Thu.Feb 27, 2020

article thumbnail

Israeli Marketing Company Exposes Contacts Database

Data Breach Today

Data includes Names, Addresses, Email Addresses, Phone Numbers An Israeli marketing company left the authentication credentials for a database online, exposing more than 140 GB worth of names, email addresses and phone numbers. The exposure was found by a U.S.-based security specialist who became frustrated after receiving unwanted marketing messages over SMS.

Marketing 293
article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

In several recent posts, I’ve talked about professional development options for information management professionals and provided guidance on how to determine whether a particular course or certification is a good fit. For the most part, I’ve stayed away from blogging about AIIM's training for two reasons. First, we wanted these blog posts to be informative and insightful, rather than be perceived as self-aggrandizement.

ECM 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Need for a 'Collective Defense'

Data Breach Today

Former NSA Director and Others Stress Collaboration Among the top issues being discussed at the RSA 2020 conference this week is the need for more cybersecurity collaboration between government agencies and the private sector. Here are some interview highlights.

article thumbnail

Hunting the coronavirus in the dark web

Security Affairs

Let me share with you the result of a one-night long analysis of major black marketplaces searching for anything related to the coronavirus epidemic. Recently I have received many questions from journalists and colleagues about the activity in the dark web related to the coronavirus epidemic, here you are what I have found digging in the major black marketplaces.

Sales 128
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Former Microsoft Engineer Convicted of Insider Fraud

Data Breach Today

Used Admin Privileges to Steal $10 Million From Retail Platform A former Microsoft software engineer was convicted this week on 18 federal charges tied to stealing more than $10 million through the company's online retail platform.

Retail 244

More Trending

article thumbnail

Why The Cloud Is The New Network

Data Breach Today

Fleming Shi of Barracuda Networks on Latest Cloud Security Research Findings Barracuda Networks has released the findings of its latest survey on public cloud security. Fleming Shi, the company's chief technology officer, describes what is holding organizations back from fully embracing the public cloud.

Cloud 199
article thumbnail

Data on Detection of Malicious Documents in Gmail are impressive

Security Affairs

Google revealed that the enhancements to its scanning system implemented in Gmail are boosting its detection capabilities. Google announced that the new scanning capabilities implemented in Gmail have increased the detection rate of malicious documents. The IT giant proudly announced that combining its existing machine learning models with other protections it was able to detect and block more than 99.9% of threats that attempt to target Gmail users.

Phishing 120
article thumbnail

How Machine Learning Can Strengthen Insider Threat Detection

Data Breach Today

Panel: Better Algorithms Can Help Mitigate the Risks As companies continue to grapple with the challenges of insider threats, machine learning coupled with behavioral analytics can assist in predicting and detecting potential threats from employees and contractors, according to a panel of security experts at RSA 2020.

Analytics 162
article thumbnail

EU Council Presidency Releases Proposed Amendments to Draft ePrivacy Regulation

Hunton Privacy

On February 21, 2020, the Presidency of the Council of the European Union (“EU Council Presidency”) published a revised part of the proposed Regulation concerning the Respect for Private Life and the Protection of Personal Data in Electronic Communications and Repealing Directive 2002/58/EC (Regulation on Privacy and Electronic Communications), better known as “the Draft ePrivacy Regulation.”.

Metadata 107
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Facial recognition firm Clearview AI reveals intruders stole its client list

Security Affairs

Bad news for the controversial facial recognition startup Clearview AI, hackers gained “unauthorized access” to a list of all of its customers. . The controversial facial-recognition company that contracts with law-enforcement agencies announced that attackers have gained unauthorized access to its entire client list. The company already informed its customers of the security breach. .

IT 111
article thumbnail

RSAC 2020: GM’s Transportation Future Hinges on Cybersecurity

Threatpost

CEO Mary T. Barra addressed the high stakes in rolling out self-driving cars and biometric-enhanced vehicles, where one cyber-event could derail plans for emerging automotive technologies.

article thumbnail

Lampion malware origin servers geolocated in Turkey

Security Affairs

After three months from the first detection, the Lampion origin was identified. A webserver named “portaldasfinancas” is available in Turkey and has been used to spread the threat in Portugal. Lampion malware is the most critical malware affecting Portuguese users’ last three months. From December 2019 it had spread, impersonating and using template emails from the Portuguese Government Finance & Tax (Portal das Finanças – ATA) , Energias de Portugal (EDP) , and most recently DPD firm –

article thumbnail

Australian government officials accused of 'cavalier disregard' for unauthorised metadata access

The Guardian Data Protection

Parliamentary committee hears state and government agencies sought data 8,432 times in 2018-19 Federal government officials have been accused of a “cavalier disregard” for the dozens of state and federal government agencies accessing data retained under the mandatory data retention regime thousands of times a year despite legislation explicitly excluding them from access.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to develop a robust cyber security policy

IT Governance

Technological defences and staff training are two of the most frequently touted measures for preventing data breaches, but their effectiveness is dependent on the way organisations implement them. That means creating a detailed cyber security policy. What is a cyber security policy? A cyber security policy outlines an organisation’s cyber security defence strategy.

article thumbnail

Captiva is now OpenText Intelligent Capture

OpenText Information Management

Since the launch of OpenText™ Intelligent Capture nearly a year ago, customers and partners have been asking about the transition and benefits within existing Captiva environments. But what is “intelligent” capture? What is the foundational thinking and technology behind it? John Mancini expanded on this shift in capture strategy in a recent AIIM webinar, where … The post Captiva is now OpenText Intelligent Capture appeared first on OpenText Blogs.

