Fri.Feb 15, 2019

article thumbnail

Report: Facebook Faces Multibillion Dollar US Privacy Fine

Data Breach Today

FTC and Social Network Are Negotiating Record Penalty, Washington Post Reports The Federal Trade Commission is reportedly negotiating a settlement with Facebook that includes a multibillion dollar fine for its privacy failures. But the social network is alarmed about the proposed settlement agreement's terms and conditions, The Washington Post reports.

Privacy 238
article thumbnail

AIIM19 session preview - IIM Project Management and Self-Preservation: Why Successful Projects Are Not About You

AIIM

We have a number of important sessions planned for the AIIM19 conference coming to San Diego on March 26-28. I spoke with Carah Koch, the Director of Enterprise Content Management for the Metropolitan Council of the Twin Cities, about her session IIM Project Management and Self-Preservation: Why Successful Projects Are Not About You, and asked her to give us a short preview of what to expect.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

WannaCry Hero Loses Key Motions in Hacking Case

Data Breach Today

Judge Says 'Terrible Hangover' Didn't Fuzz Suspect's Miranda Rights Clarity A famed British computer security researcher has lost several key motions in a federal hacking case that stems from his alleged contribution to two types of banking malware. The rulings could complicate the challenges for the defense team of Marcus Hutchins, who remains in the U.S.

Security 228
article thumbnail

Cryptojacking Coinhive Miners for the first time found on the Microsoft Store

Security Affairs

Symantec discovered eight potentially unwanted applications (PUAs) into the Microsoft Store that were dropping cryptojacking Coinhive miners. Security experts at Symantec have discovered eight potentially unwanted applications (PUAs) into the Microsoft Store that were dropping cryptojacking Coinhive miners. The removed apps are Fast-search Lite, Battery Optimizer (Tutorials), VPN Browsers+, Downloader for YouTube Videos, Clean Master+ (Tutorials), FastTube, Findoo Browser 2019, and Findoo Mobile

Mining 91
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Protecting Cryptocurrency in the Era of 'Deep Fakes'

Data Breach Today

The latest edition of the ISMG Security Report highlights how thieves can use "deep fake" photos in an attempt to steal cryptocurrency. Also featured: A discussion of the implications of "data gravity" and an analysis of whether the era of mega-breaches is ending.

Security 181

More Trending

article thumbnail

Business Email Compromises: The Growing Threat in Healthcare

Data Breach Today

Business email compromise attacks are becoming far more common in the healthcare sector, says Rod Piechowski of the Healthcare Information and Management Systems Society, who discusses promising technologies to help address the threat.

160
160
article thumbnail

Group-IB helped to arrest phone scammers profiting off the backs of the Russian elderly

Security Affairs

Moscow police department operatives, with the participation of Group-IB experts, took down a group of phone scammers who for several years have been extorting money from the elderly. Phone scammers typically managed to steal between 450 and 4500 USD per victim, promising substantial compensation for their purchases of medicines, medical devices or dietary supplements.

article thumbnail

HIMSS19: The Cybersecurity Obstacles, Opportunities Ahead

Data Breach Today

A Rundown of the Conference's Top Emerging Topics Another annual HIMSS conference is in the rear-view mirror. But what's up the road in terms of top cybersecurity-related challenges facing the healthcare sector?

article thumbnail

How to improve your cyber resilience

IT Governance

Cyber resilience isn’t something you can buy. It’s not as simple as finding off-the-shelf tools to plug into your organisation. Rather, you must tailor your approach to your needs, assessing the way any one solution affects the whole. That may sound daunting, but when cyber resilience is done right, your cyber security and incident response strategy will seem straightforward.

Risk 80
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ICS/SCADA Attackers Up Their Game

Dark Reading

With attackers operating more aggressively and stealthily, some industrial network operators are working to get a jump on the threats.

88
article thumbnail

Coffee Meets Bagel dating app confirms data breach

Security Affairs

The week closes with the news of another embarrassing data breach, the Coffee Meets Bagel confirmed a hack on Valentine’s Day. The dating app Coffee Meets Bagel confirmed that hackers breached its systems on Valentine’s Day and may have obtained access to users’ account data. The company notified the incident to account holders, the intrusion was discovered after an archive containing user data was offered for sale on the dark web for roughly $20,000 worth of Bitcoin, Early thi

article thumbnail

EU: European Court confirms journalism exception for citizen-journalists, but not in France?

