Wed.Jan 22, 2020

article thumbnail

Apple Addresses iPhone 11 Location Privacy Concern

Krebs on Security

Apple is rolling out a new update to its iOS operating system that addresses the location privacy issue on iPhone 11 devices that was first detailed here last month. Beta versions of iOS 13.3.1 include a new setting that lets users disable the “Ultra Wideband” feature, a short-range technology that lets iPhone 11 users share files locally with other nearby phones that support this feature.

Privacy 211
article thumbnail

Updated FTCODE Ransomware Now Steals Credentials, Passwords

Data Breach Today

Revamped Malware Targets Browsers and Email Clients FTCODE, a ransomware strain that has been active since at least 2013, has recently been revamped to include new features, including the ability to steal credentials and passwords from web browsers and email clients, according to two research reports released this week.

Passwords 200
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When Pressing Delete Is OK: Learn How to Eliminate ROT in Your Organization

AIIM

If your organization is like just about every other organization on the planet, you likely have some degree of an information management problem. Most likely, you create too much information, and you keep too much of it for too long. This causes enough problems by itself, but when you then add to the pile all the redundant, obsolete, and trivial (ROT) information you have in your systems, on your file shares, and in every other possible location, it’s a real nightmare.

ROT 119
article thumbnail

BT and Vodafone Reportedly Want Huawei 5G Gear

Data Breach Today

Vodafone CEO Has Warned Huawei Ban Would Delay Britain's 5G Rollout by 2 Years Britain's two largest telecommunications firms - BT and Vodafone - plan to lobby Prime Minister Boris Johnson to not fully ban Huawei hardware from the nation's 5G rollout, warning that doing so could delay their rollouts, the Guardian reports.

194
194
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Malware attack took down 600 computers at Volusia County Public Library

Security Affairs

System supporting libraries in Volusia County were hit by a cyber attack, the incident took down 600 computers at Volusia County Public Library (VCPL) branches. 600 staff and public access computers were taken down at Volusia County Public Library (VCPL) branches in Daytona Beach, Florida, following a cyberattack. The attack started around 7 AM on January 9, 2020. “The county’s technology staff were immediately notified and coordinated recovery efforts with library staff,” reads the

More Trending

article thumbnail

My Health Record: almost $2bn spent but half the 23m records created are empty

The Guardian Data Protection

The Australian government has spent $1.97bn since the system was introduced as the e-health record in 2009 A decade since it was first announced, the federal government has spent close to $2bn on its troubled My Health Record system, and half of the 23m records created lie empty almost a year after the government made the system opt-out. The former Labor government first proposed the e-health record system in 2009 as a means for patients, doctors and specialists to share patient history, X-rays,

article thumbnail

Documents Describe US Cyber Command's Campaign to Hack ISIS

Data Breach Today

Operation Faced a Number of Challenges, Including Data Storage The U.S. Cyber Command's campaign to hack ISIS and disrupt its media operations faced some challenges, including a lack of data storage, but ultimately proved successful, according to government documents from 2016 that were made public Tuesday.

article thumbnail

Four technology predictions for public sector in 2020

OpenText Information Management

With the investment in technology and personnel training we are currently seeing, 2020 will be a year of reckoning for digital transformation initiatives in the public sector. Here are the four technology predictions for the public sector in 2020. Governments will look inwards as they approach citizen service modernization Public sector organizations all over the … The post Four technology predictions for public sector in 2020 appeared first on OpenText Blogs.

article thumbnail

Saudi Arabia Hacked Amazon CEO Jeff Bezos' Phone: Report

Data Breach Today

While Saudis Dismiss Report, United Nations Demands Immediate Investigation The mobile phone of Amazon CEO Jeff Bezos was hacked via a malicious file sent directly from the official WhatsApp account of Saudi Arabia's Crown Prince Mohammed Bin Salman, investigators have concluded. While the Saudis deny involvement, the United Nations has called for an immediate investigation.

147
147
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

To Avoid Disruption, Ransomware Victims Continue to Pay Up

Dark Reading

For all the cautions against doing so, one-third of organizations in a Proofpoint survey said they paid their attackers after getting infected with ransomware.

article thumbnail

Report: Apple Scuttled Encryption Plans for iCloud Backups

Data Breach Today

Technology Giant Didn't Want to 'Poke the Bear,' Sources Tell Reuters Apple previously scuttled plans add end-to-end encryption to iCloud backups, Reuters reports, noting that such a move would have complicated law enforcement investigations. But the apparent olive branch hasn't caused the U.S. government to stop vilifying strong encryption and technology giants who provide it.

article thumbnail

Half a Million IoT Device Passwords Published

Schneier on Security

It's a list of easy-to-guess passwords for IoT devices on the Internet as recently as last October and November. Useful for anyone putting together a bot network: A hacker has published this week a massive list of Telnet credentials for more than 515,000 servers, home routers, and IoT (Internet of Things) "smart" devices. The list, which was published on a popular hacking forum, includes each device's IP address, along with a username and password for the Telnet service , a remote access protoco

