Fri.Feb 28, 2020

article thumbnail

FCC Proposes to Fine Wireless Carriers $200M for Selling Customer Location Data

Krebs on Security

The U.S. Federal Communications Commission (FCC) today proposed fines of more than $200 million against the nation’s four largest wireless carriers for selling access to their customers’ location information without taking adequate precautions to prevent unauthorized access to that data. While the fines would be among the largest the FCC has ever levied, critics say the penalties don’t go far enough to deter wireless carriers from continuing to sell customer location data.

Privacy 293
article thumbnail

5G Security: Former DHS Leader and Huawei CSO Offer Views

Data Breach Today

Chertoff Wants to Boost Huawei's Competitors; Huawei's Purdy Calls for More Transparency In interviews at RSA 2020, former Department of Homeland Security Secretary Michael Chertoff and Andy Purdy, CSO for Huawei USA, offer different points of view on 5G security.

Security 275
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

All versions of Apache Tomcat are affected by the Ghostcat flaw

Security Affairs

Ghostcat flaw affects all versions of Apache Tomcat and could be exploited by hackers to read configuration files or install backdoors on vulnerable servers. All versions of Apache Tomcat are affected by a vulnerability dubbed Ghostcat that could be exploited by attackers to read configuration files or install backdoors on vulnerable servers. The vulnerability, tracked as CVE-2020-1938 , affects the Tomcat AJP protocol and was discovered by the Chinese cybersecurity firm Chaitin Tech.

Passwords 130
article thumbnail

AI's Impact on SOC Maturity

Data Breach Today

ServiceNow's Bryce Schroeder on How Tech Will Change the Security Analyst's Role From buzzword to practical application, artificial intelligence quickly has made an impact in cybersecurity - particularly in the security operations center. Bryce Schroeder of ServiceNow projects how AI and automation will continue to influence SOCs - and the analyst's role.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Deep Learning to Find Malicious Email Attachments

Schneier on Security

Google presented its system of using deep-learning techniques to identify malicious email attachments: At the RSA security conference in San Francisco on Tuesday, Google's security and anti-abuse research lead Elie Bursztein will present findings on how the new deep-learning scanner for documents is faring against the 300 billion attachments it has to process each week.

Security 121

More Trending

article thumbnail

Which are the most dangerous mobile app stores online?

Security Affairs

An interesting report published by RiskIQ on 2019 Mobile App Threat Landscape, lists the most dangerous mobile app store online. Mobile users downloaded over 200 billion apps in 2019 and the overall expense in app stores worldwide has been estimated in more than $120 billion. Threat actors don’t want to miss this amazing business opportunity and are using rogue apps that mimic well-known brands and are used for malicious purposes, including phishing and malware campaigns.

Phishing 119
article thumbnail

The Role of Visualization in Vulnerability Management

Data Breach Today

Mieng Lim of Digital Defense on the Benefits of Enhancing Visibility Threat intelligence and visualization technology can play huge roles in improving vulnerability management. Mieng Lim of Digital Defense outlines the potential benefits.

189
189
article thumbnail

Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates

Security Affairs

Network data collected by the NetBlocks internet observatory confirm that Turkey has blocked access to social media as Idlib military crisis escalates. Network data collected by the NetBlocks internet observatory confirm that the Turkish authorities have blocked access to social media following allegations of an attack on Turkish troops in Idlib, Syria on Thursday 27 February 2020.

Military 114
article thumbnail

RSA 2020: Roundup of Key Themes

Data Breach Today

This special edition of the ISMG Security Report focuses exclusively on the RSA 2020 conference. Featured are comments from former NSA Director Keith Alexander on "collective defense," plus a discussion on fighting payment fraud and a roundup of other important themes.

Security 162
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Bruce Schneier Proposes ‘Hacking Society’ for a Better Tomorrow

Threatpost

The security industry has the perfect skillset and adversarial defense outlook to deal with some of the emerging societal issues in today's world, said security technologist Bruce Schneier.

Security 106
article thumbnail

Zero Trust: Definitions, Practicalities, Challenges

Data Breach Today

Gigamon's Shehzad Merchant on Hygiene, Monitoring and Rapid Incident Response Zero trust is not a product or a destination, but rather a journey requiring organizations to practice good security hygiene, continuous monitoring and detection, as well as rapid incident response backed by high levels of automation, says Shehzad Merchant, chief technology officer of Gigamon.

Security 147
article thumbnail

Cisco addresses vulnerabilities in FXOS, UCS Manager and NX-OS Software

Security Affairs

Cisco released security patches for 11 vulnerabilities in its products, including the Cisco UCS Manager, FXOS, and the NX-OS software. The most severe vulnerabilities, rated as high severity, affect FXOS and NX-OS that could be exploited by an unauthenticated , adjacent attacker to execute arbitrary code as root. The exploitation of the flaw could trigger a denial of service ( DoS ) condition. “All six vulnerabilities have a Security Impact Rating (SIR) of High.

article thumbnail

6 Truths About Disinformation Campaigns

Dark Reading

Disinformation goes far beyond just influencing election outcomes. Here's what security pros need to know.

