Wed.Nov 22, 2017

article thumbnail

Uber Concealed Breach of 57 Million Accounts For A Year

Data Breach Today

Firm Paid Hackers $100,000, But Was It Bug Bounty Reward or Extortion Payoff? Uber paid hackers $100,000 to keep quiet about a 2016 breach that exposed 57 million accounts belonging to customers and drivers, Bloomberg reports. But was the payment a bug bounty, as Uber has suggested, or really an extortion payoff and hush money?

IT 196
article thumbnail

'Vapor Wake' Explosive-Sniffing Dogs Help Protect the Thanksgiving Day Parade

WIRED Threat Level

This year, a team of Labrador retrievers trained to sniff out body-worn explosives will help lock down NYC's Macy's Thanksgiving Day Parade.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Driving Privacy Regulators Crazy: UK Probes Uber Breach

Data Breach Today

'Deliberately Concealing Breaches' Escalates Fines, Privacy Watchdog Warns Britain's data privacy watchdog has launched a probe of the massive 2016 data breach suffered by Uber. More than 12 months after the breach, the ride-hailing service is scrambling to notify 57 million individuals across multiple countries that their personal details were exposed.

Privacy 136
article thumbnail

‘Tis the season for proliferating payment options…and risk

Thales Cloud Protection & Licensing

It’s hard to believe that the holiday season is already upon us with both the biggest online and offline shopping events just around the corner. The one-two punch of Black Friday and Cyber Monday are the highest volume shopping days of the year and finding the best deals can be a hobby in itself. In 2016, 108.5 million Americans shopped online over the long weekend.

Risk 90
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Feds Indict Iranian Over 'Game of Thrones' Hacks

Data Breach Today

Iranian National Charged With Extortion, Leaking Unreleased Episodes U.S. prosecutors have unsealed an indictment against an Iranian man charged with trying to extort entertainment company HBO for $6 million in bitcoins. The case marks a rare public naming of someone accused of cyber extortion, which poses an increasing risk for all organizations.

Risk 136

More Trending

article thumbnail

Fast and Furious Data Breach Scandal Overtakes Uber

Data Breach Today

Ride-Sharing Firm Reportedly Fired CSO for Concealing 2016 Breach Move over Equifax. There's a massive new data breach notification in town. And Uber is still struggling to come clean about why it waited for one year to notify data breach victims and regulators.

article thumbnail

Websites Use Session-Replay Scripts to Eavesdrop on Every Keystroke and Mouse Movement

Schneier on Security

The security researchers at Princeton are posting. You may know that most websites have third-party analytics scripts that record which pages you visit and the searches you make. But lately, more and more sites use "session replay" scripts. These scripts record your keystrokes, mouse movements, and scrolling behavior, along with the entire contents of the pages you visit, and send them to third-party servers.

article thumbnail

Email Security and the New DHS Directive

Data Breach Today

U.S. government agencies now find themselves having to comply with Binding Operational Directive 18-01 to enhance email and web security. What are the immediate tasks? Patrick Peterson of Agari offers insight and advice.

Security 111
article thumbnail

Puget Sound Energy achieves award-winning content management and customer engagement

OpenText Information Management

What happens when you successfully modernize customer communications and deliver a centralized SAP-integrated content management solution? You create a superior customer experience, improve business productivity, and win an OpenText™ Elite™ Award for SAP Integration Excellence! Puget Sound Energy (PSE), the largest utility in the Pacific Northwest, embarked on an ambitious project to consolidate and replace … The post Puget Sound Energy achieves award-winning content management and custom

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Email Infiltration and DMARC

Data Breach Today

We all see the headlines about high-profile breaches that started because of a phishing exploit. But how severe is the global email infiltration problem? Patrick Peterson of Agari offers insight and advice.

Phishing 111
article thumbnail

Samsung Pay Leaks Mobile Device Information

Dark Reading

Researcher at Black Hat Europe will show how Samsung Pay's security falls short and ways attackers could potentially bypass it.

article thumbnail

What is ISO 27001 certification?

