Thu.Feb 06, 2020

article thumbnail

Phishing Personified

Dark Reading

What makes these scams so completely obvious in the physical form?

article thumbnail

After the Iowa Caucus Meltdown, New Hampshire Says It’s Ready

WIRED Threat Level

The nation’s first primary is proudly low-tech, but it'll take more than paper ballots to defuse the disinformation threat.

Paper 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SEC Publishes Cybersecurity and Resiliency Observations Report

Data Matters

The U.S. Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) released a report on Cybersecurity and Resiliency Observations based on practices seen in prior exams. OCIE published the overview of practices to help market participants when considering “how to enhance cybersecurity preparedness and operational resiliency,” while acknowledging that there is not a “one-size fits all” approach.

article thumbnail

Fraudsters Pose as Journalist in Phishing Campaign: Report

Data Breach Today

Inquiry Posing Interview Questions Designed to Steal Credentials In a recently discovered phishing campaign, hackers attempted to steal victims' passwords and credentials by posing as a former Wall Street Journal reporter and sending documents with potential interview questions, according to security firm Certfa.

Phishing 266
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Hacking Wi-Fi networks by exploiting a flaw in Philips Smart Light Bulbs

Security Affairs

Check Point experts discovered a high-severity flaw in Philips Hue Smart Light Bulbs that can be exploited to gain entry into a targeted WiFi network. Security experts from Check Point discovered a high-severity flaw ( CVE-2020-6007 ) in Philips Hue Smart Light Bulbs that can be exploited by hackers to gain entry into a targeted WiFi network. Lightbulbs could be remotely controlled through a mobile app or via a digital home assistant, owners could control the light in the environment and even

IoT 127

More Trending

article thumbnail

The coronavirus outbreak is being used to spread malware

IT Governance

Cyber criminals are exploiting the public’s fear of the Wuhan in a new phishing scam , researchers have learned. Experts at IBM discovered a spate of phishing emails being sent to Japanese citizens, asking them to open an attached Word document supposedly containing details of infections in the country’s main island. The email reads: Department of Health Services.

Phishing 121
article thumbnail

Breach Report: Sometimes, Encryption Is Still Overlooked

Data Breach Today

Stolen Laptop Contained Patient Data on Thousands Just when you thought the days of big data breaches tied to stolen unencrypted laptops were over comes news of an incident in Oregon affecting hundreds of thousands. What happened this time?

article thumbnail

[Podcast] How to Conduct a Proof of Concept

AIIM

Reaching your Digital Transformation goals often requires the addition of new software solutions. But, shopping around for software can be a challenge. How are organizations expected to fully assess the precision of one software system/solution and compare it to another? Are we expected to become experts on each option? In our personal lives, when we shop for something like a new pair of shoes, we try on different brands and sizes to see what fits best for our needs.

article thumbnail

To Combat Rogue AI, Facebook Pitches 'Radioactive Data'

Data Breach Today

Move Appears to Be Aimed at Big Data-Scraping Firms Such as Clearview AI Facebook scientists have proposed using "radioactive data" watermarks to identify when online images get used to train neural networks. The proposal appears to be aimed at the rise of big data startups, such as Clearview AI, that are scraping publicly available photographs to create facial recognition tools.

Big data 147
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Challenge of Bias in AI – Creating Ethical Guidelines

Thales Cloud Protection & Licensing

Artificial intelligence (AI) is becoming increasingly integral to information security. From the multitude of ways AI is used in business to creating smart cities and safeguarding transportation , AI impacts nearly every aspect of our lives. In fact, in its Reinventing Cybersecurity with Artificial Intelligence report , Capgemini found that 61% of respondents said they can no longer detect data breach attempts without the help of AI.

article thumbnail

Coronavirus: How to Plan and Protect

Data Breach Today

The coronavirus statistics are dizzying - as of Thursday, there were more than 28,000 infections and about 560 deaths. But the key stat to watch is the mortality rate, currently 2 percent, says pandemic expert Regina Phelps. How that number changes will dictate how business continuity leaders must respond.

149
149
article thumbnail

Weekly Update 177

Troy Hunt

I've got audio! Ok, so I cheated a bit in terms of recording back in the home office, but the plugs I need to make the Zoom H6 work the way it should (and yeah, I know I said "Rode" H6 in the vid, sorry!) are on the way and hopefully they'll be all good for next week when I'm in Sydney. I'm talking about that trip in this week's update along with the Chrome 80 changes to SameSite cookies not that its hit, the Adult FriendFinder breach and then recapping on a heap of the week's news in tweets.

