Thu.Apr 25, 2019

article thumbnail

Facebook Takes $3 Billion Hit, Anticipating FTC Fine

Data Breach Today

Questions Loom About Whether Big Fines Will Prompt Privacy Reform Facebook has set aside $3 billion from its first quarter profit to pay for what is likely to be a record-breaking fine from the U.S. Federal Trade Commission. But will mega-fines lead to the reform of tech giants' questionable privacy and security practices?

Privacy 235
article thumbnail

Enterprise Architecture and Business Process: Common Goals Require Common Tools

erwin

For decades now, the professional world has put a great deal of energy into discussing the gulf that exists between business and IT teams within organizations. They speak different languages, it’s been said, and work toward different goals. Technology plans don’t seem to account for the reality of the business, and business plans don’t account for the capabilities of the technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TA505 Group Hides Malware in Legitimate Certificates

Data Breach Today

APT Group Targets Banks With Backdoor Malware to Penetrate Networks TA505, a sophisticated advanced persistent threat group, is now using legitimately signed certificates to disguise malware that can penetrate banking networks, security researchers warn in a new report.

Security 233
article thumbnail

‘If You Want to Kill Someone, We Are the Right Guys’

WIRED Threat Level

In a small Minnesota town, an IT technician found his way to the darkest corner of the web. Then he made a deadly plan.

IT 110
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Intelligence Agencies Seek Fast Cyber Threat Dissemination

Data Breach Today

'Five Eyes' Partners Commit to Putting Threat Intelligence Into Public's Hands The director of Britain's GCHQ intelligence agency said at this week's CyberUK conference that declassifying and putting "time-critical, secret information" for stopping online threats into the public's hands "in a matter of seconds" is an imperative.

212
212

More Trending

article thumbnail

'Virus Infection' Prohibits Access to Patient Records

Data Breach Today

Attack on a California Medical Group Affects Nearly 198,000 Individuals A recent cyberattack on a California medical imaging and oncology services provider, which prohibited access to patient data, is one of the largest health data breaches reported so far this year.

Access 196
article thumbnail

Marketing production in life sciences

OpenText Information Management

Most effective marketing strategies engage a plurality of channels to reach their target audience. Channels such as email, websites, microsites, mobile apps, social media, video ads and webinars are now the pivotal elements for an effective and compelling multi-faceted marketing strategy. But in regulated industries like life sciences, the ability to swiftly leverage new digital … The post Marketing production in life sciences appeared first on OpenText Blogs.

article thumbnail

Enhancing Office 365 to Securely Manage and Share Sensitive Information

Data Breach Today

Email is still the fundamental driver for Office 365 and the biggest risk to data security and compliance. Email is still the fundamental driver for Office 365 and the biggest risk to data security and compliance.

Security 171
article thumbnail

How a Nigerian ISP Accidentally Hijacked the Internet

Dark Reading

For 74 minutes, traffic destined for Google and Cloudflare services was routed through Russia and into the largest system of censorship in the world, China's Great Firewall.

81
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

AI everywhere: Modern predictive analytics

IBM Big Data Hub

Evolving from departmental, small-group AI projects to an enterprise data science platform can put your business on a path to significant competitive advantage. Those who don’t seize the opportunity risk falling behind the curve. But some might not be sure how to begin. If you’re interested in learning how to get going, our publication, A business guide to modern predictive analytics, is great place to start.

article thumbnail

Fooling Automated Surveillance Cameras with Patchwork Color Printout

Schneier on Security

Nice bit of adversarial machine learning. The image from this news article is most of what you need to know, but here's the research paper.

Paper 86
article thumbnail

A flaw in Rockwell Controller allows attackers to redirect users to malicious Sites

Security Affairs

A serious flaw in some of Rockwell Automation’s MicroLogix and CompactLogix PLCs can be exploited by a remote attacker to redirect users to malicious websites. Some of Rockwell Automation’s MicroLogix and CompactLogix PLCs are affected by a serious vulnerability can be exploited by a remote attacker to redirect users to malicious websites. The vulnerabilyt was tracked as CVE-2019-10955 and received a CVSS score of 7.1 (high severity), it affects MicroLogix 1100 and 1400, and CompactLogix 5370 (L

article thumbnail

ISO 27001 Lead Implementer, Lead Auditor and Internal Auditor – what’s the difference?

