Thu.Aug 06, 2020

article thumbnail

Twitter Rushes to Fix Flaw in Android Version

Data Breach Today

Vulnerability Could Enable Hackers to Access User Data, Including Direct Messages Twitter rushed out a fix for a flaw in the Android version of its social media platform that could have allowed hackers to access user data, including within the direct message feature. The news comes as more details have emerged about a recent Twitter hacking incident.

Access 339
article thumbnail

How to Talk Technology When You’re Not Technical

AIIM

Some people are hyper-technical, and they can be intimidating if you don’t feel technically minded. It can feel like you’re not even speaking the same language as they seem to bury you in TLAs and FLAs (Three-Letter Acronyms and Four-Letter Acronyms). Information professionals can communicate with their technical colleagues – even when they’re not that technical.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Canon USA Websites Offline Following Cyber Incident

Data Breach Today

Outage Happened After Data Disappeared From Company's Cloud Platform Several Canon USA corporate websites remained offline Thursday after the company reportedly sustained a ransomware attack. Earlier, the imaging company reported user data was missing from a cloud database.

Cloud 239
article thumbnail

What Is Data Literacy?

erwin

How Data Literacy Turns Data from a Burden to a Benefit. Today, data literacy is more important than ever. Data is now being used to support business decisions few executives thought they’d be making even six months ago. With your employees connected and armed with data that paints a clear picture of the business, your organization is better prepared to turn its attention to whatever your strategic priority may be – i.e. digital transformation, customer experience, or withstanding this cur

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Banking on Uncertainty - The Future of Financial Crime and Compliance

Data Breach Today

Even before the pandemic set us on the road to a global recession, many banks were struggling to balance the polarising pressures of a changing world and keeping to business as usual.

More Trending

article thumbnail

Building a Stronger Security Infrastructure

Data Breach Today

Insights on Protecting Customer Data During the Pandemic As organizations collect more consumer data during the COVID-19 pandemic, how can they protect it? Peter Yapp, former deputy director at the UK's National Cyber Security Center, provides insights on building a stronger security infrastructure.

Security 175
article thumbnail

FBI is warning of cyber attacks against Windows 7 systems that reached end-of-life

Security Affairs

The FBI warned private industry partners of risks impacting companies running Windows 7 after the Microsoft OS reached the end of life on January 14. The Federal Bureau of Investigation is warning companies running Windows 7 systems of the greater risk of getting hacked because the Microsoft OS has reached the end of life on January 14. Early this week, the FBI has sent a private industry notification (PIN Number 20200803-002) to partners in the US private sector. “The FBI has observed cyb

Risk 126
article thumbnail

A Hacker’s guide to reducing side-channel attack surfaces using deep-learning

Elie

This talk showcases SCALD, our tool that leverages deep-learning explainability and dynamic execution to automatically find which parts of a crypto-hardware implementation is responsible for leaking the information exploited by side-channel attacks.

118
118
article thumbnail

I'm Partnering with NordVPN as a Strategic Advisor

Troy Hunt

I love security. I love privacy. Consequently, it will come as no surprise that I love tools that help people achieve those objectives. Equally, I have no patience for false promises, and I've been very vocal about my feelings there: But one of them is literally called “Secure VPN”, how is this possible?! “Are You Using These VPN Apps? Personal Info Of 20 Million Users Leaked: That’s 1.2TB Data” [link] — Troy Hunt (@troyhunt) July 20, 2020 VPNs are a great example of where a tool can be us

Privacy 120
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Netwalker ransomware operators claim to have stolen data from Forsee Power

Security Affairs

Netwalker ransomware operators breached the networks of Forsee Power , a well-known player in the electromobility market. A new company has been added to the list of the victims of the Netwalker ransomware operators, it is Forsee Power , which provides advanced lithium-ion battery systems for any mobility application. The industrial group is based in France and in the US USA, it is one of the market leaders in Europe, Asia, and North America with annual revenue of around $65 million and over 200

article thumbnail

Black Hat 2020: Mercedes-Benz E-Series Rife with 19 Bugs

Threatpost

Researchers went into detail about the discovery and disclosure of 19 security flaws they found in Mercedes-Benz vehicles, which have all been fixed.

Security 125
article thumbnail

Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry

WIRED Threat Level

A campaign called Operation Skeleton Key has stolen source code, software development kits, chip designs, and more.

Security 140
article thumbnail

Canon Admits Ransomware Attack in Employee Note, Report

Threatpost

The consumer-electronics giant has suffered partial outages across its U.S. website and internal systems, reportedly thanks to the Maze gang.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Feds Want These Teams to Hack a Satellite—From Home

WIRED Threat Level

Meet the hackers who, this weekend, will try to commandeer an actual orbiter as part of a Defcon contest hosted by the Air Force and the Defense Digital Service.