DLA Piper Privacy Matters

By Patrick Van Eecke, Denise Lebeau-Marianna and Laetitia Mouton. Under European data protection law, journalists enjoy some regulatory exemptions when processing personal data for journalistic purposes, balancing the right to the protection of personal data with the principle of freedom of expression. A question which has however sparked some debate is whether so-called citizen journalists, such as bloggers, can rely on the derogation for journalistic purposes as well.

GDPR 75
article thumbnail

Why I love the Jamf and Microsoft partnership

Jamf

A systems engineer from a large manufacturing organization explains why the unlikely pairing of Jamf and Microsoft creates better ways of securing and protecting devices, data and users.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Transform your filing system with custom folder options

TAB OnRecord

You’ve heard of transformers – now let us introduce you to the ultimate transformer folder! It has pockets, dividers, fasteners, and with triple-thick panels, it has the brute strength of pressboard. This once simple TAB file folder has transformed into a complete filing solution! While our ultimate transformer (…more commonly known as a Well File Folder) [.

article thumbnail

3 ways of looking at autonomous vehicles

DXC Technology

Autonomous vehicles are cars and trucks that literally drive themselves by navigating street mazes and hitting high speeds on busy interstates without a human being at the wheel to make decisions and exert control. Companies like Uber and Waymo, which will run an estimated 1 million autonomous trips daily in the United States by next […].

67
article thumbnail

Transform your filing system with new customizable folders

TAB OnRecord

You’ve heard of transformers – now let us introduce you to the ultimate transformer folder! It has pockets, dividers, fasteners, and with triple-thick panels, it has the brute strength of pressboard. This once simple TAB file folder has transformed into a complete filing solution! While our ultimate transformer (…more commonly known as a Well File Folder) [.

article thumbnail

Post-Quantum Crypto Standards Aren't All About the Math

Dark Reading

The industry needs to keep in mind the realities of hardware limits and transitional growing pains, according to Microsoft, Utimaco researchers.

75
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Where’s the Equifax Data? Does It Matter?

Threatpost

Threat-hunters say the breached data from the massive Equifax incident is nowhere to be found, indicating a spy job.

IT 77
article thumbnail

Hackers Found Phishing for Facebook Credentials

Dark Reading

A "very realistic-looking" login prompt is designed to capture users' Facebook credentials, researchers report.

article thumbnail

EDPB Releases Two-Year Work Program

Hunton Privacy

On February 12, 2019, the European Data Protection Board (the “EDPB”) released its work program for 2019 and 2020 (the “Work Program”). Following the EDPB’s endorsement of the Article 29 Working Party guidelines and continued guidance relating to new EU General Data Protection Regulation (“GDPR”) concepts, the EDPB plans to shift its focus to more specialized areas and technologies.

GDPR 61
article thumbnail

Staffing Shortage Makes Vulnerabilities Worse

Dark Reading

Businesses don't have sufficient staff to find vulnerabilities or protect against their exploit, according to a new report by Ponemon Institute.

69
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Ultra-Sneaky Phishing Scam Swipes Facebook Credentials

Threatpost

Researchers warn that the phishing campaign looks "deceptively realistic.".

article thumbnail

White-Hat Bug Bounty Programs Draw Inspiration from the Old West

Dark Reading

These programs are now an essential strategy in keeping the digital desperados at bay.

80
article thumbnail

Debunking five common misconceptions about AI

Information Management Resources

As clever as artificial intelligence may seem, it does not duplicate the human brain, learn on its own or operate free from human bias.

article thumbnail

Eight Cryptojacking Apps Booted From Microsoft Store

Threatpost

The eight apps were secretly stealing victims' CPU power to mine for Monero.

Mining 77
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Diversity and inclusion in India’s technology industry

OpenText Information Management

This year, OpenText™ sent our first delegation of women to the Grace Hopper Celebration India (GHCI), Asia’s largest gathering of women technologists. Rama Bhamidipaty, Senior Director, Software Engineering and Sangeetha Yanamandra, Director, Software Engineering at OpenText India joined us to discuss what it was like to be selected as part of the first OpenText delegation … The post Diversity and inclusion in India’s technology industry appeared first on OpenText Blogs.

IT 48
article thumbnail

Trickbot Malware Goes After Remote Desktop Credentials

Threatpost

The banking trojan is consistently evolving in hopes of boosting its efficacy.

IT 73
article thumbnail

Reconstructing SIGSALY

Schneier on Security

Lessons learned in reconstructing the World War II-era SIGSALY voice encryption system.