Fri.Jan 31, 2020

article thumbnail

Iowa Prosecutors Drop Charges Against Men Hired to Test Their Security

Krebs on Security

On Sept. 11, 2019, two security experts at a company that had been hired by the state of Iowa to test the physical and network security of its judicial system were arrested while probing the security of an Iowa county courthouse, jailed in orange jumpsuits, charged with burglary, and held on $100,000 bail. On Thursday Jan. 30, prosecutors in Iowa announced they had dropped the criminal charges.

Security 302
article thumbnail

Fake Coronavirus Messages Spreading Emotet Infections

Data Breach Today

Reports: Cybercriminals Using Health Emergency Messages to Spread Malware Cybercriminals are using fake email messages about the coronavirus to spead the Emotet Trojan and other malware, according to reports released this week by IBM and Kaspersky.

253
253
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST Tests Forensic Methods for Getting Data From Damaged Mobile Phones

Security Affairs

Crooks sometimes damage their mobile devices to destroy evidence, NIST tests forensic methods for getting data from damaged mobile phones. Criminals sometimes damage their mobile phones in an attempt to destroy evidence. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve the evidence anyway. Now, researchers at the National Institute of Standards and Technology (NIST) have tested how well these forensic methods work.

article thumbnail

Judge Rules Insurer Must Pay for Ransomware Damage

Data Breach Today

Coverage Required Because Attack Caused 'Physical Loss or Damage' A federal judge has ruled that an insurer providing a "business owner's insurance policy" to a company that sustained a ransomware attack and was forced to replace most of its IT infrastructure must pay for the damages the security incident caused.

Insurance 162
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

NSA Security Awareness Posters

Schneier on Security

From a FOIA request, over a hundred old NSA security awareness posters. Here are the BBC's favorites. Here are Motherboard's favorites. I have a related personal story. Back in 1993, during the first Crypto Wars, I and a handful of other academic cryptographers visited the NSA for some meeting or another. These sorts of security awareness posters were everywhere, but there was one I especially liked -- and I asked for a copy.

More Trending

article thumbnail

Report: Threat of Emotet and Ryuk

Security Affairs

Experts at cyber security firm Cypher conducted a study on Portuguese domains during 2019 and concluded that Emotet and Ryuk were the most active threats. Emotet , the most widespread malware worldwide and Ryuk , a ransomware type, are growing threats and real concerns for businesses and internet users in 2020. This is the conclusion of a study by Cipher Portugal, which studied Portuguese domains during 2019.

article thumbnail

Avast Stops Using Security Software to Track Browsing Data

Data Breach Today

Czech Anti-Virus Giant Faced Outcry Over Privacy Risks Posed by Data Tracking Anti-virus giant Avast is shuttering Jumpshot, its data-collecting side business that has been funneling detailed internet browsing activity from the company's security products and browser extensions to marketers, after a probe by PCMag and Motherboard found the company was failing to fully anonymize data.

article thumbnail

Iranian Hackers Target U.S. Gov. Vendor With Malware

Threatpost

APT34 has been spotted in a malware campaign targeting customers and employees of a company that works closely with U.S. federal agencies, and state and local governments.

article thumbnail

Analysis: Government Policies on Huawei's 5G Role

Data Breach Today

The latest edition of the ISMG Security Report discusses the ramifications of the U.K's decision to allow limited use of Huawei's equipment in 5G networks. Plus: Updates on Wawa's stolen card offered for sale and nascent security threats from social networks and drones.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hackers penetrated NEC defense business division in 2016

Security Affairs

Japanese electronics and IT giant NEC confirmed a security breach suffered by its defense business division in December 2016. The IT giant NEC confirmed that the company defense business division has suffered a security breach back in December 2016. The Japanese firm confirmed the unauthorized access to its internal network after Japanese newspapers disclosed the security incident citing sources informed of the event.

article thumbnail

Privacy Advocate Tackles Issue of Patient Consent Rights

Data Breach Today

As health data privacy concerns heat up to a boiling point on multiple fronts, it's more essential than ever that patients get a clear opportunity to make a choice about whether their data is shared, says privacy advocate Twila Brase, who heads the Citizens' Council for Health Freedom.

Privacy 113
article thumbnail

U.S. Department of Interior Grounding All Drones

Schneier on Security

The Department of Interior is grounding all non-emergency drones due to security concerns: The order comes amid a spate of warnings and bans at multiple government agencies, including the Department of Defense, about possible vulnerabilities in Chinese-made drone systems that could be allowing Beijing to conduct espionage. The Army banned the use of Chinese-made DJI drones three years ago following warnings from the Navy about "highly vulnerable" drone systems.

Metadata 119
article thumbnail

Zero Day Initiative Bug Hunters Rake in $1.5M in 2019

Threatpost

Microsoft OS flaws, out-of-bounds reads, ICS gear and a record number of high-severity bugs marked 2019 for the ZDI program.

IoT 104
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Watch Out for Coronavirus Phishing Scams

WIRED Threat Level

At least one email campaign is preying on fears by claiming to offer info about the Wuhan coronavirus.