Access 103
article thumbnail

cdpwn – Millions of devices at risk due to flaws in implementations of Cisco Discovery Protocol (CDP)

Security Affairs

A set of vulnerabilities in the Cisco Discovery Protocol (CDP) exposes tens of millions of devices to the risk of cyber attacks. Researchers at IoT security firm Armis discovered a set of five serious vulnerabilities in the implementation of the Cisco Discovery Protocol (CDP) protocol. The experts tracked the set as CDPwn and warned that the issues could be exploited by attackers to take complete control of vulnerable devices. “ Armis has discovered five critical, zero-day vulnerabilities

Risk 101
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Web browsing histories are being given to Australian police under data retention powers

The Guardian Data Protection

Ombudsman says ‘greyness’ in metadata definition must be examined as the practice is excluded in legislation Law enforcement agencies are being provided with the web browsing histories of people under investigation using mandatory data retention powers, despite the federal government specifically excluding that practice in the legislation, the commonwealth ombudsman has warned.

article thumbnail

How prepared is your IT department for the next legal hold?

OpenText Information Management

Organizations deal with lawsuits all the time – from workplace discrimination, overtime pay, customer injuries sustained on-premises, intellectual property, contracts and more. When litigation looms, organizations have a duty to identify and preserve relevant data that may be evidence to the specific litigation. The purpose is to avoid the intentional or inadvertent destruction of relevant … The post How prepared is your IT department for the next legal hold?

IT 90
article thumbnail

RSAC Sets Finalists for Innovation Sandbox

Dark Reading

The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.

article thumbnail

The Information Opportunity

OpenText Information Management

The Digital Era is over. We have entered the Information Era. Technological Progress—The Information Era Building on the groundwork of automation, connectivity and computing power that defined digital, the Information Era is characterized by our unprecedented ability to capture, store and make sense of masses of information. By next year, humans will have accumulated around … The post The Information Opportunity appeared first on OpenText Blogs.

90
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

U.S. Finance Sector Hit with Targeted Backdoor Campaign

Threatpost

The powerful Minebridge backdoor gives cyberattackers full run of a victim's machine.

Security 104
article thumbnail

How Can We Make Election Technology Secure?

Dark Reading

In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well.

article thumbnail

SEC Releases Cybersecurity and Resiliency Observations: A Potentially Useful Guide for Businesses

HL Chronicle of Data Protection

In today’s connected world, businesses face constant pressure to improve their cybersecurity practices and to confirm that they are meeting industry standards. To continue helping businesses achieve those goals, the SEC Office of Compliance Inspections and Examination (OCIE) published on January 27 its latest Examination Observations related to cybersecurity and operational resiliency practices.

article thumbnail

A New Clue for the Kryptos Sculpture

Schneier on Security

Jim Sanborn, who designed the Kryptos sculpture in a CIA courtyard, has released another clue to the still-unsolved part 4. I think he's getting tired of waiting. Did we mention Mr. Sanborn is 74? Holding on to one of the world's most enticing secrets can be stressful. Some would-be codebreakers have appeared at his home. Many felt they had solved the puzzle, and wanted to check with Mr.

IT 94
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

90% of CISOs Would Cut Pay for Better Work-Life Balance

Dark Reading

Businesses receive $30,000 of 'free' CISO time as security leaders report job-related stress taking a toll on their health and relationships.

article thumbnail

Brexit impact on privacy

Privacy and Cybersecurity Law

On Friday, January 31, 2020, the United Kingdom (UK) left the European Union (EU) after 47 years as part of the union. While the UK has ceased to be part of the EU when the clock struck midnight in Brussels, the UK and EU have agreed to a transition period until the end of 2020, to allow the UK to continue its current relationship with the EU, while future trading relationships are negotiated.

Privacy 59
article thumbnail

Charming Kitten Uses Fake Interview Requests to Target Public Figures

Threatpost

APT group poses as a former Wall Street Journal journalist to launch phishing campaigns and steal victim email account details.

article thumbnail

Brexit impact on privacy

Privacy and Cybersecurity Law

On Friday, January 31, 2020, the United Kingdom (UK) left the European Union (EU) after 47 years as part of the union. While the UK has ceased to be part of the EU when the clock struck midnight in Brussels, the UK and EU have agreed to a transition period until the end of 2020, to allow the UK to continue its current relationship with the EU, while future trading relationships are negotiated.

Privacy 59
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Demand for big data-as-a-service growing at 25% annually

Information Management Resources

With big data-as-a-service, tools such as analytics software and storage are delivered via the cloud by a service provider.

article thumbnail

Preservica appoints new Advisory Council to help steer next stage of growth

Preservica

Oxford, UK; Boston, MA February 6, 2020 : Preservica, the market leader in SaaS active digital preservation, is pleased to announce the formation of a new Advisory Council of experienced senior executives. The Council will provide industry, regulatory, information management and technological guidance to the Preservica management team and Board of Directors to support the business in further extending its leadership position and continuing to deliver innovative, best-of-breed digital preservatio

article thumbnail

What Does TechTownPDX Membership Mean to Us?

Zapproved

We are proud to be part of TechTownPDX, an organization dedicated to fostering diverse and inclusive companies that offer opportunities to all. The post What Does TechTownPDX Membership Mean to Us? appeared first on Zapproved.

52