Security 101
article thumbnail

Black Hat 2020: Satellite Comms Globally Open to $300 Eavesdropping Hack

Threatpost

Attackers can listen in on internet traffic for high-value targets a continent away, like shipping fleets and oil installations, using some basic home-television gear.

article thumbnail

Senate Bill Limits Corporate Use of Facial Recognition

Hunton Privacy

On August 4, 2020, Senators Jeff Merkley (OR) and Bernie Sanders (VT) introduced the National Biometric Information Privacy Act of 2020 (the “bill”). The bill would require companies to obtain individuals’ consent before collecting biometric data. Specifically, the bill would prohibit private companies from collecting biometric data—including eye scans, voiceprints, faceprints and fingerprints—without individuals’ written consent, and from profiting off of biometric data.

article thumbnail

Black Hat 2020: ‘Zero-Click’ MacOS Exploit Chain Uses Microsoft Office Macros

Threatpost

At Black Hat 2020, Patrick Wardle disclosed an exploit chain that bypasses Microsoft's malicious macros protections to infect MacOS users.

Security 113
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Quest to Liberate $300,000 of Bitcoin From an Old Zip File

WIRED Threat Level

The story of a guy who wouldn't let a few quintillion possible decryption keys stand between him and his cryptocurrency.

Security 112
article thumbnail

Navigational Charts added to NARA’s Format Guidance Bulletin

National Archives Records Express

This post is written by Sharmila Bhatia and Michael Horsley. We have added Navigational Charts to Appendix A: Table of File Formats of NARA Bulletin 2014-04, Format Guidance for the Transfer of Permanent Records. Records in this format can now be transferred as permanent records to the National Archives. NAID 102279243 1799 A Map of the Head of Chesapeake Bay and Susquehanna River, Shewing the Navigation of the same with a Topographical description Country from an actual Survey by C.

Paper 89
article thumbnail

The Subtle Tricks Shopping Sites Use to Make You Spend More

WIRED Threat Level

Through deceptive designs known as “dark patterns,” online retailers try to nudge you toward purchases you wouldn’t otherwise make.

Retail 99
article thumbnail

Exploiting Google Cloud Platform With Ease

Dark Reading

Security engineer Dylan Ayrey and Cruise senior infrastructure security engineer Allison Donovan describe fundamental weaknesses in GCP identity management that enable privilege escalation and lateral movement.

Cloud 89
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits

Threatpost

Black Hat 2020 session discusses how high-wattage connected devices like dishwashers and heating systems can be recruited into botnets and used to manipulate energy markets.

article thumbnail

The NSA on the Risks of Exposing Location Data

Schneier on Security

The NSA has issued an advisory on the risks of location data. Mitigations reduce, but do not eliminate, location tracking risks in mobile devices. Most users rely on features disabled by such mitigations, making such safeguards impractical. Users should be aware of these risks and take action based on their specific situation and risk tolerance. When location exposure could be detrimental to a mission, users should prioritize mission risk and apply location tracking mitigations to the greatest e

Risk 104
article thumbnail

High-Severity Cisco DoS Flaw Plagues Small-Business Switches

Threatpost

Cisco recently patched the high-severity flaw, which could allow remote, unauthenticated attackers to launch DoS attacks against its popular small business switches.

IT 84
article thumbnail

Key Takeaways from Sidley’s Privacy and Cybersecurity Monitor-Side Chat Featuring Adam Klein, Chairman of the PCLOB

Data Matters

On July 2, 2020, Sidley partner Alan Raul, founder and co-head of Sidley’s Privacy and Cybersecurity practice, hosted Adam Klein, Chairman of the Privacy and Civil Liberties Oversight Board (“PCLOB” or “the Board”), for a Monitor-Side Chat. The discussion focused largely on the Commission’s work since Mr. Klein became Chairman in October, 2018. Key topics of the chat included: Mission, Operation and Access of PCLOB.

Privacy 68
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Long Shadow of Stuxnet: New Microsoft Print Spooler Vulns Revealed

Dark Reading

Researchers Peleg Hader and Tomer Bar of SafeBreach share details of the three vulnerabilities they found in Windows Print Spooler that could allow an attacker to sneak into the network through an old printer service mechanism.

76
article thumbnail

How the US Can Prevent the Next 'Cyber 9/11'

WIRED Threat Level

In an interview with WIRED, former national intelligence official Sue Gordon discusses Russian election interference and other digital threats to democracy.

article thumbnail

Information Operations Spotlighted at Black Hat as Election Worries Rise

Dark Reading

From Russia's "best-in-class" efforts at widening social divides in Western democracies to China's blunt attacks on dissidents, information operations are becoming a greater threat, says a Stanford researcher.

99