Mon.Aug 10, 2020

article thumbnail

Ransomware Reportedly Hits Ventilator Maker

Data Breach Today

Incident Reflects Threats Facing Those Involved in COVID-19 Response A manufacturer of transit communication systems that pivoted to build ventilators during the COVID-19 pandemic is reportedly the latest victim of the DoppelPaymer ransomware gang.

article thumbnail

Government paid Vote Leave AI firm to analyse UK citizens’ tweets

The Guardian Data Protection

Faculty, linked to senior Tories, hired to collect tweets as part of coronavirus-related contract Privacy campaigners have expressed alarm after the government revealed it had hired an artificial intelligence firm to collect and analyse the tweets of UK citizens as part of a coronavirus-related contract. Faculty, which was hired by Dominic Cummings to work for the Vote Leave campaign and counts two current and former Conservative ministers among its shareholders, was paid ÂŁ400,000 by the Ministr

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Barclays Faces Employee Spying Probe

Data Breach Today

Privacy Watchdog in UK Investigates Bank's Use of Employee Monitoring Tools Banking giant Barclays is being probed by the U.K.'s privacy watchdog over its use of employee-monitoring tools, after the bank in February reportedly shifted from anonymized tracking to giving managers the ability to view data for individual employees.

Privacy 344
article thumbnail

Vulnerability Prioritization: Are You Getting It Right?

Dark Reading

Developers must find a way to zero in on the security vulns that present the most risk and quickly address them without slowing down the pace of development.

IT 144
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Phishing Campaign Spoofs SBA Loan Offer

Data Breach Today

Malwarebytes Says Campaign Designed to Steal Banking Credentials Malwarebytes reports that a newly discovered phishing campaign is spoofing a U.S. Small Business Administration loan offer in an attempt to steal banking credentials and other personal data.

Phishing 329

More Trending

article thumbnail

BEC Scam Targets Executives' Office 365 Accounts

Data Breach Today

Trend Micro: 'Water Nue' Payment Fraud Campaign Has Targeted 1,000 Companies Since March A recently uncovered BEC scam has targeted the Office 365 accounts of executives at over 1,000 companies worldwide, collecting more than 800 sets of credentials in an attempt to commit payment fraud, according to Trend Micro.

301
301
article thumbnail

Nefilim ransomware operators claim to have hacked the SPIE group

Security Affairs

Nefilim ransomware operators allegedly targeted the SPIE group, an independent European leader in multi-technical services. Researchers from threat intelligence firm Cyble reported that Nefilim ransomware operators allegedly hacked The SPIE Group , an independent European leader in multi-technical services. The number of ransomware attacks continues to increase, hackers also steal victims’ data and threaten them to release the stolen info if they don’t pay the ransom.

article thumbnail

Over a Billion Android Devices Are at Risk of Data Theft

WIRED Threat Level

Qualcomm has released a fix for the flaws in its Snapdragon chip, which attackers might exploit to monitor location or render the phone unresponsive.

Risk 119
article thumbnail

Spying on satellite internet comms with a $300 listening station

Security Affairs

An attacker could use $300 worth of off-the-shelf equipment to eavesdrop and intercept signals from satellite internet communications. The academic researcher James Pavur, speaking at Black Hat 2020 hacking conference , explained that satellite internet communications are susceptible to eavesdropping and signal interception. Attackers could use cheap equipment like a basic home-television gear that goes from $300 to spy on the internet traffic for high-value targets.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Unleashing the Power of Authoritative DNS

PerezBox

It was an exceptionally long week, and you managed to get to bed around midnight. You’re a system admin, and at the core of your job is to keep the. Read More. The post Unleashing the Power of Authoritative DNS appeared first on PerezBox.

IT 98
article thumbnail

Gamifying Password Training Shows Security Benefits

Dark Reading

When picking passwords, users often fall back on certain insecure patterns, but good habits can be learned using simple games, a group of researchers find.

Passwords 144
article thumbnail

Smart Lock Vulnerability

Schneier on Security

Yet another Internet-connected door lock is insecure : Sold by retailers including Amazon, Walmart, and Home Depot, U-Tec's $139.99 UltraLoq is marketed as a "secure and versatile smart deadbolt that offers keyless entry via your Bluetooth-enabled smartphone and code." Users can share temporary codes and 'Ekeys' to friends and guests for scheduled access, but according to Tripwire researcher Craig Young, a hacker able to sniff out the device's MAC address can help themselves to an access key, to

Retail 133
article thumbnail

TeamViewer Flaw in Windows App Allows Password-Cracking

Threatpost

Remote, unauthenticated attackers could exploit the TeamViewer flaw to execute code and crack victims' passwords.

