Fri.Sep 04, 2020

article thumbnail

The Risks Posed by Mobile Health Apps

Data Breach Today

What privacy and security issues are raised by patients using smartphone apps to access health records? Attorney Helen Oscislawski and security expert Jarrett Kolthoff offer an analysis.

Risk 352
article thumbnail

U.S. Department of Defense discloses details about critical and high severity issues

Security Affairs

The U.S. Department of Defense has disclosed the details about four critical and high severity vulnerabilities in its infrastructure. The U.S. Department of Defense has disclosed details of four vulnerabilities in its infrastructure, two high severity rating issues and other two critical flaws. The vulnerabilities could be exploited by threat actors to hijack a subdomain, execute arbitrary code remotely, or view files on the vulnerable system.

Phishing 129
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tracking the Targets of 'Cybersquatting' Attacks

Data Breach Today

Users of Financial and Ecommerce Websites Are Frequent Victims So-called "cybersquatting" attacks are surging, with financial and ecommerce websites - including those of PayPal, Royal Bank of Canada, Bank of America and Amazon - among the most frequent targets, according to Palo Alto Networks' Unit 42.

334
334
article thumbnail

SunCrypt Ransomware behind North Carolina school district data breach

Security Affairs

A school district in North Carolina disclosed a data breach after having unencrypted files stolen during a SunCrypt Ransomware attack. The Haywood County School district in North Carolina has suffered a data breach after having unencrypted files stolen during a SunCrypt Ransomware attack. The ransomware attack took place on August 24th, 2020, but at the time the family of malware that infected the school district was not revealed.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

US Agencies Must Create Vulnerability Disclosure Policies

Data Breach Today

CISA Orders Departments to Create Disclosure Programs by March 2021 The U.S. Cybersecurity and Infrastructure Security Agency is ordering most executive branch agencies and departments to create vulnerability disclosure programs by March 2021. Some agencies, such as the Pentagon, already have robust programs in place.

More Trending

article thumbnail

'Salfram' Email Campaign Spreads Malware to Businesses

Data Breach Today

Attackers User Specialized Crypter to Hide Malicious Code A recently uncovered malicious email campaign is delivering to businesses multiple types of malware, including a Trojan designed to steal banking credentials and other financial information, according to a research report from Cisco Talos.

255
255
article thumbnail

WhatsApp Discloses 6 Bugs via Dedicated Security Site

Threatpost

The company committed to more transparency about app flaws, with an advisory page aimed at keeping the community better informed of security vulnerabilities.

Security 121
article thumbnail

Data Breach Reports Fall 45% in UK

Data Breach Today

Are Organizations Failing to Spot Breaches, or to Report Them, as Required by GDPR? The number of cybersecurity incidents reported to the U.K.'s data privacy watchdog has continued to decline, recently plummeting by nearly 40%. But is the quantity of data breaches going down, or might organizations be failing to spot them or potentially even covering them up?

article thumbnail

Attackers Steal Outlook Credentials Via Overlay Screens on Legitimate Sites

Threatpost

A phishing campaign uses overlay screens and email 'quarantine' policies to steal targets' Microsoft Outlook credentials.

Phishing 135
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Need to Modernize Fraud-Fighting Methods

Data Breach Today

Breach Clarity's Al Pascual on Keeping Pace With Emerging Risks Fraud prevention practices are not keeping up with changes in risks, says Al Pascual, COO at Breach Clarity, who offers insights on leveraging the latest tools.

Risk 200
article thumbnail

Creepy ‘Geofence’ Finds Anyone Who Went Near a Crime Scene

WIRED Threat Level

Police increasingly ask Google and other tech firms for data about who was where, when. Two judges ruled the investigative tool invalid in a Chicago case.

Security 117
article thumbnail

Equifax Breach: CISO Describes Lessons Learned

Data Breach Today

The latest edition of the ISMG Security Report features a discusssion with Equifax CISO, Jamil Farshchi, on the lessons learned from the credit reporting firm's massive data breach three years ago. Also featured: Australians' driver's licenses leaked; privileged access management tips.

article thumbnail

How Cybercriminals Take the Fun Out of Gaming

Dark Reading

It's all fun and games until someone loses their V-Bucks, right? Here's how cyberattackers are cheating the gaming biz -- and winning big.

