Wed.Nov 06, 2019

article thumbnail

The Malicious Macros Problem May Be Solved Soon

Data Breach Today

Using Containers, Malicious Documents Will Be Isolated in Office 365 A handful of common lures still have astounding success in compromising computers: phishing emails, malicious links and the king of them all: the malicious Microsoft Office document. But Microsoft is introducing virtualized containers in Office 365, which will isolate untrusted documents.

Phishing 154
article thumbnail

NEW TECH: Silverfort deploys ‘multi-factor authentication’ to lock down ‘machine identities’

The Last Watchdog

From the start, two-factor authentication, or 2FA , established itself as a simple, effective way to verify identities with more certainty. Related: A primer on IoT security risks The big hitch with 2FA, and what it evolved into – multi-factor authentication, or MFA – has always been balancing user convenience and security. That seminal tension still exists today even as the global cybersecurity community is moving to extend MFA as a key security component in much more complex digital systems sp

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT Misconfiguration Leads to 15 Breach Reports

Data Breach Today

Letters From Texas Health Resources Hospitals Mailed to Wrong Recipients A misconfigured billing system that caused a mailing mishap affecting nearly 83,000 individuals has prompted Texas Health Resources to file 15 breach reports to federal regulators - one for each hospital involved.

IT 124
article thumbnail

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

As most of us know, IoT devices are on the rise in enterprise networks. According to McKinsey & Company , the proportion of organizations that use IoT products has grown from 13 percent in 2014 to 25 percent today. That pace is unlikely to slow down over the coming years; Pagely noted that organizations are still turning to IoT devices as a way to automate and optimize their business processes as well as save on energy costs.

IoT 122
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

'Soviet Tactics': Russia Tries Prisoner Swap for Hacker

Data Breach Today

Moscow Reportedly Seeks Leverage as Counter-Extradition Attempts Keep Failing What's the best way to spring your citizens from foreign jail if they've been detained on U.S. hacking charges? That's a question that continues to plague Russia, including in the ongoing case against Aleksey Burkov, who's been charged with being part of a $20 million payment fraud scheme.

113
113

More Trending

article thumbnail

Getting Ready for the NIST Privacy Framework

Data Breach Today

By year's end, the National Institute of Standards and Technology should be ready to publish the first version of its privacy framework, a tool to help organizations identify, assess, manage and communicate about privacy risk, says NIST's Naomi Lefkovitz, who provides implementation insights.

Privacy 113
article thumbnail

Metadata Management, Data Governance and Automation

erwin

Can the 80/20 Rule Be Reversed? erwin released its State of Data Governance Report in February 2018, just a few months before the General Data Protection Regulation (GDPR) took effect. This research showed that the majority of responding organizations weren’t actually prepared for GDPR, nor did they have the understanding, executive support and budget for data governance – although they recognized the importance of it.

Metadata 102
article thumbnail

Alleged Capital One Hacker Released From Prison

Data Breach Today

Paige Thomson Will Stay in Halfway House Until Her 2020 Trial Alleged Capital One hacker Paige A. Thompson has been released from prison and will stay in a halfway house until her trial in federal court next year. Prosecutors allege that Thompson stole over 100 million records from the bank earlier this year.

113
113
article thumbnail

Germany: Berlin data protection authority imposes EUR 14.5 million fine for “data cemetery”

DLA Piper Privacy Matters

On 30 October 2019, the Berlin Commissioner for Data Protection and Freedom of Information ( Berliner Beauftragte für Datenschutz und Informationsfreiheit – “ Berlin DPA ”) imposed an administrative fine of about EUR 14.5 million against Deutsche Wohnen SE for infringements of the General Data Protection Regulation (GDPR). Facts and legal evaluation by Berlin DPA.

GDPR 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Berlin Commissioner Issues Fine to Deutsche Wohnen SE

Hunton Privacy

On November 5, 2019, the Berlin Commissioner for Data Protection and Freedom of Information (“the Berlin Commissioner,” Berliner Beauftragte für Datenschutz und Informationsfreiheit ) announced that it had imposed a fine of €14.5 million (approximately $16 million) on Deutsche Wohnen SE, a prominent real estate company. This is the highest fine issued in Germany since the EU General Data Protection Regulation (“GDPR”) became applicable.

GDPR 79
article thumbnail

The CCPA and Litigation Mitigation: What You Need to Know Before January 1

Data Matters

The California Consumer Privacy Act (CCPA) takes effect in January. Sidley’s seasoned class action practitioners anticipate the CCPA will drive a proliferation of data- and privacy-driven suits, on multiple fronts. This webinar will explore this emerging area in consumer class action litigation and highlight concrete steps businesses can take to mitigate CCPA-related risks.