Passwords 119
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What is a Customer API?

Reltio

What’s the role of APIs in the experience economy? APIs are the building blocks for creating new experiences for customers and employees. They power mobile apps, web apps, IoT devices and are used to exchange business-critical information. They also enable apps to interact with each other. APIs play a key role in digital and customer experience initiatives.

article thumbnail

Google Fixes Mysterious Audio Recording Blip in Smart Speakers

Threatpost

Google Home devices reportedly recorded noises even without the "Hey Google" prompt due to the inadvertent rollout of a home security system feature.

Security 103
article thumbnail

INTERNET BLOCKING IN MYANMAR – SECRET BLOCK LIST AND NO MEANS TO APPEAL

Security Affairs

The list of sites blocked in MYANMAR includes many websites that did not fall under the categories adult content or fake news. Original post at: [link]. In March 2020, The Ministry of Telecommunications (MoTC) issued a directive to all operators in Myanmar with a secret list of 230 sites to be blocked due to the nature of the content; adult content and fake news.

article thumbnail

DDoS Attacks Cresting Amid Pandemic

Threatpost

Attacks were way up year-over-year in the second quarter as people continue to work from home.

Security 116
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hacking It as a CISO: Advice for Security Leadership

Dark Reading

A security leader shares tips for adopting a CISO mindset, creating risk management strategies, and "selling infosec" to IT and executives.

IT 101
article thumbnail

Belarus Has Shut Down the Internet Amid a Controversial Election

WIRED Threat Level

Human rights organizations have blamed the Belarusian government for widespread outages.

article thumbnail

Q2 DDoS Attacks Triple Year Over Year: Report

Dark Reading

Distributed denial-of-service attacks have stayed consistently high throughout 2020, a shift from normal attack trends that researchers attribute to COVID-19.

85
article thumbnail

Why a “data-culture” is key to public sector transformation

OpenText Information Management

Suzette Kent served as US federal CIO from early 2018 until her departure in July 2020. During her tenure she directed a wide range of technology and workforce initiatives, setting government-wide standards while giving agencies the freedom to tailor their efforts in mission-appropriate ways. Ms. Kent leaves behind a lasting legacy for government IT modernization … The post Why a “data-culture” is key to public sector transformation appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why consumer education is needed in the digital insurance age

DXC Technology

An explosion of technology innovation over the last several years has created digital-savvy consumers and digital-empowered employees. For the insurance sector, this has brought forth both new market opportunities and new market confusion. The insurance sector has leveraged digital for new ways of working, and that has proven to be especially valuable in light of […].

article thumbnail

Policy into Practice — Strategies for Operationalizing Your Records Retention Schedule from Zasio

IG Guru

Zasio posts a great article on how to create a records retention schedule here. The post Policy into Practice — Strategies for Operationalizing Your Records Retention Schedule from Zasio appeared first on IG GURU.

article thumbnail

Lock-Pickers Face an Uncertain Future Online

Dark Reading

Teaching the hardware hacker the skill of picking locks is evolving because of the pandemic's lockdown.

88
article thumbnail

Disaster Preparedness during Hurricane Season

National Archives Records Express

The Atlantic hurricane season is already underway, with Tropical Storm Isaias causing considerable damage as it made landfall last week. NOAA is predicting “ an extremely active ” hurricane season in the Atlantic Basin. As a result, we wanted to take this opportunity to remind Federal agencies and records personnel dealing with the effects of Isaias, or potentially with other storms, of information from our office.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Making data-driven decisions during the COVID-19 pandemic

Collibra

Swift decision making is more important now than ever before. When COVID-19 hit America back in March, hospitals and healthcare organizations faced insurmountable challenges. Hospitals were overrun with patients, healthcare professionals needed more PPE than ever before, and people were dying at alarming rates. Simultaneously, the United States experienced three record-setting point drops for the Dow Jones Industrial Average in March.

article thumbnail

Better Business Bureau Warns of New Visa Scam

Dark Reading

Visa limitations due to the novel coronavirus have given rise to a wave of scams aimed at visa-seekers.

79
article thumbnail

Modern, Open, and Smart Data Management for Db2 Leaders

Rocket Software

This was originally presented as a keynote session at the IDUG Virtual Db2 Tech Conference in July 2020. . Since my years in grad school, I’ve been interested in DB capabilities. As part of my thesis and graduate assistant work, I evaluated, operated, and used multiple DBs, including several open sources ones. As part of my thesis, I looked at the future of database technology and the functionality that was missing.

Cloud 52