Fri.Aug 02, 2019

article thumbnail

What We Can Learn from the Capital One Hack

Krebs on Security

On Monday, a former Amazon employee was arrested and charged with stealing more than 100 million consumer applications for credit from Capital One. Since then, many have speculated the breach was perhaps the result of a previously unknown “zero-day” flaw, or an “insider” attack in which the accused took advantage of access surreptitiously obtained from her former employer.

Metadata 231
article thumbnail

GAO Blasts Cybersecurity Efforts of Federal Agencies

Data Breach Today

Watchdog Points to Numerous Risk Management Shortcomings Some 23 federal agencies come up short in their cybersecurity efforts even as attacks on their IT infrastructures continue to grow and concerns about foreign interference in the upcoming 2020 elections persist, according to a Government Accountability Office report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Brexit Impacts the Future of Europe’s Cybersecurity Posture

Thales Cloud Protection & Licensing

The British parliament has been unable to agree the exit package from the European Union. With the possibility of a “no deal” departure looming, EU leaders have granted a six-month extension to Brexit day. But the uncertainty that still lingers with regards to Britain’s future, creates various opportunities which cyber criminals could try to exploit.

article thumbnail

Analysis: The Capital One Breach

Data Breach Today

The latest edition of the ISMG Security Report analyzes the root causes of the Capital One data breach. Also featured: breach remediation advice and compliance with New York's new third-party risk management requirements.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

You May Say I’m A Dreamer.But I’m Not the Only One

AIIM

Steps to Make Your Paperless Office Dream a Reality. According to AIIM research , 75% of the organizations we surveyed view digital transformation as “important” or “very important” to their organization. But why? Most respondents pointed to operational savings as a result of a more digital and connected workflow. In other words: cut the paper, cut the inefficiencies.

More Trending

article thumbnail

More on Backdooring (or Not) WhatsApp

Schneier on Security

Yesterday, I blogged about a Facebook plan to backdoor WhatsApp by adding client-side scanning and filtering. It seems that I was wrong, and there are no such plans. The only source for that post was a Forbes essay by Kalev Leetaru, which links to a previous Forbes essay by him, which links to a video presentation from a Facebook developers conference.

Privacy 96
article thumbnail

Standard Would Enable Instant Messaging Among EHR Platforms

Data Breach Today

DirectTrust's new effort to develop a standard for instant messaging in healthcare could potentially help providers securely communicate in real time over multiple platforms, says Scott Stuewe, the nonprofit alliance's president and CEO.

article thumbnail

Welcoming the Irish Government to Have I Been Pwned

Troy Hunt

Over the last year and a bit I've been working to make more data in HIBP freely available to governments around the world that want to monitor their own exposure in data breaches. Like the rest of us, governments regularly rely on services that fall victim to attacks resulting in data being disclosed and just like the commercial organisations monitoring domains on HIBP, understanding that exposure is important.

article thumbnail

Disabling Security Cameras with Lasers

Schneier on Security

There's a really interesting video of protesters in Hong Kong using some sort of laser to disable security cameras. I know nothing more about the technologies involved.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Over 1 Million payment cards from South Korea sold on the Dark Web

Security Affairs

Data belonging to more than one million payment cards from South Korea surfaced in the dark web over the past two months. Experts noticed a spike in the number of stolen payment card details belonging to users from South Korea over the past two months. Card details from over one million payments cards from South Korea was offered for sale on the Dark Web.

Sales 84
article thumbnail

How Privacy Laws Hurt Defendants

Schneier on Security

Rebecca Wexler has an interesting op-ed about an inadvertent harm that privacy laws can cause: while law enforcement can often access third-party data to aid in prosecution, the accused don't have the same level of access to aid in their defense: The proposed privacy laws would make this situation worse. Lawmakers may not have set out to make the criminal process even more unfair, but the unjust result is not surprising.

Privacy 83
article thumbnail

Why Every Organization Needs an Incident Response Plan

Dark Reading

OK, perhaps that's self-evident, so how come it far too often still takes an incident to trigger planning?

