Wed.Jan 30, 2019

article thumbnail

Yahoo's Proposed Data Breach Lawsuit Settlement: Rejected

Data Breach Today

Judge Slams Attorneys' Fees, Security Shortcomings in $50 Million Proposal Court order: Yahoo's proposed settlement for a class-action lawsuit must return to the drawing board, after a federal judge said a proposal to place $50 million into a settlement fund for breach victims lacked security specifics and awarded excessive attorneys' fees. The case could go to trial.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Late last year, Atrium Health disclosed it lost sensitive data for some 2.65 million patients when hackers gained unauthorized access to databases operated by a third-party billing vendor. Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — witho

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Intelligence Chiefs Expect More Cyberattacks Against US

Data Breach Today

China, Russia, Iran and North Korea Pose Increasing Risk, Congress Hears Efforts to exploit U.S. election security continue, and China, Russia, Iran and North Korea's "cyber espionage, attack and influence capabilities" pose an increasing threat, Director of National Intelligence Dan Coats told the Senate Intelligence Committee.

Risk 187
article thumbnail

New AIIM Research: Leveraging Machine Learning Capabilities

AIIM

There‘s a lot of excitement about Artificial Intelligence and business automation these days, and for good reason. Developments in AI — and its sidekicks “Deep Learning” and “Machine Learning” — bring the promise of transforming work as we know it. Those transformed work processes will operate in a completely different way: fully automated and autonomous, with smart machines doing the work.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Cryptocurrency Money Laundering: Alarming New Trends

Data Breach Today

Despite the value of cryptocurrency plummeting since 2017, cybercriminals and rogue nations are still using it to launder funds. One recently discovered scheme designed to evade AML detection is "crypto dusting," according to CipherTrace's Dave Jevans.

IT 165

More Trending

article thumbnail

A CISO on the Value of Endpoint Detection and Response

Data Breach Today

Endpoint detection and response tools and other related security technologies are critical weapons for defending against cyberattacks, says Larry Whiteside, the new CISO at Greenway Health, an electronic health records company.

Security 149
article thumbnail

Iran-Linked APT39 group use off-the-shelf tools to steal data

Security Affairs

An Iran-linked cyber-espionage group tracked as APT39 is carrying out a widespread campaign using a broad range of custom and off-the-shelf tools. The APT39 cyberespionage group is carrying out a widespread campaign using a broad range of custom and off-the-shelf tools. The group has been active at least since November 2014, its operations are aligned with the ones attributed to the Chafer group and OilR i g groups, it brings together TTPs used by both actors.

article thumbnail

Wake up to the reality of the GDPR: What you need to know about compliance

IT Governance

With a mammoth GDPR fine handed out to Google last week, it’s time for organisations to reassess their understanding of the Regulation. We’re through the eye of the GDPR (General Data Protection Regulation) storm. May 2018 brought a whirlwind of panic as organisations rushed to meet the compliance deadline, but it was followed by months of unnerving silence.

GDPR 86
article thumbnail

Reading the ENISA Threat Landscape Report 2018

Security Affairs

According to the ENISA Threat Landscape Report 2018, 2018 has brought significant changes in the techniques, tactics, and procedures associated with cybercrime organizations and nation-state actors. I’m proud to present you the ENISA Threat Landscape Report 2018 , the annual report published by the ENISA ETL group that provides insights on the evolution of the cyber threats in 2018. 2018 was characterized by significant changes in the cyber threat landscape especially for TTPs associated w

IoT 87
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Access Control Lists: 6 Key Principles to Keep in Mind

Dark Reading

Build them carefully and maintain them rigorously, and ACLs will remain a productive piece of your security infrastructure for generations of hardware to come.before adding them to the toolbox.

Access 80
article thumbnail

Facebook paid teens $20 to install a Research App that spies on them

Security Affairs

Facebook is paying teens $20 a month to use its VPN app, called Facebook Research, that monitors their activity via their mobile devices. Facebook is paying teens $20 a month to use its VPN app, called Facebook Research, that monitors their activity via the mobile devices. 2018 was a terrible year for Facebook that was in the middle of the Cambridge Analytica privacy scandal.