Security 128
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

NRC Health health care company hit with ransomware

Security Affairs

A Lincoln health care company has been targeted by crooks, no patient data has been compromised during the cyber attack. NRC Health recently disclosed that it was hit by a ransomware attack that took place on February 11. The company provides analytics that help health care providers measure and improve quality and services. The Lincoln health care company immediately shut down its system to contain the infection, no patient data has been compromised during the cyber attack.

article thumbnail

Top 3 use cases to infuse AI in your business: A CxO cheat sheet

IBM Big Data Hub

Artificial Intelligence (AI) is no longer in its infancy; it is an essential business transformation tool to deliver results with impact. AI is changing every aspect of business by bringing data to the center: from AI infused customer and employee experiences to AI infused operations, and, ultimately, protecting the company from external risks and fraud. .

article thumbnail

Thailand Personal Data Protection Law

Data Protection Report

Background. The Personal Data Protection Act B.E. 2562 (2019) ( PDPA ) was published on 27 May 2019 in Thailand’s Government Gazette and became effective the following day. However, most of the operational provisions, including provisions relating to the rights of a data subject, the obligations of a data controller and the penalties for non-compliance, will become effective on 27 May 2020, 1 year after the PDPA is published.

article thumbnail

Humble Bundle's 2020 Cybersecurity Books

Schneier on Security

For years, Humble Bundle has been selling great books at a "pay what you can afford" model. This month, they're featuring as many as nineteen cybersecurity books for as little as $1, including four of mine. These are digital copies, all DRM-free. Part of the money goes to support the EFF or Let's Encrypt. (The default is 15%, and you can change that.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Exploitation, Phishing Top Worries for Mobile Users

Dark Reading

Reports find that mobile malware appears on the decline, but the exploitation of vulnerabilities along with phishing has led to a rise in compromises, experts say.

Phishing 109
article thumbnail

4 most valuable takeaways from Field Kickoff ‘20

Collibra

In February, our customer-facing teams and key internal partners headed to Atlanta, Georgia, home of the newest Collibra regional HQ, for our annual Field Kickoff. The Field Team is comprised of sales, customer success, enablement, support and education, spread across the globe. The 3-day event was filled with executive and customer keynotes, panels, track sessions, and a motivational speech by Olympic Champion, Summer Sanders.

Sales 74
article thumbnail

CSLR Webinar on GDPR’s Global Scope with Hunton Partner Bridget Treacy

Hunton Privacy

On March 5, 2020 the Cybersecurity Law Report will host a webinar with panelists, Hunton Andrews Kurth LLP partner Bridget Treacy and Refinitiv’s chief privacy officer Vivienne Artz, on the General Data Protection Regulation’s (“GDPR”) territorial scope entitled, “Gauging GDPR’s Global Reach.” This webinar will explore the global effect of the GDPR in both the digital and geographic arenas.

GDPR 71
article thumbnail

RSAC 2020: Ransomware a ‘National Crisis,’ CISA Says, Ramps ICS Focus

Threatpost

The federal agency plans a slew of initiatives to address industrial control security this year.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New Trickbot Delivery Method Focuses on Windows 10

Dark Reading

Researchers discover attackers abusing the latest version of the remote desktop ActiveX control class introduced for Windows 10.

114
114
article thumbnail

Patrick Wardle: Apple Devices Hit With Recycled macOS Malware

Threatpost

Patrick Wardle talks about the biggest threats he's seeing impacting Apple devices.

99
article thumbnail

The Guide to Going Paperless in Accounting

Record Nations

Going paperless in accounting makes a big difference in organization, efficiency, and waste reduction. The process can seem daunting, but is well worth it in the long run. In the following video and transcription, learn more about the process of going paperless in accounting. It explains the benefits of going paperless and outlines the steps […].

IT 60
article thumbnail

Educating Educators: Microsoft's Tips for Security Awareness Training

Dark Reading

Microsoft's director of security education and awareness shares his approach to helping train employees in defensive practices.

Education 101
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Connected devices will be 3x the global population by 2023, Cisco says via RCR Wireless News

IG Guru

Cisco’s new annual forecast predicts that 71% of global population will be mobile subscribers by 2023. The post Connected devices will be 3x the global population by 2023, Cisco says via RCR Wireless News appeared first on IG GURU.

article thumbnail

Reducing Risk with Data Minimization

Dark Reading

Putting your company on a data diet that reduces the amount of the sensitive data you store or use is a smart way to achieve compliance with GDPR and CCPA.

Risk 62
article thumbnail

Hong Kong: Important changes proposed to Hong Kong’s data protection law

DLA Piper Privacy Matters

Any organisation processing Hong Kong personal data must plan ahead to anticipate significant new compliance obligations requirements. These are proposed in a recent consultation paper to amend Hong Kong’s Personal Data (Privacy) Ordinance (PDPO), and would – if passed – constitute the first changes to the PDPO since 2012. Key proposed amendments include: 1.

Paper 52