Fri.Oct 26, 2018

article thumbnail

British Airways Finds Hackers Stole More Payment Card Data

Data Breach Today

Investigators Now Count 565,000 Data Breach Victims British Airways has discovered that hackers compromised payment card data and personal details for 185,000 more customers than it had originally suspected and that its systems were first breached not in August, but April. The airline now counts 565,000 data breach victims.

article thumbnail

Mirai Co-Author Gets 6 Months Confinement, $8.6M in Fines for Rutgers Attacks

Krebs on Security

The convicted co-author of the highly disruptive Mirai botnet malware strain has been sentenced to 2,500 hours of community service, six months home confinement, and ordered to pay $8.6 million in restitution for repeatedly using Mirai to take down Internet services at Rutgers University , his former alma mater. Paras Jha, in an undated photo from his former LinkedIn profile.

IoT 175
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fresh GandCrab Decryptor Frees Data for Free

Data Breach Today

Crypto-Locking Ransomware Cracked Thanks to Gang's Shoddy Code Quality Good news for anyone whose data has been crypto-locked by attackers wielding GandCrab, the year's most aggressive strain of ransomware: You may be able to get your data back, thanks to a free decryptor.

article thumbnail

Department of Interior Updating Their Records Schedule

National Archives Records Express

Many of our readers may have seen recent items in the news media, social medi a or on listservs that make it seem like the Department of the Interior is making an unusual request to destroy Federal Records. We have been busily responding to inquiries about this schedu le from individuals and the press for a few days. Those of you who work in records management understand the records scheduling process, but to others, this process can seem mysterious.

Archiving 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK Facebook Fine: Just the Beginning?

Data Breach Today

This week's edition of the ISMG Security Report features an analysis of whether the U.K.'s fine of Facebook for the Cambridge Analytica scandal is just the beginning of regulatory enforcement action. Plus: A potential settlement of Yahoo breach lawsuit and tips on securing data in the cloud.

Cloud 173

More Trending

article thumbnail

How to Use FDA's Medical Device Cybersecurity 'Playbook'

Data Breach Today

A new "playbook" co-developed by the Food and Drug Administration and Mitre Corp. aims to assist healthcare delivery organizations in responding to cybersecurity incidents involving medical devices. Julie Connolly, who helped develop the guide, explains how to use it.

article thumbnail

How to claim compensation for a data protection breach

IT Governance

The EU GDPR (General Data Protection Regulation) has heralded a new era in which individuals have greater control over their personal data. Organisations need to be much clearer about what information they’re processing, what it’s being used for and how data subjects can review and request changes to their data. But did you know the GDPR has also made it easier for individuals to claim compensation when an organisation fails to meet its data protection requirements?

GDPR 99
article thumbnail

Cathay Pacific Breach: What Happened?

Data Breach Today

With Details Sketchy, Analysts Weigh In on Possible Contributing Factors In the wake of a breach at Hong Kong's Cathay Pacific airlines that involved unauthorized access to personal details on 9.4 million passengers, security experts are weighing in on factors that might have contributed to the incident. So far, the airline has provided only sketchy details.

Access 141
article thumbnail

CVE-2018-14665 privilege escalation flaw affects popular Linux distros

Security Affairs

Security researcher discovered a highly critical vulnerability (CVE-2018-14665) in X.Org Server package that affects major Linux distributions. The Indian security researcher Narendra Shinde has discovered a highly critical vulnerability (CVE-2018-14665) in X.Org Server package that affects major Linux distributions, including OpenBSD, Debian, Ubuntu, CentOS, Red Hat, and Fedora.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

3 Keys to Reducing the Threat of Ransomware

Dark Reading

Following these steps could mean the difference between an inconvenience and a multimillion-dollar IT system rebuild -- for the public and private sectors alike.

article thumbnail

Major data leak at Cathay Pacific

IT Governance

Hong Kong-based airline Cathay Pacific has announced a major data breach affecting up to 9.4 million of its customers. The breach also affects Cathay’s regional airline, Cathay Dragon. What data has been compromised? The breach exposed a broad selection of data, including: names. nationalities. dates of birth. phone numbers. emails. addresses. passport numbers. identity card numbers. frequent flyer programme membership numbers. customer service remarks, and. historical travel information.

article thumbnail

British Airways: additional 185,000 passengers may have been affected

Security Affairs

The data breach suffered by the British Airways airline is worse than initially thought, according to IAG firm that wons the airline further 185,000 customers may have had impacted in the incident. The data breach suffered by the British Airways airline is worse than initially thought, according to IAG firm that owns the airline, further 185,000 customers may have had impacted in the incident.

