme

Krebs on Security

In July 2016, KrebsOnSecurity published a story identifying a Toronto man as the author of the Orcus RAT , a software product that’s been marketed on underground forums and used in countless malware attacks since its creation in 2015. This week, Canadian authorities criminally charged him with orchestrating an international malware scheme. An advertisement for Orcus RAT.

Marketing 194
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers Describe Significant Flaw in Intel's PMx Driver

Data Breach Today

Intel Has Fixed Vulnerability That Allows for 'Near-Omnipotent Control' of Device Researchers at Eclypsium have revealed new details concerning a significant flaw in Intel's PMx driver, which they say could give attackers "near-omnipotent" control over devices. Intel has released an updated version of the driver, a key step in mitigating risks.

Risk 160
article thumbnail

New TSX Speculative Attack allows stealing sensitive data from latest Intel CPUs

Security Affairs

ZombieLoad 2, aka TSX Asynchronous Abort, is a new flaw that affects the latest Intel CPUs that could be exploited to launch TSX Speculative attack. ZombieLoad 2, aka TSX Asynchronous Abort, is a new vulnerability tracked as CVE-2019-11135 that affects the latest Intel CPUs that could be exploited to launch TSX Speculative attack. The flaw affects the Transactional Synchronization Extensions (TSX) feature in Intel processors, it could be exploited by a local attacker or a malicious code to steal

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Google's Push Into Health Sector: Emerging Privacy Issues

Data Breach Today

With Google aggressively expanding its push into the healthcare sector, critical privacy-related issues are emerging, says regulatory attorney Alisa Chestler, who offers an overview of key issues.

Privacy 142

More Trending

article thumbnail

3 Reasons to Do a 'Proof of Concept' With MDR Providers

Data Breach Today

Tips for Acquiring the Right Managed Detection and Response System When our company set out to find a managed detection and response provider, one thing was clear: We needed to put vendors to the test with a proof of concept.

125
125
article thumbnail

Adobe patch Tuesday updates addressed critical flaws in Media Encoder and Illustrator products

Security Affairs

Adobe patch Tuesday updates addressed a total of 11 vulnerabilities affecting its Animate, Illustrator, Media Encoder and Bridge products. Adobe patch Tuesday updates addressed a total of 11 flaws affecting its Animate, Illustrator, Media Encoder and Bridge products. “Adobe has published security bulletins for Adobe Animate CC ( APSB19-34 ), Adobe Illustrator CC ( APSB19-36 ), Adobe Media Encoder ( APSB19-52 ) and Adobe Bridge CC ( APSB19-53 ).

article thumbnail

NTSB Investigation of Fatal Driverless Car Accident

Schneier on Security

Autonomous systems are going to have to do much better than this. The Uber car that hit and killed Elaine Herzberg in Tempe, Ariz., in March 2018 could not recognize all pedestrians, and was being driven by an operator likely distracted by streaming video, according to documents released by the U.S. National Transportation Safety Board (NTSB) this week.

article thumbnail

A flaw in PMx Driver can give hackers full access to a device

Security Affairs

Eclypsium experts found a vulnerability affecting the popular PMx Driver Intel driver that can give malicious actors deep access to a device. In August, Eclypsium researchers found multiple serious vulnerabilities in more than 40 device drivers from tens of vendors, including AMI, ASRock, ASUS, ATI, Biostar, EVGA, Getac, Gigabyte, Huawei, Insyde , Intel, MSI, NVIDIA, Phoenix Technologies, Realtek, SuperMicro and Toshiba.

Access 82
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Managed Attribution Threat Modeling

Adam Shostack

The more I learn about threat modeling, the more I think the toughest part is how we answer the question: “What can go wrong?” Perhaps that’s “finding threats.” Maybe it’s “discovering” or “eliciting” them. Maybe it’s analogizing from threats we know about. I’m not yet even sure what to call it.

Privacy 73
article thumbnail

Announcing Jamf Protect – Jamf’s endpoint security solution purpose-built for Mac

Jamf

Matt Woodruff, Security Solutions Lead, and Andrew Medearis, Senior Product Manager of Jamf Protect, took the stage at JNUC to dive into everything you need to know about Jamf’s latest addition to its product line and why Jamf is expanding into Mac security.

article thumbnail

Microsoft Patch Tuesday updates fix CVE-2019-1429 flaw exploited in the wild

Security Affairs

Microsoft’s Patch Tuesday updates for November 2019 address over 70 flaws, including an Internet Explorer issue (CVE-2019-1429) that has been exploited in attacks in the wild. Microsoft’s Patch Tuesday updates for November 2019 address 74 flaws, including an Internet Explorer vulnerability, tracked as CVE-2019-1429, that has been exploited in the wild.

article thumbnail

Announcing Jamf Protect – Jamf’s endpoint security solution purpose-built for Mac

Jamf

Matt Woodruff, Security Solutions Lead, and Andrew Medearis, Senior Product Manager of Jamf Protect, took the stage at JNUC to dive into everything you need to know about Jamf’s latest addition to its product line and why Jamf is expanding into Mac security.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Untangling the service mesh

DXC Technology

You may have noticed that, as you run more and more applications in containers it’s not easy to get them to talk and play well with each other. That’s because instead of monolithic applications using APIs to talk to components on one machine, we now have one app here, another there and they use networking […].