Privacy 68
article thumbnail

Twitter Insiders Allegedly Spied for Saudi Arabia

WIRED Threat Level

Hackers are one thing. But too few companies take the threat of an inside job seriously enough. .

article thumbnail

University of Rochester Medical Center hit with $3M fine for breaches

Information Management Resources

The University of Rochester Medical Center has been hit with a $3 million settlement fine and a two-year corrective action plan for two technology-related breaches.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Scammers Are Exploiting a Firefox Bug to Freeze Your Browser

WIRED Threat Level

Fraudulent tech-support sites are causing the browser to lock up and display a disturbing message. Force quitting is the only way out.

article thumbnail

Facebook discloses a new leak that exposes group members’ data

Security Affairs

Facebook disclosed a new security incident, the social network giant admitted that app developers may have accessed its group users’ data. Facebook disclosed another security incident, the company revealed that roughly 100 app developers may have improperly accessed users’ data in certain Facebook groups. Let’s understand how it is possible.

Privacy 56
article thumbnail

Representatives Eshoo and Lofgren Introduce Online Privacy Act

Hunton Privacy

On November 5, 2019, Representatives Anna G. Eshoo (CA) and Zoe Lofgren (CA) introduced the Online Privacy Act (the “Act”), which proposes sweeping legislation that would create federal privacy rights for individuals, require companies to adhere to data minimization and establish a federal Digital Privacy Agency (“DPA”). The Act would provide users with a broad panoply of rights with respect to their personal information, including rights to (1) access, correct, delete and transfer their persona

Privacy 54
article thumbnail

Details of an Airbnb Fraud

Schneier on Security

This is a fascinating article about a bait-and-switch Airbnb fraud. The article focuses on one particular group of scammers and how they operate, using the fact that Airbnb as a company doesn't do much to combat fraud on its platform. But I am more interested in how the fraudsters essentially hacked the complex sociotechnical system that is Airbnb. The whole article is worth reading.

IT 53
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Accounting Scams Continue to Bilk Businesses

Dark Reading

Yes, ransomware is plaguing businesses and government organizations, but impersonators inserting themselves into financial workflows - most often via e-mail - continue to enable big paydays.

article thumbnail

Brooklyn Hospital lost patient records after a ransomware infection

Security Affairs

Another organization in the healthcare industry was a victim of a Ransomware attack, this time the victim is Brooklyn Hospital. A ransomware attack has infected several computer systems at the Brooklyn Hospital Center in New York, the organization permanently lost patient data. The patient records encrypted in the attack include names and certain dental or cardiac images.

article thumbnail

Pixel 1, RIP: Google Ends Support After Just Three Years

WIRED Threat Level

The original Google Pixel didn't make the cut for this month's Android security patches. .

article thumbnail

Great Scott! A True Story Illustrating the Importance of Ethics in Privacy and Records Management

Information Governance Perspectives

Truth is stranger than fiction… There’s a memorable scene in Back to the Future 3 where Marty receives a Western Union telegraph from Doc almost a century after it was originally mailed, warning him of events to come. Seems an unlikely possibility that any organization would honor such a request to preserve, protect and deliver documents Continue reading.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Facebook Privacy Breach: 100 Developers Improperly Accessed Data

Threatpost

Facebook said that 100+ third-party app developers had access to restricted data for members of Groups, in its latest privacy snafu.

Access 54
article thumbnail

The Uphill Battle of Triaging Alerts

Dark Reading

Prioritizing alerts is foundational to security, but almost every organization struggles to manage this process efficiently. Here's what you can do about it.

article thumbnail

Google Analytics Emerges as a Phishing Tool

Threatpost

Web analytics help phishers hone their attacks -- but website defenders can also use these tactics to better detect the scope of attacks and mitigate their effects.

article thumbnail

Social Media: Corporate Cyber Espionage's Channel of Choice

Dark Reading

Proactive defense and automation can help your company deal with scale and prioritize risks in order to more efficiently fight cyber espionage.

Risk 51
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Emotet Resurgence Continues With New Tactics, Techniques and Procedures

Threatpost

Since Emotet came out of hibernation last month, researchers are seeing the banking trojan's authors take on a consistent trend of new evasion tactics and social engineering techniques.

42
article thumbnail

Google Enlists Outside Help to Clean Up Android's Malware Mess

WIRED Threat Level

The newly formed App Defense Alliance will try to solve a malware problem that has bedeviled the Play Store since inception.

article thumbnail

You’ve Been Served…with Subpoena-Themed Phishing Emails

Threatpost

A targeted campaign is delivering an information-stealing malware called Predator the Thief.