IT Governance

ISO 27001 certification is carried out after an information security management system (ISMS) aligned to the international information security standard, ISO 27001 has been implemented. By implementing an ISMS certified to ISO 27001, your organisation can win new business, protect and enhance your reputation and help comply with business, legal, contractual and regulatory requirements.

article thumbnail

Time to Pull an Uber and Disclose your Data Breach Now

Dark Reading

There is never a good time to reveal a cyber attack. But with EU's GDPR looming, the fallout is only going to get harder and more expensive if you wait.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

HP to Patch Bug Impacting 50 Enterprise Printer Models

Threatpost

HP said dozens of enterprise-class printer models will receive a patch for an arbitrary code execution vulnerability sometime this week.

66
article thumbnail

3 Pillars of Cyberthreat Intelligence

Dark Reading

Strong enterprise cybersecurity programs must be a built on a framework that incorporates strategic, operational, and tactical leadership and goals.

article thumbnail

7 types of malware you need to look out for

IT Governance

Malware is simply malicious software. It’s a clade of cyber threats, alongside things such as spam, social engineering and phreaking, and has evolved over the years. Computers that have been infected by malware might: Slow down, freeze or crash; Create new files or modify or delete existing ones; Automatically run, turn off or reconfigure programs; or.

article thumbnail

Uber Paid Hackers $100K to Conceal 2016 Data Breach

Dark Reading

The ride-sharing company has confirmed an October 2016 data breach that compromised 57 million accounts.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How GDPR will impact data management practices

Information Management Resources

A firm doesn't have to have physical operations in Europe to be affected by the new regulation, and failure to prepare can have severe ramifications, including crippling fines.

GDPR 53
article thumbnail

Intel Firmware Flaws Found

Dark Reading

Another big firmware security issue affecting Intel processors, requires OEM updates.

article thumbnail

3 ways to consolidate data security and disaster recovery strategies

Information Management Resources

While IT organizations need a thoughtful strategy to prevent cybersecurity issues, they also need a plan B that equates to no unscheduled downtime.

article thumbnail

Black Friday Warning: Holiday Cyber Attacks Expected to Increase by More Than 20 Percent

eSecurity Planet

Such attacks often begin around the Thanksgiving holiday.

48
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Data security confidence on the rise, but so are attacks

Information Management Resources

The majority of U.S. firms are confident in their current DDoS mitigation, despite the fact that 69 percent have suffered a successful cyberattack in the last 12 months.

article thumbnail

Giving Thanks

Archives Blogs

Thanksgiving in the Suwannee Room, 1941. From all of us here at FSU Special Collection & Archives, we wish you and your family a safe and lovely Thanksgiving holiday. Special Collections & Archives will close at 11:30am on Wednesday, November 22 and remain closed Thursday and Friday, November 23 and 24. We will return to our normal operating hours on Monday, November 27.

article thumbnail

Hackers have lots of ways to ruin a bitcoin trader's day

Information Management Resources

Saying the cryptocurrency is un-hackable is of small comfort to those who've lost money through cracks in its ecosystem of exchanges, intermediaries and money-raising schemes.

IT 31
article thumbnail

Uber Concealed Hack That Exposed 57 Million People’s Data

Information Management Resources

The ride-hailing firm ousts its CSO and one of his deputies for their roles in keeping the hack under wraps, which included a $100,000 payment to the attackers.

IT 30
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New York City creates guidelines to help coding schools go legit

Information Management Resources

Although these programmer 'bootcamps' barely existed five years ago, the U.S. now has 95 full-time institutions across 40 states.

30
article thumbnail

BlackRock, king of indexes, snubs passive for bot-built ETFs

Information Management Resources

The firm will rely on machine learning, natural language processing and algorithms for its new funds.

IT 29
article thumbnail

AI seen as boon to both economy and jobs

Information Management Resources

Early adopters have training programs in place, Deloitte survey finds.