Tue.Nov 08, 2022

article thumbnail

CFPB Begins Rulemaking on Data Access and Portability

Data Matters

The Consumer Financial Protection Bureau (CFPB) on October 27, 2022 took the long-anticipated first step to issue a regulation implementing Section 1033 of the Dodd-Frank Wall Street Reform and Consumer Protection Act. [1] This followed a preview by CFPB Director Rohit Chopra at the Money 20/20 conference on October 25 in which he outlined the “CFPB’s new approach to regulation,” which is designed to create “catalysts for more competition.

Access 103
article thumbnail

Who is Extorting Australian Health Insurer Medibank?

Data Breach Today

A Ransomware Group Has Given Medibank 24 Hours to Pay. But Medibank Says it Won't. Who is attempting to extort Australian health insurer Medibank, why did Medibank tell its attackers it wouldn't pay a ransom and will this deter future cyber extortionists? Here are a few thoughts on the high cybercrime drama playing out.

Insurance 258
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Patch Tuesday, November 2022 Election Edition

Krebs on Security

Let’s face it: Having “2022 election” in the headline above is probably the only reason anyone might read this story today. Still, while most of us here in the United States are anxiously awaiting the results of how well we’ve patched our Democracy, it seems fitting that Microsoft Corp. today released gobs of security patches for its ubiquitous Windows operating systems.

Security 195
article thumbnail

Feds Warn of Iranian Threats to Healthcare Sector

Data Breach Today

Tehran Hackers Use Social Engineering to Close Sophistication Gap The healthcare industry should be aware of Iranian hackers using social engineering techniques, says the U.S. federal government. Hackers sponsored by Tehran layer on the social media deception, warns the Department of Health and Human Services' Health Sector Cybersecurity Coordinating Center.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Indonesia Ratifies Country’s First Comprehensive Legal Framework for Personal Data Protection

Hunton Privacy

SHIFT Counsellors at Law reports from Indonesia that The People’s Representative Council of the Republic of Indonesia has ratified Indonesia’s draft law on personal data protection. The draft law came into effect on October 17, 2022. The law, which is partly modeled on the EU General Data Protection Regulation, is Indonesia’s first “umbrella regulation” on personal data protection.

More Trending

article thumbnail

The Big Scoops from Microsoft Ignite 2022

Daymark

Microsoft’s Ignite Conference was back to a face-to-face event his year in Seattle, Washington. The Daymark Solutions team was there soaking up the latest Microsoft has to offer and absorbing what’s in the works for the year ahead. This year’s conference theme of “doing more with less” spoke to the immense value of Microsoft’s product portfolio. From Power Platform’s low-code/no-code improvements to a host of new solutions under the Microsoft Entra, Purview and Viva umbrellas, doing more with le

Security 105
article thumbnail

EU Complicit In Spread of Advanced Spyware, Charges Veld

Data Breach Today

PEGA Committee Rapporteur Sophie In ‘t Veld Calls for Spyware Moratorium A Dutch member of the European Parliament accused the European Union of weakness in the face of a threat to democracy posed by advanced spyware apps such as the NSO Group's Pegasus. Sophie in ’t Veld called for a moratorium on such apps and for a supranational crackdown.

130
130
article thumbnail

Understanding IP: What Is It and Why It’s Important For Your Enterprise

Hanzo Learning Center

Your company’s intellectual property (IP) is its most valuable asset—but are you doing enough to protect it? If someone challenges your ownership, will you be ready and able to respond quickly and decisively with proof that your team developed an idea, design, or process?

IT 98
article thumbnail

Using Wi-FI to See through Walls

Schneier on Security

This technique measures device response time to determine distance: The scientists tested the exploit by modifying an off-the-shelf drone to create a flying scanning device, the Wi-Peep. The robotic aircraft sends several messages to each device as it flies around, establishing the positions of devices in each room. A thief using the drone could find vulnerable areas in a home or office by checking for the absence of security cameras and other signs that a room is monitored or occupied.

Paper 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Keeping an ‘AI’ on your data: UK data regulator recommends lawful methods of using personal information and artificial intelligence

DLA Piper Privacy Matters

Authors: Jules Toynton , Coran Darling. Data is often the fuel that powers AI used by organisations. It tailors search parameters, spots behavioural trends, and predicts future possible outcomes (to highlight a just a few uses). In response, many of these organisations seek to accumulate and use as much data as possible, in order to make their systems work that little bit faster or more accurately.

article thumbnail

Citrix ADC and Citrix Gateway are affected by a critical authentication bypass flaw

Security Affairs

Citrix released security updates to address a critical authentication bypass vulnerability in Citrix ADC and Citrix Gateway. Citrix is urging customers to install security updates to address a critical authentication bypass issue, tracked as CVE-2022-27510, in Citrix ADC and Citrix Gateway. The company addressed the following three vulnerabilities: CVE-2022-27510 – The flaw is an authentication bypass using an alternate path or channel, an attacker can trigger it to gain unauthorized acces

article thumbnail

Microsoft Quashes Bevy of Actively Exploited Zero-Days for November Patch Tuesday

Dark Reading

Long-awaited security fixes for ProxyNotShell and Mark of the Web bypasses are part of a glut of actively exploited zero-day vulnerabilities and other critical flaws that admins need to prioritize in the coming hours.

article thumbnail

Victorians’ Covid contact tracing data sent to crime authority for potential use by Palantir

The Guardian Data Protection

Exclusive: Australian data security experts described the July 2020 move as ‘dubious’ and ‘outrageous’ Get our morning and afternoon news emails , free app or daily news podcast Under pressure to control spiralling Covid cases in July 2020, the Victorian government sent contact tracing data to the Australian Criminal Intelligence Commission in the hope a controversial data mining platform might help identify the source of mystery cases.