Phishing 111
article thumbnail

Top 2020 trends in cloud adoption

OpenText Information Management

Over the last decade, cloud has changed the way nearly every business and organization works. In that time, spending on public cloud increased from $77 billion to over $400 billion, and we have seen the rise of Google, Microsoft and Amazon as major players in the public cloud market. Enterprise IT spending on private cloud solutions … The post Top 2020 trends in cloud adoption appeared first on OpenText Blogs.

Cloud 80
article thumbnail

Top trends impacting artificial intelligence in 2020

Information Management Resources

Looking ahead into the new decade, we will begin to see an acceleration of AI adoption as the lines between data and AI begin to blur.

article thumbnail

US continues to press UE members to ban Huawei and Chinese 5G technologies

Security Affairs

The United States appreciated European Union’s new rules on 5G networks, but pressed them to ban China’s Huawei technology. The EU’s executive Commission this week presented a set of rules and technical measures aimed at reducing cybersecurity risks from the adoption of 5G networks. The Commission’s recommendations include blocking high-risk equipment suppliers from “critical and sensitive” components of 5G infrastructures, such as the core.

Risk 78
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

AppSec Concerns Drove 61% of Businesses to Change Applications

Dark Reading

Some have even left behind commercial software and migrated to open-source or in-house homegrown applications. Continue for synopsis or read full research report.

74
article thumbnail

Weekly Update 176

Troy Hunt

Well that's the audio issues fixed - mostly. The Zoom H6 is an awesome recorder, I just can't quite work out the right adaptors for the mic. I've got a couple of Saramonic SR-XLM1 lav mics and the guy at the DJ store I bought the Zoom from was convinced we'd be fine with just with 3.5mm to 6.35mm jack converters which appears to be incorrect. Someone else hen said we'd need a TRRS to TRS adaptor so we grabbed a couple of Rode SC3s which also didn't solve the problem.

IT 65
article thumbnail

Understanding Data Privacy through the lens of the Collibra Team

Collibra

January 28th was Data Privacy Day. As mentioned in our Q&A with the International Association of Privacy Professionals , it’s estimated that by 2025, 463 exabytes of data will be created every day, globally, which is equivalent to 212,765,957 DVDs every 24 hours. What’s even more interesting, and perhaps mind-boggling, is that in the year 2020 there will be 40x more bytes than there are stars in the observable universe.

article thumbnail

Evil Corp Returns With New Malware Infection Tactic

Threatpost

Researchers have observed the cybercrime group back in action, now using a new tactic for distributing malware.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Connect with Singapore via the PEPPOL e-invoicing network

OpenText Information Management

Originally, the goal of Pan-European Public Procurement On-Line (PEPPOL) was to simplify electronic procurement processes between government agencies across Europe and their suppliers. However, PEPPOL has been growing in importance not only in Europe, but outside of Europe as well, including in Singapore, Australia and New Zealand. Singapore stands out as an example to other … The post Connect with Singapore via the PEPPOL e-invoicing network appeared first on OpenText Blogs.

article thumbnail

Locking Down Your Azure Cloud Security

Adapture

With public cloud comes increased flexibility, enhanced storage, and much more – but it also comes with a shared responsibility model. Organizations storing sensitive data in public cloud, like Azure, have a duty to manage its security. Because of this, some businesses are reluctant to rely on public cloud. However, your Azure cloud environment has [ ] The post Locking Down Your Azure Cloud Security appeared first on ADAPTURE.

Cloud 52
article thumbnail

The long game: how to get a library into the limelight

CILIP

The long game: how to get a library into the limelight. The long game: how to get a library into the limelight. RECKITT Benckiser (RB) is the UK?s twelfth largest listed company with a ?41 billion market capitalisation. Founded in Hull in 1840, its brands range from Nurofen to Durex to Dettol, and include many other household names. As a fast-moving consumer goods company, RB has innovative pipelines of new products across its brands that must be supported by the R&D (research and developmen

article thumbnail

Developing a strong lab outreach program

OpenText Information Management

When Joe Trevino says that he understands the challenges of a laboratory manager’s daily routine – financial, staffing, technology and customers – he really does. With over 27 years of experience in the laboratory field as a manager, owner and consultant, Joe brings an unparalleled level of empathy and understanding to a meeting with any … The post Developing a strong lab outreach program appeared first on OpenText Blogs.

Cloud 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New eLearning hub for CILIP members launched

CILIP

New eLearning hub for CILIP members launched. The new eLearning Hub brings together a wide variety of learning resources available to CILIP members including online courses and webinar recordings. The eLearning resources are structured by Professional Knowledge and Skills Base (PKSB) category, sector and resource type, so you can easily search for resources on topics of interest to you.

article thumbnail

A Farewell to SLRM

The Texas Record

I started at SLRM at 23 years old with a bad haircut, an eyebrow ring, and a dream: a full-time job that paid me enough to afford rent. I knew nothing about records management, didn’t even know it was a discipline, and had no idea where my birth certificate was. I was kind of a mess. Cut to 17 years later, I have a much better haircut, I lost the eyebrow ring when my brother told me to take it out for his wedding, and I LOVE records management.

article thumbnail

Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program

Threatpost

Program is the latest the tech giant has launched that pay users and security researchers to find vulnerabilities in its numerous products.