Wed.Jul 29, 2020

article thumbnail

Here’s Why Credit Card Fraud is Still a Thing

Krebs on Security

Most of the civilized world years ago shifted to requiring computer chips in payment cards that make it far more expensive and difficult for thieves to clone and use them for fraud. One notable exception is the United States, which is still lurching toward this goal. Here’s a look at the havoc that lag has wrought, as seen through the purchasing patterns at one of the underground’s biggest stolen card shops that was hacked last year.

Sales 326
article thumbnail

Navigating the Cybercrime Landscape

Data Breach Today

Global Transaction Patterns and Emerging Cybercrime Threats This report review details the anatomy of global fraud networks to better understand the global, regional and industry connections.

272
272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Doki, an undetectable Linux backdoor targets Docker Servers

Security Affairs

Experts spotted an undetectable Linux malware that exploits undocumented techniques to evade detection and targets publicly accessible Docker servers. Cybersecurity researchers at Intezer spotted a new completely undetectable Linux malware , dubbed Doki , that exploits undocumented evasion techniques while targeting publicly accessible Docker servers.

article thumbnail

GDPR Two Years On: Compliance Lessons Learned

Data Breach Today

Attorneys Discuss Gaps That Still Need To Be Addressed Now that it's been two years since enforcement of the European Union's General Data Protection Regulation began, three attorneys - Kelsey Finch, Jonathan Armstrong and David Dumont - reflect on the lessons learned so far and the compliance gaps that still need to be addressed.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Hackers Broke Into Real News Sites to Plant Fake Stories

WIRED Threat Level

A disinfo operation broke into the content management systems of Eastern European media outlets in a campaign to spread misinformation about NATO.

Security 145

More Trending

article thumbnail

U.S. experts claim China-linked hackers have infiltrated Vatican networks

Security Affairs

U.S. cybersecurity firm revealed that China-linked hackers have infiltrated Vatican computer networks ahead of talks. China-linked hackers have infiltrated the Vatican computer networks, reads a report published by the U.S. cybersecurity firm Recorded Future that focuses on the analysis of nation-state actors. According to the experts, the cyber espionage campaign began in May ahead the talk between the Vatican and the Chinese government.

article thumbnail

Rapid Digitization and Risk: A Roundtable Preview

Data Breach Today

HID Global's Dean Stevenson on Strengthening Digital Channels with Advanced Authentication Suddenly, onboarding, servicing and securing digital accounts with advanced authentication techniques isn't just a priority for global enterprises; it is the priority. Dean Stevenson of HID Global previews an upcoming virtual roundtable discussion.

Risk 179
article thumbnail

Billions of Devices Impacted by Secure Boot Bypass

Threatpost

The "BootHole" bug could allow cyberattackers to load malware, steal information and move laterally into corporate, OT ,IoT and home networks.

IoT 133
article thumbnail

How to Spot—and Avoid—Dark Patterns on the Web

WIRED Threat Level

You've seen them before: the UX ploys designed to trick you into spending money, or make it nearly impossible to unsubscribe. Here's what to look out for.

IT 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Net Promoter® Education Difference

Micro Focus

The Education Difference Education. This is not normally a touchpoint along the customer journey that most people think of when describing the main interaction points with a company. However, at Micro Focus we operate a very different Customer Experience model to the industry normal. We statistically analyse which touchpoints along the customer journey provide the.

article thumbnail

Texas AG Investigates Facebook’s Use of Biometric Identifiers

Hunton Privacy

Texas Attorney General Ken Paxton is investigating Facebook Inc. (“Facebook”) for alleged violations of the Texas Business and Commercial Code, which contains provisions governing the collection, retention and disclosure of biometric data. As we previously reported , Facebook recently reached a $650 million settlement for alleged violations of Illinois’ Biometric Information Privacy Act for their use of facial recognition software without permission from affected users.