article thumbnail

DeepPhish: Simulating Malicious AI to Act Like an Adversary

Dark Reading

How researchers developed an algorithm to simulate cybercriminals' use of artificial intelligence and explore the future of phishing.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Feds Tracked Down Mail Bomb Suspect Cesar Sayoc

WIRED Threat Level

At a press conference Friday, officials detailed how they identified and found Cesar Sayoc, who has been arrested in connection with a series of mail bombs targeting prominent liberals and CNN.

article thumbnail

British Airways: 185K Affected in Second Data Breach

Dark Reading

The carrier discovered another breach while investigating its largest-ever data breach, disclosed in September.

article thumbnail

The Importance of Mobile on the Future of Scanning

Info Source

It seems we have somewhat forgotten about the potential impact of mobile document scanning and capture. Back in 2011, when only 35% of Americans identified themselves as owning a smart phone, Harvey Spencer Associates projected that by 2015, there would be $1.5 billion worth of software sold related to mobile capture, up from $200 million in 2011. Since then, while smart phone usage has more than doubled, HSA’s projected revenue growth for mobile capture software has not been realized.

article thumbnail

Iran's New Facebook Trolls Are Using Russia's Playbook

WIRED Threat Level

Facebook took down another Iranian-based network of phony accounts Friday. This new campaign focused on American politics—and it was successful.

IT 71
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

ThreatList: 1 Out of 5 Would Ditch a Business After a Data Breach

Threatpost

A full 21 percent of survey respondents would walk away from a business permanently after a major hack.

article thumbnail

Detecting Fake Videos

Schneier on Security

This story nicely illustrates the arms race between technologies to create fake videos and technologies to detect fake videos: These fakes, while convincing if you watch a few seconds on a phone screen, aren't perfect (yet). They contain tells, like creepily ever-open eyes, from flaws in their creation process. In looking into DeepFake's guts, Lyu realized that the images that the program learned from didn't include many with closed eyes (after all, you wouldn't keep a selfie where you were blin

Paper 55
article thumbnail

British Airways Data Breach Takes Off Again with 185K More Victims

Threatpost

The news comes on the heels of a breach at Cathay Pacific exposing 9.4 million people.

article thumbnail

FTC Offers Small Businesses Free Cybersecurity Resources

Dark Reading

Cybersecurity for Small Businesses campaign kicks off.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

DemonBot Fans DDoS Flames with Hadoop Enslavement

Threatpost

An unsophisticated but effective botnet is targeting exposed cloud servers and racking up millions of infections.

Cloud 68
article thumbnail

7 disruptive technologies that many CIOs aren't prepared for

Information Management Resources

While several emerging technologies are grabbing plenty of headlines this year, there are many “digital disruptions” that may catch chief information officers off guard.

article thumbnail

PoC Attack Leverages Microsoft Office and YouTube to Deliver Malware

Threatpost

The attack executes with no warning to the user.

79
article thumbnail

Interview: CJ Anderson ??Maximum innovation, minimum disruption

CILIP

Rob Mackinlay talks to CJ Anderson, Head of Information and Research at Linklaters about the complex challenges of using internal data to support lawyers in their client facing work. The information revolution upsets traditional business models in every sector. At Linklaters ? one of the UK?s top five law firms ? the challenge is to make information management and technology useful without disrupting a successful business model. ?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Document Management for Educational Institutions

Armstrong Archives

Colleges and universities throughout the United States handle a huge amount of data, much of it on paper, in the form of applications, enrollment records, student transcripts, human resource forms, financial documents and much more. Any educational institution that receives a certain type of funding from the U.S. Dept of Education is required by federal law to protect the privacy of student education records.

article thumbnail

California Consumer Privacy Act: The Challenge Ahead – CCPA and Employee Data

HL Chronicle of Data Protection

This is the seventh installment in Hogan Lovells’ series on the California Consumer Privacy Act. The application of the California Consumer Protection Act of 2018 (“CCPA”) to employee data has been the subject of much debate since the first version of the bill was introduced on June 21, 2018 (just days prior to its enactment on June 28). Under a plain language reading of the CCPA, the law likely applies to employee data.

Privacy 40
article thumbnail

FAQ Redux: Can a state agency destroy a paper original after scanning?

The Texas Record

We originally published an article addressing this question back in 2013, but some state agencies have wondered if the answer has changed since the administrative rules were updated this year. So, let’s take a look at what the new edition of Bulletin 1 says. While there is not an explicit paragraph in the rules stating that any record can be store electronically, in Section 6.92(4), the definition of an electronic state record references Government Code, Section 441.189(a), which states: A

Paper 40