Privacy 86
article thumbnail

Security Analysis of the LIFX Smart Light Bulb

Schneier on Security

The security is terrible : In a very short limited amount of time, three vulnerabilities have been discovered: Wifi credentials of the user have been recovered (stored in plaintext into the flash memory). No security settings. The device is completely open (no secure boot, no debug interface disabled, no flash encryption). Root certificate and RSA private key have been extracted.

article thumbnail

Hackers Are Passing Around a Megaleak of 2.2 Billion Records

WIRED Threat Level

The so-called Collections #1-5 represent a gargantuan, patched-together Frankenstein of rotting personal data.

ROT 98
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Open Source & Machine Learning: A Dynamic Duo

Dark Reading

If machine learning can be demonstrated to solve particular use cases in an open forum, more analysts will be willing to adopt the technology in their workflows.

80
article thumbnail

Facebook Hires Up Three of Its Biggest Privacy Critics

WIRED Threat Level

Can a trio of privacy advocates effect change from within Facebook—or will they be stifled by corporate bureaucracy?

Privacy 96
article thumbnail

Measuring the value of Watson Studio and Watson Knowledge Catalog

IBM Big Data Hub

IBM commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study to examine the value of an investment in IBM Watson Studio and Watson Knowledge Catalog.

75
article thumbnail

Massive DDoS Attack Generates 500 Million Packets per Second

Dark Reading

January 10 torrent involved nearly four times as many packets as last year's huge attack on GitHub, says Imperva.

93
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What is Jamf doing for healthcare?

Jamf

With Apple devices and Jamf at the center of the patient experience, healthcare providers can engage, educate and entertain patients in ways never before imaginable. See how.

article thumbnail

Rubrik Data Leak is Another Cloud Misconfiguration Horror Story

Dark Reading

A server security mishap exposed vast stores of data belonging to clients of Rubrik, a security and cloud management firm.

Cloud 79
article thumbnail

Why Facebook's Banned 'Research' App Was So Invasive

WIRED Threat Level

Until Apple revoked its privileges Wednesday, Facebook was paying iOS users $20 a month to download and install the data-sucking application.

IT 71
article thumbnail

Discover Issues New Cards Following Data Breach

Dark Reading

The credit card company reports Discover's card systems were not involved in the breach, discovered in August 2018.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Attackers Can Track Kids’ Locations via Connected Watches

Threatpost

A severe flaw exposes sensitive information for 35,000 kids and 20,000 individual accounts.

IoT 78
article thumbnail

Yes, You Can Patch Stupid

Dark Reading

Before you start calling users stupid, remember that behind every stupid user is a stupider security professional.

article thumbnail

New logical imaging feature now available with OpenText Tableau TX1 2.0

OpenText Information Management

OpenText™ is excited to announce the release of the new Logical Imaging feature for the Tableau Forensic Imager TX1 2.0. This major release is available in Tableau Firmware Update version 7.25. The Tableau TX1 is a powerful and intuitive forensic imager that offers superior local and networked imaging performance with no compromises. The latest version … The post New logical imaging feature now available with OpenText Tableau TX1 2.0 appeared first on OpenText Blogs.

article thumbnail

Iran Ups its Traditional Cyber Espionage Tradecraft

Dark Reading

Newly named APT39 hacking team exemplifies Iran's growing sophistication in nation-state hacking operations.

IT 77
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What is predictive analytics?

OpenText Information Management

Like Artificial Intelligence, predictive analytics is not a new concept. It has been around for many years and, like AI, it has recently come to prominence through the need to make sense of the vast amount of structured and unstructured data that every enterprise is producing. This blog post examines the practice of predictive analytics … The post What is predictive analytics?

article thumbnail

Shodan: Cybersecurity Tool or Hacker’s Yellow Pages?

Adam Levin

The recent data leak of the Oklahoma Security Commission that compromised 17 years’ worth of FBI investigations, the NGO leak of 4 million internship applications, and the exposure of 114 million businesses and individuals’ data online and many others have one common thread: each of them was found on Shodan , the self-proclaimed “world’s first search engine for Internet-connected devices.”.

article thumbnail

Apple Blasts Facebook Over Data-Sucking ‘Research’ App

Threatpost

Another one of Facebook's apps has been banned from Apple's ecosystem due to the level of data that it collects and how it was distributed.

IT 58