article thumbnail

New strain of Cerberus Android banking trojan can steal Google Authenticator codes

Security Affairs

Experts found a new version of the Cerberus Android banking trojan that can steal one-time codes generated by the Google Authenticator app and bypass 2FA. Security researchers from ThreatFabric warn of a new Android malware strain can now steal one-time passcodes (OTP) generated through Google Authenticator that is used as part of 2FA to protect online accounts.

article thumbnail

CGI-sponsored GTNews survey reveals major challenge for corporate banks—declining client satisfaction (part 2)

CGI

CGI-sponsored GTNews survey reveals major challenge for corporate banks—declining client satisfaction (part 2). In my first blog in this two-part series, I shared a key finding of The Global Treasurer’s Transaction Banking Survey (GTNews survey) for 2019—declining corporate client satisfaction. In that blog, I covered possible drivers behind this four-year decline, along with how corporate banks can respond.

Retail 90
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Threat actors scan Internet for Vulnerable Microsoft Exchange Servers

Security Affairs

Experts warn that hackers are actively scanning the Internet for Microsoft Exchange Servers vulnerable in the attempt to exploit the CVE-2020-0688 RCE. Hackers are actively scanning the Internet for Microsoft Exchange Servers affected by the CVE-2020-0688 remote code execution flaw. The vulnerability resides in the Exchange Control Panel (ECP) component, the root cause of the problem is that Exchange servers fail to properly create unique keys at install time. “Knowledge of a the validatio

article thumbnail

Can I move my data to the EU before Google shifts it to the US?

The Guardian Data Protection

Post-Brexit, Sean wants to keep his data protected by the EU’s GDPR rather than laxer US privacy laws Given Google’s recent announcement about moving UK users’ data to US jurisdiction, what’s the best way to migrate to EU-based services? Can you download+upload or crossload your Gmail to another service? And are we in for the same treatment by Facebook, Twitter, WhatsApp, Instagram et al?

GDPR 89
article thumbnail

Federated Records Management Approach in Meeting the M-19-21 Directive

Gimmal

The Federal Directive for M-12-18 deadline has arrived and a new directive was issued to extend requirements for agencies transitioning to electronic records. The new directive , M-19-21 (Transition to Electronic Records) , includes initiatives established with M-12-18 and expands on those requirements to eliminate paper records by 202 2.

article thumbnail

Adventures in cyber litigation: Frozen crypto-assets and the role of cyber insurance

Data Protection Report

A few weeks ago, we blogged about the decision of the English High court in AA v. Persons Unknown & Ors. Given the level of interest in the case, we have prepared a deeper-dive into the facts and the implications of the decision, with a focus on the important role played in the case by cyber insurance. This is set out below. The context. For some time, cyber exposure has been at or near the top of every major company’s risk register.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Securing the Internet of Things through Class-Action Lawsuits

Schneier on Security

This law journal article discusses the role of class-action litigation to secure the Internet of Things. Basically, the article postulates that (1) market realities will produce insecure IoT devices, and (2) political failures will leave that industry unregulated. Result: insecure IoT. It proposes proactive class action litigation against manufacturers of unsafe and unsecured IoT devices before those devices cause unnecessary injury or death.

IoT 113
article thumbnail

Seventh Circuit Joins Third and Eleventh Circuits in “Autodialer” Circuit Split

HL Chronicle of Data Protection

Slowly but surely, the U.S. Courts of Appeal increasingly agree on how to interpret the definition of “automatic telephone dialing system” (“ATDS” or “autodialer”) in the Telephone Consumer Protection Act (“TCPA”). On February 19, 2020, a unanimous Seventh Circuit panel refused to revise a putative class action in Gadelhak v. AT&T Services, Inc.

article thumbnail

A Flaw in Billions of Wi-Fi Chips Let Attackers Decrypt Data

WIRED Threat Level

Affected devices include iPhones, iPads, Macs, Amazon Echos and Kindles, Android devices, and various Wi-Fi routers.

article thumbnail

Celebrating 20 years of excellence

OpenText Information Management

2020 marks the 20th anniversary of OpenTextTM Exstream. It is hard to believe that the market-leading Customer Communications Management (CCM) software was “born” in the garage of two University of Kentucky engineering students in 1999, and the first customer was a French telco company one year later in 2000. A lot has changed in those … The post Celebrating 20 years of excellence appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Threat Model Thursday: BIML Machine Learning Risk Framework

Adam Shostack

The Berryville Institute of Machine Learning (BIML) has released “ An Architectural Risk Analysis of Machine Learning Systems.” This is an important step in the journey to systematic, structured, and comprehensive security analysis of machine learning systems, and we can contrast it with the work at Microsoft I blogged about last month. As always, my goal is to look at published threat models to see what we can learn.

Risk 72
article thumbnail

IoT Insecurity: When Your Vacuum Turns on You

Threatpost

From vacuum cleaners to baby monitors, the IoT landscape continues to be plagued by concerning security issues that lead to privacy threats.

IoT 81
article thumbnail

The state of AI and information readiness in banking

OpenText Information Management

According to a new report on the global banking industry from Finextra, 45% of retail banks say they can onboard a new customer in under 40 minutes. Yet, only a quarter of respondents felt they could pull front and back end systems together to deliver optimum customer service. As banks look to fully exploit the potential … The post The state of AI and information readiness in banking appeared first on OpenText Blogs.

Retail 67