Wed.Jan 08, 2020

article thumbnail

What Orwell's '1984' Missed: Free Social Media Apps

Data Breach Today

UAE Green Lights All-Access Social Messaging App, Blocks Rivals Not even George Orwell could have predicted nation-state surveillance in the 21st century. Give us free instant messaging for our smartphones, and faster than you can say "viral kitten video," we're collectively part of a mass surveillance nightmare. Case in point: The ToTok social messaging app.

Access 182
article thumbnail

In App Development, Does No-Code Mean No Security?

Dark Reading

No-code and low-code development platforms are part of application development, but there are keys to making sure that they don't leave security behind with traditional coding.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google's Project Zero Policy Change Mandates 90-Day Disclosure

Dark Reading

The updated disclosure policy aims to achieve more thorough and improved patch development, Google reports.

46
article thumbnail

TikTok Bugs Could Have Allowed Account Takeovers

WIRED Threat Level

As the social media app continues to gain popularity, security researchers are taking a closer look under the hood.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FBI Asks Apple For Access to Saudi Shooter's iPhones

Data Breach Today

Request Echoes 2016 Legal Standoff Between Apple and the FBI The FBI has sent a letter to Apple asking for help in accessing encrypted data from two iPhones belonging to a deceased shooter. The bureau's move may be a prelude to another legal fight between the FBI and Apple over strong encryption.

Access 195

More Trending

article thumbnail

Currency Exchange Travelex Held Hostage by Ransomware Attack

Data Breach Today

Sodinokibi Group Demanding Millions in Ransom A ransomware attack has held London-based foreign currency exchange firm Travelex hostage since New Year's Day, the company confirmed Tuesday. It appears that the Sodinokibi group is behind the attack and is asking for millions from the company.

article thumbnail

What to expect from OpenText in 2020

OpenText Information Management

Over the next 12 months, OpenText customers can expect many new innovations designed to make work easier, faster and smarter than ever. Powering many of these advances will be technologies like automation, analytics, the cloud, machine learning and artificial intelligence (AI). These technologies will help our customers to collaborate more easily, remove repetitive tasks, devote … The post What to expect from OpenText in 2020 appeared first on OpenText Blogs.

article thumbnail

Nation-State Attacks: Why Healthcare Must Prepare

Data Breach Today

As tensions between the U.S. and Iran continue to rise, healthcare organizations need to exercise extra vigilance in shoring up their security to defend against potential Iranian cyberattacks on critical infrastructure sectors, says Errol Weiss of the Health Information Sharing and Analysis Center.

Security 100
article thumbnail

MITRE presents ATT&CK for ICS, a knowledge base for ICS

Security Affairs

MITRE announced the initial release of a version of its MITRE ATT&CK knowledge base that focuses on industrial control systems (ICS). MITRE’s ATT&CK framework is becoming a standard in cybersecurity community for the classification of attacker behavior. Now the organization is going to propose a knowledge base that focused on ICS systems for its MITRE’s ATT&CK. “ ATT&CK for ICS is a knowledge base useful for describing the actions an adversary may take while operatin

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

5 trends that will impact the adoption of artificial intelligence

Information Management Resources

With the turn of the decade, AI adoption and implementation will only keep soaring to new heights, painting a future that is digital first and full of possibilities.

article thumbnail

The city of Las Vegas announced it has suffered a cyber attack

Security Affairs

The city of Las Vegas announced it has suffered a cyber attack that breached its computer systems, it is unclear whether any sensitive data was exposed. Las Vegas officials say a cyber attack breached the city’s computer systems , the attack took place on Tuesday, but it wasn’t immediately clear if any sensitive data was exposed. City spokesman David Riggleman told the Las Vegas Review-Journal that City officials were informed of the breach around 4:30 a.m. and the IT department qui

IT 68
article thumbnail

URGENT: CFTC Warns Registrants of Cyber Threats and Requests Information by January 10 and/or January 20

Data Matters

On January 3, 2020, the Division of Swap Dealer and Intermediary Oversight (DSIO) of the U.S. Commodity Futures Trading Commission (CFTC) issued two cyber threat alerts regarding the hacking of approximately one dozen cloud service providers, as described in a Wall Street Journal article published December 30, 2019, entitled “Ghosts in the Clouds: Inside China’s Major Corporate Hack.”.