Passwords 123
article thumbnail

Tips on Protecting Hospitals From Nation-State Attacks

Data Breach Today

In light of rising tensions between the U.S. and Iran, the Association of Executives in Healthcare Information Security recently issued new data security guidance to help the healthcare sector prepare for potential nation-state attacks, says CISO Christopher Frenz, one of the document's authors.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The California Consumer Privacy Act: What Happened and What’s to Come

Data Matters

Last year ended with businesses scrambling to be ready for the California Consumer Privacy Act’s January 1 deadline. The CCPA’s entry into force did not, however, resolve implementation complexities or answer myriad questions about how the Act will be interpreted. Moreover, the California Attorney General will finalize regulations during 2020 that are likely to expand compliance obligations and narrow flexibility.

Privacy 79
article thumbnail

Break barriers in the data maturity curve with IBM Cloud Pak for Data and MongoDB

IBM Big Data Hub

As IBM’s leading platform for data and AI, Cloud Pak for Data integrates seamlessly with MongoDB to help data scientists and developers quickly scale the ladder to AI.

Cloud 79
article thumbnail

Everything We Know About the Jeff Bezos Phone Hack

WIRED Threat Level

A UN report links the attack on Jeff Bezos' iPhone X directly to Saudi Arabian Crown Prince Mohammed bin Salman.

article thumbnail

Cybersecurity Lessons Learned from 'The Rise of Skywalker'

Dark Reading

They're especially relevant regarding several issues we face now, including biometrics, secure data management, and human error with passwords.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Hong Kong’s Reform of the Personal Data (Privacy) Ordinance (the “PDPO”): Bridging Troubled Waters

HL Chronicle of Data Protection

On Monday 20 January, the Constitutional and Mainland Affairs Bureau (“CMAB”), jointly with the Privacy Commissioner for Personal Data (“PCPD”), presented a paper outlining topics for review of the PDPO to the members of the Legislative Council Panel on Constitutional Affairs (“PDPO Review Paper”). The CMAB and the PCPD are expected to take panel members’ feedback on the PDPO Review Paper and undertake further in-depth study of the issues with a view to making specific proposals for

article thumbnail

New Muhstik Botnet Attacks Target Tomato Routers

Threatpost

Palo Alto Networks’ Unit 42 researchers observed a variant of the wormlike botnet that adds scanner technology to brute-force Web authentication.

article thumbnail

Threat Model Thursday: Files

Adam Shostack

There’s a fascinating talk by Dan Luu, “ Files are Fraught With Peril. ” The talk itself is fascinating, in a horrifying, nothing works, we’re going to give up and raise goats now sort of way. He starts from the startling decision of Dropbox to drop support for all Linux filesystems except Ext4. This surprising decision stems from the fact that a filesystem is a leaky abstraction, The interaction between performance and reliability means that fsync behaves strangely.

article thumbnail

Why DPOs and CISOs Must Work Closely Together

Dark Reading

Recent data protection laws mean that the data protection officer and CISO must work in tandem to make sure users' data is protected.

82
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propaganda

Security Affairs

US military claims to have disrupted the online propaganda activity of the Islamic State (ISIS) in a hacking operation dating back at least to 2016. In 2016, the US Cyber Command carried out successful operations against the online propaganda of the Islamic State (ISIS), this is what emerged from declassified national security top-secret documents released on Tuesday.

article thumbnail

For Mismanaged SOCs, The Price Is Not Right

Dark Reading

New research finds security operations centers suffer high turnover and yield mediocre results for the investment they require.

article thumbnail

Amazon executive challenges Facebook’s Clegg on user data privacy

Information Management Resources

Facebook has come under fire for giving third-parties access to user data, particularly in the wake of the Cambridge Analytica scandal.

article thumbnail

Elections Globally Are Under Threat. Here's How to Protect Them

WIRED Threat Level

A new report calls for safeguards to reduce the dangers posed by misinformation, online extremism, and social media manipulation.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

PoC Exploits Do More Good Than Harm: Threatpost Poll

Threatpost

More than half of security experts think that the good outweighs the bad when it comes to proof-of-concept exploits, according to a recent Threatpost poll.

article thumbnail

ICO Publishes Final Version of Its Age Appropriate Design Code

Hunton Privacy

On January 21, 2020, the UK Information Commissioner’s Office (“ICO”) published the final version of its Age Appropriate Design Code (“the code”), which sets out the standards that online services need to meet in order to protect children’s privacy. It applies to providers of information services likely to be accessed by children in the UK, including applications, programs, websites, social media platforms, messaging services, games, community environments and connected toys and devices, where t

IT 54
article thumbnail

Vivin Nets Thousands of Dollars Using Cryptomining Malware

Threatpost

A newly discovered threat actor named Vivin is raking in Monero from cryptomining malware, showing that this type of attack isn't going away anytime soon.