IT 71
article thumbnail

Finding the right balance: Microsoft security, privacy and functionality

Jamf

Paul Bowden of Microsoft helped Jamf Nation User Conference (JNUC) attendees understand how to get the most out of security, privacy via Microsoft, and go through new approaches and features in Jamf Pro.

Privacy 71
article thumbnail

More than half of IT staff think employees need cyber security training

IT Governance

Cyber security awareness training is one of the most important steps an organisation can take to protect its systems. Sure, you need anti-malware tech and firewalls to prevent cyber attacks, and you definitely need to back up sensitive files in case they’re lost or stolen, but who handles all that information? Your staff. And if they don’t know what they should be doing, all your other defences will be for nothing.

IT 68
article thumbnail

Finding the right balance: Microsoft security, privacy and functionality

Jamf

Paul Bowden of Microsoft helped Jamf Nation User Conference (JNUC) attendees understand how to get the most out of security, privacy via Microsoft, and go through new approaches and features in Jamf Pro.

Privacy 71
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Goodbye? and Welcome!

The Texas Record

Handing Over the Torch: On November 1, the SLRM team exemplified the old adage “the only constant in life is change.” On that day, we said goodbye, sort of, to one colleague and promoted another. After 8 years as manager of the Records Management Assistance (RMA) Unit, Sarah Jacobson stepped down to become the next director of the Talking Book Program at TSLAC.

article thumbnail

Education technology initiatives shine during Jamf at School Keynote

Jamf

Everyone student deserves the best learning experience. This day 2 JNUC Keynote explained how we are striving to help schools live up to that expectation.

article thumbnail

Web Data Can Answer The Hard Travel Business Questions

Import.IO

Download the free online travel ebook now! To attract an online travel customer, you’re not just trying to gain a ticket or room sale. You’re gaining the opportunity to engage with a customer throughout their travel experience, to upsell or cross-sell them higher-margin services, and ultimately, their loyalty. Quick and. The post Web Data Can Answer The Hard Travel Business Questions appeared first on Import.io.

Sales 52
article thumbnail

Education technology initiatives shine during Jamt at School Keynote

Jamf

Everyone student deserves the best learning experience. This day 2 JNUC Keynote explained how we are striving to help schools live up to that expectation.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Breaches Are Inevitable, So Embrace the Chaos

Dark Reading

Avoid sinking security with principles of shipbuilding known since the 15th century.

article thumbnail

Build America Mutual, Microsoft, SAP, Okta and more highlight Jamf at Work Keynote

Jamf

New workflows and innovative Jamf customers take center during the Jamf at Work Keynote. Read this blog for a full recap.

74
article thumbnail

Why Should Records Management be Important to You

Gimmal

Why should an organization care about records management? When users through out all departments are creating new records without a thought to how they are cataloged or tagged, the sprawl of records can become a real threat. Unstructured data can lead to compliance issues for highly regulated industries. When proper records management isn’t a top priority , content that should have been disposed of for security purposes is left vulnerable for anyone to find and distribute.

article thumbnail

Build America Mutual, Microsoft, SAP, Okta and more highlight Jamf at Work Keynote

Jamf

New workflows and innovative Jamf customers take center during the Jamf at Work Keynote. Read this blog for a full recap.

74
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Brave Browser Extends Its Payouts to iOS

WIRED Threat Level

Nearly four years after Brave proposed paying users to surf the web, that vision is finally coming to the iPhone.

IT 65
article thumbnail

Why MDM is fundamental to support Apple at SAP

Jamf

Rich Trouton of SAP talks at JNUC 2019 about how MDM is no longer a 'nice-to-have.' It's a necessity.

MDM 75
article thumbnail

Networking Luncheon: The Role of the EDPB and the Cooperation of SAs

Hunton Privacy

On November 18, 2019, Hunton Andrews Kurth will host a networking luncheon in the firm’s Brussels office. The luncheon will feature Isabelle Vereecken , Head of the Secretariat of the European Data Protection Board (EDPB), and will focus on the role of the EDPB and cooperation between supervisory authorities (SAs) in cross-border matters. Discussion topics include: The role of the EBPB, including its power to issue binding decisions on the draft measures of SAs in case of a dispute; The interpla

IT 49