IT 120
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

NSA Mass Surveillance Program Is Ruled Illegal

Adam Levin

The controversial collection of details on billions of American phone calls by the National Security Agency (NSA) was illegal and possibly unconstitutional, according to a ruling by a federal appeals court. Under the NSA program, information and metadata from calls placed by U.S. citizens were collected in bulk and screened for possible connections to terrorist activity.

Metadata 104
article thumbnail

Ad Fraud: The Multibillion-Dollar Cybercrime CISOs Might Overlook

Dark Reading

Marketing officers may have accepted ad fraud as a cost of doing business, but infosec pros take heed -- fraud can be a step to more significant attacks. Here's what to know and how to take action.

article thumbnail

FRANCE: NEW GUIDANCE FOR DATA RETENTION

DLA Piper Privacy Matters

By Denise Lebeau-Marianna – Partner and Yaël Hirsch – Senior Associate. The French Supervisory Authority (the “ CNIL ”) has issued new updated guidelines on data retention during the month of July (the “ CNIL’s Guidelines ”) [1]. They provide more practical guidance and update the CNIL previous Recommendations dated 11 October 2005 on the conditions of archiving personal data [2].

article thumbnail

Facebook Debuts Third-Party Vulnerability Disclosure Policy

Threatpost

If the social-media behemoth finds a bug in another platform's code, the project has 90 days to remediate before Facebook goes public.

Security 107
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Weekly Update 207

Troy Hunt

I kicked off a little bit earlier on this one in order to wrap up before the Burning Minds keynote, and it's interesting to see just how much difference that little sliver of sunlight makes to the video quality. Check the very start of the video versus the very end; this is the sunset slipping through the crack in the fully drawn blinds, make a massive difference.

article thumbnail

Vulnerability Disclosure: Ethical Hackers Seek Best Practices

Threatpost

Cybersecurity researchers Brian Gorenc and Dustin Childs talk about the biggest vulnerability disclosure challenges in IoT and the industrial vertical.

IoT 86
article thumbnail

Building resilient digital supply chains in Japanese auto and manufacturing

OpenText Information Management

For decades, the Japanese automotive and manufacturing industries have been the envy of the world. They have exported production models that companies globally have copied. But things are changing. Even before the COVID-19 pandemic, the cracks were beginning to appear. Japanese automakers’ dominance was being eroded by competitors from Germany and elsewhere.

article thumbnail

Strategic Cyber Warfare Heats Up

Dark Reading

It's "anything goes," according to renowned hacker the Grugq, who drew a bright line between cyberwar and cyber warfare at this week's virtual Disclosure Conference.

IT 83
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Social Media: Thwarting The Phishing-Data Goldmine

Threatpost

Cybercriminals can use social media in many ways in order to trick employees.

Phishing 109
article thumbnail

The Hidden Security Risks of Business Applications

Dark Reading

Today's enterprises depend on mission-critical applications to keep them productive, help better serve customers, and keep up with demand. It's important that they also know the risks.

Risk 79
article thumbnail

Most Popular Web Browsers between 1995 and 2019 via Data is Beautiful

IG Guru

Interesting how mobile devices really impacted the browser market. The post Most Popular Web Browsers between 1995 and 2019 via Data is Beautiful appeared first on IG GURU.

article thumbnail

DDoS Attacks on Education Escalate in 2020

Dark Reading

The number of DDoS attacks affecting educational resources was far higher between February and June 2020 compared with 2019.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Hacking AI-Graded Tests

Schneier on Security

The company Edgenuity sells AI systems for grading tests. Turns out that they just search for keywords without doing any actual semantic analysis.

99
article thumbnail

Collection of Metadata -- as Done by the NSA -- Likely Unconstitutional, US Court Suggests

Dark Reading

A ruling in an appeal by four men convicted of material support for terrorism finds that the National Security Agency's metadata collection program not only violated the prevailing law at the time but was also likely unconstitutional.

article thumbnail

10 questions to ask before writing your own web scrapers

Import.IO

Before embarking on a project to write your own web scrapers, here are 10 questions to ask yourself and your team: Does your team have the experience in writing code for web scraping? (It is harder than it looks) What are the server / networking / storage costs to continually. The post 10 questions to ask before writing your own web scrapers appeared first on Import.io.

IT 52