Tue.Dec 10, 2019

article thumbnail

GDPR Violation: German Privacy Regulator Fines 1&1 Telecom

Data Breach Today

$11 Million Fine for Authentication Shortcomings at Telecommunications Provider One of the largest fines to date for violating the EU's General Data Protection Regulation has been announced by Germany's federal privacy and data protection watchdog, the BfDI, against 1 & 1 Telecommunications, in part for inadequate authentication mechanisms. The company plans to appeal.

Privacy 204
article thumbnail

Patch Tuesday, December 2019 Edition

Krebs on Security

Microsoft today released updates to plug three dozen security holes in its Windows operating system and other software. The patches include fixes for seven critical bugs — those that can be exploited by malware or miscreants to take control over a Windows system with no help from users — as well as another flaw in most versions of Windows that is already being exploited in active attacks.

Libraries 146
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

City of Pensacola Recovering From Ransomware Attack

Data Breach Today

FBI: Incident Doesn't Appear Related to Last Week's Naval Air Base Shooting The city of Pensacola, Florida, on Tuesday was still recovering from a Saturday ransomware attack that occurred just one day after a shooting incident at Naval Air Station Pensacola. But the FBI reports that it has not identified a connection between the incidents.

article thumbnail

CISO Magazine Honors KrebsOnSecurity

Krebs on Security

CISO Magazine , a publication dedicated to covering issues near and dear to corporate chief information security officers everywhere, has graciously awarded this author the designation of “ Cybersecurity Person of the Year ” in its December 2019 issue. KrebsOnSecurity is grateful for the unexpected honor. But I can definitely think of quite a few people who are far more deserving of this title.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Decryptor Bug Means Ryuk Victims Stuck in Ransomware Rut

Data Breach Today

Emsisoft Tool Can Fix Ineffective Attacker-Supplied Decryption - But Back Up the Files Emsisoft has spotted a buggy decryptor for the Ryuk ransomware and developed a custom tool to fix it. But victims will still have to pay the ransom to recover files.

More Trending

article thumbnail

Vietnamese APT Group Targets BMW, Hyundai: Report

Data Breach Today

APT32/OceanLotus Suspected in Espionage Incident Hackers suspected to be based in Vietnam compromised the network of German automaker BMW to attempt industrial espionage, according to German media outlet Bayerischer Rundfunk. The attackers also apparently targeted South Korea's Hyundai, according to the report.

147
147
article thumbnail

Welcome to the era of the industrial cloud

OpenText Information Management

The industrial Internet of Things (IIoT) is having a profound effect on how manufacturing organizations share information. The explosion in connected industrial equipment means that companies have to think about how they archive sensor-based information coming from these devices, how they securely move this sensor data from one location to another, and how they derive … The post Welcome to the era of the industrial cloud appeared first on OpenText Blogs.

Cloud 114
article thumbnail

Quantum-Proof Cryptography: What Role Will It Play?

Data Breach Today

CISOs need to begin investigating the use of quantum-proof cryptography to ensure security is maintained when extremely powerful quantum computers that can crack current encryption are implemented, says Professor Alexander Ling, principal investigator at the Center for Quantum Technologies in Singapore.

IT 145
article thumbnail

This Alleged Bitcoin Scam Looked a Lot Like a Pyramid Scheme

WIRED Threat Level

Five men face federal charges of bilking investors of $722 million by inviting them to buy shares in bitcoin mining pools. .

Mining 121
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Catches of the month: Phishing scams for December 2019

IT Governance

Want to stay up to date on phishing scams ? Our ‘catches of the month’ feature reviews the most prominent attacks across the web, explaining how they occurred and the steps you should take to stay safe. This month, we bring you a multimillion-dollar BEC (business email compromise) scam and look back on Black Friday, in which cyber criminals looked to capitalise on our eagerness to find great deals.

article thumbnail

City of Pensacola Hit By Cyberattack Following Shooting

Adam Levin

Pensacola, FL was hit by a cyberattack in the wake of what has been described as a terrorist shooting. “The city of Pensacola is experiencing a cyberattack that began this weekend that is impacting our city network, including phones and email at City Hall and some of our other buildings,” said Mayor Grover Robinson. . The cyberattack began early Saturday morning days after a shooting at the nearby Pensacola Naval Air Station that left four dead and eight wounded.

article thumbnail

More than 44 million Microsoft user accounts are exposed to hack

Security Affairs

Microsoft revealed that 44 million Microsoft Azure AD and Microsoft Services accounts were vulnerable to account hijacking. Microsoft discovered that 44 million Microsoft Azure AD and Microsoft Services accounts were vulnerable to account hijacking because of using of compromised passwords. Experts from the Microsoft threat research team analyzed a database containing 3 billion leaked credentials from different security breaches. “The Microsoft identity threat research team checks billions

article thumbnail

3 steps to effective data classification for business-ready data

IBM Big Data Hub

Global data privacy compliance regulations like the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) a nd Brazil’s LGPD have created scrutiny around personal, customer and employee data.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Introducing the Information Advantage

OpenText Information Management

Technology. Information. Disruption. The world is moving faster than ever before at unprecedented scale. Businesses today are operating in the next industrial revolution, and the rules have changed. This is Industry 4.0. It is imposing new demands on the enterprise—and creating new opportunities. The Five Industrial Revolutions Industry 0.0 spans most of human history.