Privacy 91
article thumbnail

Off the Record: Cybersecurity and COVID-19

The Texas Record

By Rebecca Hanna, Anne Poulos, and Brady Cox. Tune in monthly for a curated collection of articles we found interesting on a broad range of topics, some which are directly related to records management and others which might share common themes. No, we didn’t write these articles—hence the name of this series, “Off the Record”—but fortunately, we didn’t need to in order to share the knowledge with our subscribers.

article thumbnail

How to Decipher InfoSec Job Titles' Mysteries

Dark Reading

Figuring out which cybersecurity job you want -- or are qualified for -- can be difficult when words have no consistent meaning in the industry.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

BootHole issue allows installing a stealthy and persistent malware

Security Affairs

Billions of Windows and Linux devices are affected by a serious GRUB2 bootloader issue, dubbed BootHole, that can be exploited to install a stealthy malware. Billions of Windows and Linux devices are affected by a serious GRUB2 bootloader vulnerability, tracked as CVE-2020-10713 and dubbed BootHole , which can be exploited by attackers to install persistent and stealthy malware.

article thumbnail

Having trouble talking about privacy in 2020?

IG Guru

Information privacy has boomed with new regulation such as GDPR and CCPA, but why do organizations still struggle with privacy matters? Maybe it is time to talk about cyber security WITH privacy. Even lead with cyber security. As you can see, google trends shows in 2020 information security and cyber security out rank governance and […]. The post Having trouble talking about privacy in 2020?

Privacy 82
article thumbnail

Facial-Recognition Flop: Face Masks Thwart Virus, Stump Security Systems

Threatpost

Algorithms clocked error rates of between 5% to 50% when comparing photos of people wearing digitally created masks with unmasked faces.

article thumbnail

Belgium: Belgian DPA imposes a EUR600,000 fine, its highest fine ever, on Google Belgium for non-compliance with right to be forgotten

DLA Piper Privacy Matters

Until recently, most decisions of the Belgian Data Protection Authority (Belgian DPA) concerned national companies or individuals. However, on 14 July 2020, the Belgian DPA imposed a fine of EUR600,000 on Google Belgium SA/NV (Google Belgium) for not respecting a Belgian resident’s right to be forgotten. This is the highest fine ever imposed by the Belgian DPA.

GDPR 75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Critical Magento Flaws Allow Code Execution

Threatpost

Adobe has released patches for critical and important-severity flaws in its popular Magento e-commerce platform.

IT 93
article thumbnail

The Future's Biggest Cybercrime Threat May Already Be Here

Dark Reading

Current attacks will continue to be refined, and what may seem a weakness now could turn out to be a disaster.

95
article thumbnail

Level up your reporting capabilities with Jamf

Jamf

Take your Apple IT Dashboards from 0-100 with these key takeaways from our last webinar.

IT 94
article thumbnail

Average Cost of a Data Breach: $3.86 Million

Dark Reading

New IBM study shows that security system complexity and cloud migration can amplify breach costs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Critical Bugs in Utilities VPNs Could Cause Physical Damage

Threatpost

Gear from Secomea, Moxa and HMS Networks are affected by remote code-execution flaws, researchers warn.

Access 83
article thumbnail

Technical Challenges of IoT Cybersecurity in a Post-COVID-19 World

Dark Reading

Effective management of vulnerabilities can be done only when information about supply chain dependencies is accurate and recent.

IoT 81
article thumbnail

Critical Security Flaw in WordPress Plugin Allows RCE

Threatpost

WordPress plugin Comments – wpDiscuz, which is installed on over 70,000 sites, has issued a patch.

article thumbnail

'BootHole' Vulnerability Exposes Secure Boot Devices to Attack

Dark Reading

A flaw in the GRUB2 bootloader affects most Linux devices and some Windows computers using UEFI Secure Boot.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

OkCupid Security Flaw Threatens Intimate Dater Details

Threatpost

Attackers could exploit various flaws in OkCupid's mobile app and webpage to steal victims' sensitive data and even send messages out from their profiles.

article thumbnail

11 Security Tools to Expect at the Black Hat USA 2020 Arsenal Virtual Event

Dark Reading

More than 130 security researchers and developers are ready to showcase their work.

article thumbnail

Source Code from Microsoft, Adobe, Nintendo, and Others Leaked Online

Adam Levin

A collection of source code from companies including General Electric, Disney, Microsoft, Motorola, Qualcomm, Adobe, Nintendo and Microsoft has been aggregated and posted online. . The repository was released onto Gitlab by software developer and IT consultant Tillie Kottmann and was collected from publicly available leaked data that had been stored on misconfigured online servers.