Fri.Nov 09, 2018

article thumbnail

Bug Bounty Hunter Ran ISP Doxing Service

Krebs on Security

A Connecticut man who’s earned bug bounty rewards and public recognition from top telecom companies for finding and reporting security holes in their Web sites secretly operated a service that leveraged these same flaws to sell their customers’ personal data, KrebsOnSecurity has learned. In May 2018, ZDNet ran a story about the discovery of a glaring vulnerability in the Web site for wireless provider T-Mobile that let anyone look up customer home addresses and account PINs.

Sales 196
article thumbnail

Tips for Getting the Most From an MSSP

Data Breach Today

How can organizations get the most out of partnering with managed security services providers and avoid common pitfalls? Cybersecurity consultant Vito Sardanopoli, an experienced CISO, offers top tips.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Amazing Automation Tools for Startups

AIIM

Life for the owner of a startup can be stressful and filled with rapid-fire choices that can hobble progress and add an undue burden. Luckily for startup owners everywhere automation has become a ubiquitous technology and is innovating in the business sector every day. This technology brings with it the possibility for owners to run a business in a cost-effective way without sacrificing productivity.

article thumbnail

Cracking Down on Criminals' Use of Encrypted Communications

Data Breach Today

An analysis of a crackdown on criminals' use of encrypted communications leads the latest edition of the ISMG Security Report. Also: a preview of ISMG's Healthcare Security and Legal & Compliance summits, including expert insights on vendor risk management.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

VMware releases security patches for a critical virtual machine escape flaw

Security Affairs

VMware released security patches for a critical virtual machine (VM) escape vulnerability that was recently discovered at a Chinese hacking contest. VMware has released security patches for a critical virtual machine (VM) escape vulnerability (CVE-2018-6981 and CVE-2018-6982) that was recently discovered by the researcher Zhangyanyu at the Chinese GeekPwn2018 hacking contest.

Security 108

More Trending

article thumbnail

Data from ‘almost all’ Pakistani banks stolen, Pakistani debit card details surface on the dark web

Security Affairs

According to the head of the Federal Investigation Agency’s (FIA) cybercrime wing.almost all Pakistani banks were affected by a recent security breach. Almost all Pakistani banks were affected by a recent security breach, the shocking news was confirmed by the head of the Federal Investigation Agency’s (FIA) cybercrime wing. “According to a recent report we have received, data from almost all Pakistani banks has been reportedly hacked,” FIA Cybercrimes Director retired Capt Mohammad

Sales 102
article thumbnail

The Pentagon is Publishing Foreign Nation-State Malware

Schneier on Security

This is a new thing : The Pentagon has suddenly started uploading malware samples from APTs and other nation-state sources to the website VirusTotal, which is essentially a malware zoo that's used by security pros and antivirus/malware detection engines to gain a better understanding of the threat landscape. This feels like an example of the US's new strategy of actively harassing foreign government actors.

article thumbnail

Guy Fawkes Day – LulzSec Italy hit numerous organizations in Italy

Security Affairs

Guy Fawkes Day, November 5th 2018 – LulzSec Italy announced credit a string of hacks and leaks targeting numerous systems and websites across Italy. In celebration of Guy Fawkes Day, November 5th 2018, LulzSec Italy announced credit for a massive string of hacks and leaks targeting numerous systems and websites across Italy. Included in the breaches were Italy’s National Research Center , The Institute for Education Technologies , the ILIESI Institute for the European Intellectual Le

article thumbnail

GDPR automated decision-making and profiling: what are the requirements?

IT Governance

In addition to data subjects’ rights to be informed, of access, to rectification, to erasure, to restrict processing, to data portability and to object, the EU’s GDPR (General Data Protection Regulation) sets out requirements relating to automated individual decision-making, including profiling. In brief: Profiling now has a distinct definition. Automated individual decision-making, including profiling, is restricted.

GDPR 88
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Snowden speaks about the role of surveillance firm NSO Group in Khashoggi murder

Security Affairs

Snowden warns of abuse of surveillance software that also had a role in the murder of the Saudi Arabian journalist Jamal Khashoggi. The popular US whistleblower Edward Snowden has reported the abuse of surveillance made by many governments, he blamed the Israeli company NSO Group for developing and selling surveillance software to Saudi Arabia. Speaking during a conference in Tel Aviv on Wednesday, Snowden explained that the spy software developed by NSO Group enabled the murder of dissident jou

Sales 93
article thumbnail

FIFA caught hook, line and sinker in phishing attack

IT Governance

Football world-governing body FIFA has admitted that its systems suffered a sustained phishing hack earlier this year. In March, more than 70 million documents and 3.4 terabytes of data were leaked to the weekly German news magazine Der Spiegel by the founder of the Football Leaks platform. In light of these findings, Der Spiegel, in cooperation with 14 other European news organisations, has launched a weekly series disclosing FIFA’s secrets.

article thumbnail

Privacy and Security of Data at Universities

Schneier on Security

Interesting paper: " Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier ," by Christine Borgman: Abstract: As universities recognize the inherent value in the data they collect and hold, they encounter unforeseen challenges in stewarding those data in ways that balance accountability, transparency, and protection of privacy, academic freedom, and intellectual property.