Mining 95
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

SmokeLoader campaign distributes new Laplas Clipper malware

Security Affairs

Researchers observed a SmokeLoader campaign that is distributing a new clipper malware dubbed Laplas Clipper that targets cryptocurrency users. Cyble researchers uncovered a SmokeLoader campaign that is distributing community malware, such as SystemBC and Raccoon Stealer 2.0 , along with a new clipper malware tracked as Laplas. The experts detected more than 180 different samples of the clipper malware in the last two weeks, a circumstance that confirms that the threat has been widely deployed

IT 89
article thumbnail

PhishER Turns Golden Hour Into Golden Minute

KnowBe4

Hospital emergency rooms around the world are fine-tuned to meet the requirements of the “Golden Hour”. The Golden Hour is a well-accepted medical fact that critically injured or ill patients fare far better when they are assessed, transported, and appropriately treated in an Emergency Room within 1-hour of their first complaint. Every minute past 60 minutes increases the odds of a more negative outcome for the patient.

article thumbnail

Medibank confirms ransomware attack impacting 9.7M customers, but doesn’t pay the ransom

Security Affairs

Australian health insurer Medibank confirmed that personal data belonging to around 9.7 million current and former customers were exposed as a result of a ransomware attack. Medibank announced that personal data belonging to around 9.7M of current and former customers were exposed as a result of a recent ransomware attack. Medibank is one of the largest Australian private health insurance providers with approximately 3.9 million customers. “Based on our investigation to date into this cybe

article thumbnail

How to Use Apple Pay or Google Pay Instead of Plastic Cards

WIRED Threat Level

Cash is safe—for now. Contactless payment methods, like Apple Pay or Google Wallet, are more of a threat to the existence of physical cards.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Extortion Economics: Ransomware's New Business Model

Dark Reading

Ransomware-as-a-service lowers the barriers to entry, hides attackers’ identities, and creates multitier, specialized roles in service of ill-gotten gains.

article thumbnail

Dark commercial patterns via the OECD

IG Guru

There is mounting concern that dark commercial patterns may cause substantial consumer detriment. These practices are commonly found in online user interfaces and steer, deceive, coerce, or manipulate consumers into making choices that often are not in their best interests. This report proposes a working definition of dark commercial patterns, sets out evidence of their […].

Privacy 68
article thumbnail

Retail Sector Prepares for Annual Holiday Cybercrime Onslaught

Dark Reading

Retailers and hospitality companies expect to battle credential harvesting, phishing, bots, and various malware variants.

Retail 99
article thumbnail

How communications can fuel a customer-centric culture

OpenText Information Management

Culture eats strategy for breakfast – or does it? The famous quote from management consultant Peter Drucker is often debated in corporate circles. But the role of communications in achieving both strategic and customer experience objectives cannot be overlooked. Communications is at the heart of workplace culture and change. Muriel Rukeyser was onto something when … The post How communications can fuel a customer-centric culture appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cyber.org Range Offers Cybersecurity Job Paths for K-12 Students

Dark Reading

The classroom-based curriculum addresses the cybersecurity workforce gap with free training labs and virtual cyberattack environments to hone the skills of the next generation of talent.

article thumbnail

A holistic approach to security: Threat Prevention and Remediation

Jamf

Jamf endpoint security and mobile threat defense solutions offer detection, prevention and remediation capabilities that extend protections across your entire desktop and mobile fleet, protecting devices and empowering users while keeping data secure and maintaining privacy.

article thumbnail

It's Time to See Cybersecurity Regulation as a Friend, Not a Foe

Dark Reading

There's real value in having a better perspective around future regulation and compliance requirements.

article thumbnail

Inside the ‘Election Integrity App’ Built to Purge US Voter Rolls

WIRED Threat Level

True the Vote’s IV3 app is meant to catch election cheaters. But it has a fundamental flaw.

IT 65
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Instagram Star Gets 11 Years for Cybercrimes Used to Fund His Lavish Lifestyle

Dark Reading

Prolific online scammer and social media influencer 'Hushpuppi' sentenced for bank cyber heists, BEC campaigns, money laundering, and more.

74
article thumbnail

The Art of War

Unwritten Record

Still from US ARMY ARTISTS, 111-LC-55581. ABOUT THE FILM. Working in the Special Media Division at the National Archives, we are used to seeing images of war captured by moving images and still photos. However, the US military also uses more traditional forms of artwork to document their operations and daily lives. All military branches employ soldier and civilian artists who work in traditional mediums such as watercolor, charcoal, pastels, and pen and ink to document operations and inform the

article thumbnail

Confidence in Data Recovery Tools Low

Dark Reading

IT practitioners are developing ransomware response plans, but many of them are not confident in their data resiliency tools.