IT 106
article thumbnail

Cops Are Offering Ring Doorbell Cameras in Exchange for Info

WIRED Threat Level

Amazon-owned Ring has cozied up to law enforcement, and critics say it's using police departments to help market its surveillance cameras.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Blackhat Best Practice

Adam Shostack

Shortly, I’m off to Blackhat. My Threat Modeling Intensive classes both sold out (thank you!). Nearly a decade ago, I put forth a set of best practices: Breath mints Ricola Purell Advil Gatorade This year, I’m adding a travel humidifier. I’ve been using this one, and it really needs to soak for 10 minutes, but then it adds a nice stream of moisture to the room.

IT 76
article thumbnail

US Utilities Hit with Phishing Attack

Dark Reading

An email phishing attack, thought to be from a nation-state actor, claims that engineers have failed licensing exams.

article thumbnail

3 business realities fueling the need for enterprise data preparation

IBM Big Data Hub

The pressure is rising for business users, automation, and governed data lakes to drive business value. Learn how enterprise data preparation fits in.

article thumbnail

Critical Bug in Android Antivirus Exposes Address Books

Threatpost

Comprehensive testing of 21 free Android antivirus apps revealed big security vulnerabilities and privacy concerns; especially for AEGISLAB, BullGuard, dfndr and VIPRE.

Privacy 72
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

NEW Training Opportunity: Managing Social Media Records – Live Webinar

The Texas Record

Please join us on Wednesday, August 28, 2019, at 11:00 a.m. Central Time , when we will be presenting a free 60-minute webinar on Managing Social Media Records. This presentation will cover the basics of social media retention, capture, disposition, and policy management for both local governments and state agencies. Have you ever wondered what record series your agency’s Facebook posts fall under?

article thumbnail

Learn to Safeguard Critical Industrial Targets at Black Hat USA

Dark Reading

Cybersecurity experts will share their latest insights and strategies for protecting industrial sites and equipment, from electric motors to satellites.

article thumbnail

Nation-State APTs Target U.S. Utilities With Dangerous Malware

Threatpost

Researchers spotted the never-before-seen LookBack malware being used in spearphishing campaigns against three U.S. utilities.

article thumbnail

Capital One: What We Should Learn This Time

Dark Reading

Where Capital One went wrong, what the bank did right, and more key takeaways from the latest mega-breach.

87
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

6 Android Phone Encryption Pros and Cons You Should Know

Productivity Bytes

Encryption is a hot topic lately, especially as people have growing concerns about data security. If you’re thinking about encrypting your Android, here are some Android phone encryption pros and cons to help you decide what to do. 1. It’s a Security Booster One of the top reasons why many people encrypt their Android devices … + Read More.

article thumbnail

90% of Enterprise iPhone Users Open to iMessage Spy Attack

Threatpost

Vast majority of Apple iOS users haven't updated to iOS 12.4, leaving themselves wide open to a public exploit.

Privacy 80
article thumbnail

Black Hat: A Summer Break from the Mundane and Controllable

Dark Reading

Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.

article thumbnail

What UK charities need to know about GDPR compliance

IT Governance

If you think that charities might be shown lenience under the GDPR (General Data Protection Regulation) , you’re wrong. The Regulation treats charities in much the same way as any organisation, because although they’re not using personal data to make a profit, they still run the risk of data breaches and privacy violations. This is a lesson that the transgender advocacy charity Mermaids learned recently , after it accidentally made internal emails containing confidential client information avail

GDPR 56
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Apple Suspends Siri Program After Privacy Backlash

Threatpost

Apple's Siri follows Amazon Alexa and Google Home in facing backlash for its data retention policies.

Privacy 73
article thumbnail

Black Hat: A Summer Break from the Mundane and Controllable

Dark Reading

Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.

article thumbnail

How IoT is revolutionizing facilities data management

Information Management Resources

IoT is finally entering its rightful place as a fully fledged enterprise technology that is revolutionizing many different industries and business functions.

IoT 60