Cloud 60
article thumbnail

Security flaws allowed hijacking any TikTok account

Security Affairs

A flaw in the popular TikTok app could allow attackers to hijack any user account just by knowing the mobile number of the victim. Security experts from CheckPoint have discovered a critical vulnerability in the popular TikTok app that could be exploited by a remote attacker to hijack any user account just by knowing the mobile number of the victim.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Drake Lyrics Used as Calling Card in Malware Attack

Threatpost

A hacker who apparently likes the musician Drake leaves lyrics from the artist's song In My Feelings behind in an attack that delivers malware Lokibot or Azorult.

63
article thumbnail

Driving shareholder value through marketing

OpenText Information Management

In recent blogs I’ve talked about the importance of proving the value of marketing and my predictions for marketing trends in 2020. But what does this mean for the CMO and the marketing organization? It all ultimately comes down to creating and driving greater shareholder value. Delight your customers It should be no surprise that … The post Driving shareholder value through marketing appeared first on OpenText Blogs.

article thumbnail

New SHA-1 Attack

Schneier on Security

There's a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the complexity of collisions attack against SHA-1: on an Nvidia GTX 970, identical-prefix collisions can now be computed with a complexity of 261.2rather than264.7, and chosen-prefix collisions with a complexity of263.4rather than267.1.

article thumbnail

Announcing the 2020 Corporate Ediscovery Hero Awards Finalists

Zapproved

The 2020 Corporate Ediscovery Hero Awards are less than a month away. This year’s finalists have made remarkable achievements, both on the individual and team levels, and we’re excited to celebrate their triumphs soon. The post Announcing the 2020 Corporate Ediscovery Hero Awards Finalists appeared first on Zapproved.

52
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Process Modernization: Bringing Agility to the Enterprise

Micro Focus

The agility to respond to evolving change is simple enough for web-scale digital operations, but can IT help longer-established enterprises move faster and deliver more without compromising years of competitive advantage held in core business tech? Ed Airey, Solutions Marketing Director, answers the question in the context of Process Modernization, Enterprise DevOps, and IT change.

article thumbnail

TikTok Riddled With Security Flaws

Threatpost

The video sharing app has fixed several flaws allowing partial account takeover and information exposure.

article thumbnail

15% of Ransomware Victims Paid Ransom in 2019, Quadrupling 2018

Dark Reading

Increasing sophistication of ransomware attacks might be forcing victims to open their wallets.

article thumbnail

Mozilla Releases Firefox 72: High-Severity Bugs Patched, Fingerpinting Nixed

Threatpost

Mozilla tackles high-severity bugs in its latest Firefox 72 and Firefox ESR 68.4 releases at the same time rolls a major privacy feature.

Privacy 57
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Components of a Modern Data Platform Ready for the AI Future

IBM Big Data Hub

How to build a modern data management platform ready for the AI future

68
article thumbnail

Man Sentenced in ATM Skimming Conspiracy

Threatpost

A Romanian national has been sentenced to 5 years in prison after racking up almost $400,000 in an ATM skimming scheme.

56
article thumbnail

TikTok Bugs Put Users' Videos, Personal Data At Risk

Dark Reading

Researchers found it was possible to spoof SMS messages from TikTok and exploit an API flaw that could grant access to users' personal data.

article thumbnail

Google Ditches Patch-Time Bug Disclosure in Favor of 90-Day Policy

Threatpost

Project Zero vulnerability disclosures will now happen at 90 days, even if a patch becomes available before then.

55
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Alleged Spy App ToTok Puts Apple in a Bind

WIRED Threat Level

Apple and Google both banned ToTok after reports that it was a UAE government surveillance tool. After Google reinstated it, Apple has a hard choice to make.

article thumbnail

Liverpool Voyeur Used IM-RAT to Video Women at Home

Threatpost

The case highlights the rising issue of stalkerware, which has reached epidemic proportions.

Access 60
article thumbnail

The "Art of Cloud War" for Business-Critical Data

Dark Reading

How business executives' best intentions may be negatively affecting security and risk mitigation strategies - and exposing weaknesses in organizational defenses.

Cloud 46