Privacy 82
article thumbnail

How Scottish organisations can ensure business continuity in a cyber world

IT Governance

As winter draws in, Scottish organisations will be preparing for the harsher weather and its knock-on effects. With last year’s severe conditions costing Scotland’s economy hundreds of millions of pounds, ensuring the continuity of critical business operations north of the border has never been more important. However, it’s not just the wilder weather that can greatly disrupt operations.

Paper 78
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Vulnerabilities in our Infrastructure: 5 Ways to Mitigate the Risk

Dark Reading

By teaming up to address key technical and organizational issues, information and operational security teams can improve the resiliency and safety of their infrastructure systems.

Risk 73
article thumbnail

CNIL Publishes DPIA Guidelines and List of Processing Operations Subject To DPIA

Hunton Privacy

On November 6, 2018, the French Data Protection Authority (the “CNIL”) published its own guidelines on data protection impact assessments (the “Guidelines”) and a list of processing operations that require a data protection impact assessment (“DPIA”). Read the guidelines and list of processing operations (in French). CNIL’s Guidelines. The Guidelines aim to complement guidelines on DPIA adopted by the Article 29 Working Party on October 4, 2017, and endorsed by the European Data Protection Board

GDPR 73
article thumbnail

10 top cybersecurity predictions for 2019

Information Management Resources

Cyber attacks and data breaches continue to increase in both frequency and intensity, and organizations can expect more of the same in 2019. Here are 10 trends that are putting firms at greatest risk.

article thumbnail

What You Should Know About Grayware (and What to Do About It)

Dark Reading

Grayware is a tricky security problem, but there are steps you can take to defend your organization when you recognize the risk.

IT 81
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

3-2-1 Backup Rule

The Texas Record

As we all are aware, processes and techniques for managing data are constantly evolving in our industry, following trends and new developments in Information Technology. Backing up essential and/or vital information has gotten easier to do and should be included in everyone’s archiving and data duplication protocols. If you attended our Managing Electronic Records classes, then you’ve heard us mention the Lots of Copies Keep Stuff Safe (LOCKSS) method.

Paper 65
article thumbnail

Announcing OpenText Content Services Release 16 EP5

OpenText Information Management

Content services are a key part of any information management strategy, connecting information from across the organization with the people and systems that need it. OpenText™ Content Services are leveraged by businesses and government organizations to: Fuel the digital workplace: Leverage enterprise content management tools that ensure rapid access to information when, where and how … The post Announcing OpenText Content Services Release 16 EP5 appeared first on OpenText Blogs.

article thumbnail

Inside CSAW, a Massive Student-Led Cybersecurity Competition

Dark Reading

Nearly 400 high school, undergraduate, and graduate students advance to the final round of New York University's CSAW games.

article thumbnail

Sue Gordon: Silicon Valley Should Work With the Government

WIRED Threat Level

In an expansive on-the-record interview with WIRED, the principal deputy director of national intelligence made her pitch for public-private partnerships.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Guilty Plea Made in Massive International Cell Phone Fraud Case

Dark Reading

A former West Palm Beach resident is the fifth defendant to plead guilty in a case involving thousands of victims.

77
article thumbnail

BayLDA Publishes Review on Audits

Hunton Privacy

On November 7, 2018, the Data Protection Authority of Bavaria for the Private Sector (the “BayLDA”) issued a press release describing audits completed and pending in Bavaria since the EU General Data Protection Regulation (“GDPR”) took force. The BayLDA initially focused on informing entities about changes brought by the GDPR. Subsequently, this year the BayLDA launched data protection investigations throughout Bavaria to check compliance, raise awareness of the risks inherent to the processing

GDPR 59
article thumbnail

Lawsuits Aim Billions in Fines at Equifax and Ad-Targeting Companies

Threatpost

The results could start a wave of major damages for companies that collect and sell consumer information.

GDPR 78
article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

Consumer privacy rights in California are well established. The California Constitution expressly grants California citizens a right to privacy. And existing California law provides for the confidentiality of personal information in various contexts, including under the Online Privacy Protection Act, the Privacy Rights for California Minors in the Digital World Act, and Shine the Light.

Privacy 58
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

8 Top Cyber Insurance Vendors

eSecurity Planet

Cyber insurance is one more way to manage cybersecurity risk. Here are the top cyber insurance vendors that can help.

article thumbnail

Weekly Update 112

Troy Hunt

Wow, didn't the passwords discussions go nuts this week! Passwords suck and they must die, they're never going to die, people are using bad ones, people should be able to use bad ones, developers are at fault and my personal favourite in the "how on earth did you reach that conclusion" category, I should actually do something to educate people about passwords rather than blaming them for using bad ones.

article thumbnail

Embracing the Cybersecurity ‘Grey Space’

Threatpost

Security teams carefully monitor potential threat activity, but incidents aren’t always black and white.