IT 65
article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

There has been a spike in 2019 of targeted cyberattacks against Asia-based fund managers, especially those in a startup phase of business. Regulators worldwide, including the Securities and Futures Commission of Hong Kong, have issued guidelines for reducing and mitigating hacking risks. This post summarizes the practical measures that may be adopted to protect your firm against cyberattacks and the keys to successful crisis management in the event that an unauthorized data breach occurs.

article thumbnail

NordVPN announced the launch of a bug bounty program

Security Affairs

The popular virtual private network (VPN) service provider NordVPN announced the launch of a public bug bounty program. The virtual private network (VPN) service provider NordVPN announced the launch of a public bug bounty program. White hat hackers will receive payouts between $100 and $5,000 for each reported vulnerability. NordVPN will also pay much more “for especially clever or severe” vulnerabilities.

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

There has been a spike in 2019 of targeted cyberattacks against Asia-based fund managers, especially those in a startup phase of business. Regulators worldwide, including the Securities and Futures Commission of Hong Kong, have issued guidelines for reducing and mitigating hacking risks. This post summarizes the practical measures that may be adopted to protect your firm against cyberattacks and the keys to successful crisis management in the event that an unauthorized data breach occurs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Tales from the archive BT (episode 2)

Preservica

Anne Archer is the Heritage Collections Manager at BT , a leading British multinational telecommunications holding company headquartered in London with operations in around 180 countries and the largest provider of fixed-line, broadband and mobile services in the UK. In this second episode we hear from Anne on how the BT archives are supporting the wider organisation.

article thumbnail

TORA Trading is bullish on data analytics and reporting solution from OpenText

OpenText Information Management

Offering an enduring piece of financial advice, Benjamin Franklin once wrote, “An investment in knowledge pays the best interest.” This bit of wisdom still applies to companies today, but many organizations struggle to access and leverage the valuable knowledge in their business data. That knowledge can drive smart, strategic decisions, but overwhelming amounts of data … The post TORA Trading is bullish on data analytics and reporting solution from OpenText appeared first on OpenText Blogs

article thumbnail

10 top business intelligence and analytics trends for 2020

Information Management Resources

Here are 10 top business intelligence trends that will disrupt the industry in 2020 - from data quality management to data discovery, artificial intelligence and collaborative BI.

article thumbnail

City of Pensacola hit by a cyberattack few days after military base shooting

Security Affairs

The city of Pensacola, Florida, had been hit by a cyberattack , just days after a Saudi officer killed three American sailors at the city’s naval base. The city of Pensacola has been hit by a cyber attack over the weekend, the incident took place around 1:30 a.m. on Saturday. City IT staff has been working to restore the network, but some services are still down.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Security 101: What Is a Man-in-the-Middle Attack?

Dark Reading

A breakdown of the common ways criminals employ MitM techniques to snare victims, and tips for protecting users from these dirty tricks.

article thumbnail

Download: The 2020 Cybersecurity Salary Survey Results

Threatpost

Today you can access the aggregated and analyzed 2020 Cybersecurity Salary Survey Results and gain insight into the main ranges and factors of current cybersecurity salaries.

article thumbnail

Data Leak Week: Billions of Sensitive Files Exposed Online

Dark Reading

A total of 2.7 billion email addresses, 1 billion email account passwords, and nearly 800,000 applications for copies of birth certificate were found on unsecured cloud buckets.

article thumbnail

Adobe Patch Tuesday addresses critical flaws in four products

Security Affairs

Adobe released the Patch Tuesday security updates for December 2019 that address flaws in Acrobat and Reader, Photoshop CC, ColdFusion, and Brackets. Adobe Patch Tuesday security updates for December 2019 address a total of 25 flaws in Acrobat and Reader, Photoshop CC, ColdFusion, and Brackets. “Adobe has published security bulletins for Adobe Acrobat and Reader ( APSB19-55 ), Adobe Photoshop ( APSB19-56 ), Brackets ( APSB19-57 ) and Adobe ColdFusion ( APSB19-58 ).

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hackers Can Mess With Voltages to Steal Intel Chips' Secrets

WIRED Threat Level

A new attack called Plundervolt gives attackers access to the sensitive data stored in a processor's secure enclave.

Access 73
article thumbnail

Advance notice of increase to Professional Registration fees

CILIP

Advance notice of increase to Professional Registration fees. On 1st Feb 2020 there will be a modest increase in Professional Registration fees. We need to raise the fees to reflect rising costs and to ensure that the assessments conducted by the Board maintain rigorous standards. The increase covers the cost of our external quality assurance with the Scottish Qualifications Agency (SQA), which guarantees to candidates and their employers that Professional Registration provides quality assured r

52
article thumbnail

AIIM Announces New Board of Directors

Info Source

Five new directors elected by members of the association. December 9, 2019, Silver Spring, MD — The Association for Intelligent Information Management ( AIIM ), announces the election of five new board members following its Annual Meeting held in December in Silver Spring, Maryland. The following directors will serve on the AIIM Board of Directors beginning January 1, 2020 through December 31, 2022: Ron Cameron, KnowledgeLake.