IT Governance

A version of this blog was originally published on 25 June 2018. Anyone interested in getting into or advancing their career in cyber security probably knows that they will need training and qualifications. But given that the field is so broad, how are you supposed to decide which course is right for you? This blog will help you make that decision. We take three of our most popular training courses – ISO27001 Certified ISMS Internal Auditor , ISO27001 Certified ISMS Lead Auditor and ISO27001

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Flaws in Social Warfare plugin actively exploited in the wild

Security Affairs

Experts uncovered hacking campaigns exploiting two critical security vulnerabilities in the popular WordPress plugin Social Warfare. Social Warfare is a popular ùWordPress plugin with more than 900,000 downloads, it allows to add social share buttons to a WordPress website. Experts uncovered hacking campaigns exploiting two critical security vulnerabilities in the Social Warfare plugin to take control over WordPress websites using it.

Mining 76
article thumbnail

Cyberattackers Focus on More Subtle Techniques

Dark Reading

Spam has given way to spear phishing, cryptojacking remains popular, and credential spraying is on the rise.

article thumbnail

Special-Purpose Vehicle Maker Aebi Schmidt Hit by Malware

Security Affairs

The special-purpose vehicle maker Aebi Schmidt was hit by a malware attack that disrupted some of its operations. The Aebi Schmidt Group is a manufacturer of product systems and services for the management, cleaning and clearance of traffic areas as well as for the maintenance of green areas in demanding terrain. Aebi Schmidt focuses on manufacturing agricultural, municipal and other special-purpose vehicles, including snow blowers, street cleaners, and other machinery used in airports.

article thumbnail

Amazon Employees Given ‘Broad Access’ to Personal Alexa Info

Threatpost

An auditing program for the voice assistant technology exposes geolocation data that can be personally identified, sources said.

Access 81
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Modern workplace management: What is it and how do I get there?

DXC Technology

Effective modern workplace management has two key pillars: provide a good user experience and make sure enterprise information is secure. To do this, modern workplace management takes advantage of cloud services to approach configuration, control and security in a new way – and redefine the traditional corporate approach to device, network, application and user management. […].

IT 67
article thumbnail

Security Vulns in Microsoft Products Continue to Increase

Dark Reading

The good news: Removing admin privileges can mitigate most of them, a new study by BeyondTrust shows.

article thumbnail

Britain ‘Approves’ Huawei role in building ‘non-core’ parts for 5G Network

Security Affairs

British Government has approved a limited role for Huawei in the building of a national 5G network in the country, ignoring security concerns from senior ministers. According to The Daily Telegraph newspaper, British Prime Minister Theresa May decided to assign a limited role to Chinese telco giant Huawei in the building of a 5G network in the UK. The approval continues to raise concerns because the Government ignored security warnings from senior ministers and the US Government.

article thumbnail

Top 50 organizations for data analytics to be honored

Information Management Resources

Fifty organizations that excel at data analytics will be honored for their efforts on May 2, at the Drexel LeBow Analytics 50 Awards Ceremony.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Future of Payments? Frictionless.

Thales Cloud Protection & Licensing

The financial industry has been turned on its head over the past 10 years. The emergence of fintech players like Stripe, Square and PayPal have pushed banks to innovate in ways they haven’t since the ATM was implemented. With an estimated $500 billion retail market spend per year, what’s next for the payments industry as a whole. The answer is frictionless payments.

article thumbnail

Digital Transformation and Micro Focus

Micro Focus

In my previous posts, Enterprise Application Modernization: Key focus areas and Modernization: The analysts’ view I outlined the view of key analysts on the current modernization trends. Let’s now look at how Micro Focus fits into this picture. Micro Focus enables modernization and digital transformation through a broad solution portfolio, characterized in this IDC white.

article thumbnail

Android-Based Sony Smart-TVs Open to Image Pilfering

Threatpost

A pair of bugs would allow attackers to compromise the WiFi password of a TV and the multimedia stored inside it.

article thumbnail

Digital Transformation – by the numbers

Micro Focus

DX There’s no question that digital transformation (DX) is at the top of virtually every organization’s watch list in 2019. A combination of technology advances, evolving customer expectations, process evolutions, and new business models are forcing IT and line-of-business executive’s hands on next steps. In the end, the decisions they make on how to address.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Qualcomm Critical Flaw Exposes Private Keys For Android Devices

Threatpost

A side-channel attack in Qualcomm technology, which is used by most modern Android devices, could allow an attacker to snatch private keys.

article thumbnail

UVA Wins Second Consecutive National Collegiate Cyber Defense Championship

Dark Reading

The Wahoos came out on top among 235 colleges and universities that took part in the 15-year-old competition.

69
article thumbnail

Aspectos interculturales de las estrategias de respuesta ante ataques IT

DXC Technology

Los teléfonos no paran de sonar en su sede central, el tráfico ha colapsado su web y todos los buzones de correo electrónico están repletos. ¿Por qué? Simplemente porque sus sistemas han sido pirateados, exponiendo millones de registros personales y financieros confidenciales de sus clientes. Además, es imposible encontrar en qué parte del mundo tuvo […].

IT 52