Tue.Oct 02, 2018

article thumbnail

Facebook Breach: Single Sign-On of Doom

Data Breach Today

Victims Need 'Single Sign-Off' in This Age of Hyper-Connected Services and Apps While Facebook has invalidated 90 million users' single sign-on access tokens following a mega-breach, researchers warn that most access token hijacking victims still lack any reliable "single sign-off" capabilities that will revoke attackers' access to hyper-connected web services and mobile apps.

Access 259
article thumbnail

How to Preserve Your Old Documents While Growing Digitally

AIIM

Taking care of your old documents is a complicated process. On one hand, you need to keep them stored away so that they don’t obstruct your daily work and clutter up the workspace. On the other, however, when you do need the documents, you need to be able to locate them quickly and not waste hours trying to figure out where they might have ended up.

Paper 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bupa Fined $228,000 After Stolen Data Surfaces on Dark Web

Data Breach Today

Health Insurer Slammed by Regulator for Failing to Detect Bulk Theft of Records The U.K.'s data protection regulator has fined Bupa Insurance Services £175,000 ($228,000) for failing to stop an employee from stealing 547,000 customer records, which were later offered for sale on the dark web. The ICO found that the health insurer's CRM system lacked adequate security controls.

Insurance 205
article thumbnail

Facebook Is Using Your Two-Factor Authentication Phone Number to Target Advertising

Schneier on Security

From Kashmir Hill : Facebook is not content to use the contact information you willingly put into your Facebook profile for advertising. It is also using contact information you handed over for security purposes and contact information you didn't hand over at all, but that was collected from other people's contact books, a hidden layer of details Facebook has about you that I've come to call "shadow contact information.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Tesco Bank Hit With £16 Million Fine Over Debit Card Fraud

Data Breach Today

UK's Financial Conduct Authority Slams Bank for Series of Avoidable Errors Tesco Bank has been hit with a £16.4 million ($21.3 million) fine by the U.K.'s Financial Conduct Authority for failing to prevent and more rapidly block thousands of fraudulent transactions that drained £2.3 million ($3 million) directly from customers' bank accounts.

192
192

More Trending

article thumbnail

Responding to Ransomware Attacks: Critical Elements

Data Breach Today

Experts Provide Tips for Smoother Recoveries A Canadian home healthcare provider says it was able to recover from a recent ransomware attack without paying a ransom, but it had to revert to manual processes for several days. The incident illustrates the value of being well prepared to deal with cyberattacks.

article thumbnail

Z-LAB Report – Analyzing the GandCrab v5 ransomware

Security Affairs

Experts at the Cybaze Z-Lab have analyzed the latest iteration of the infamous GandCrab ransomware, version 5.0. Malware researchers at Cybaze ZLab analyzed the latest version of the infamous GandCrab ransomware, version 5.0. Most of the infections have been observed in central Europe, but experts found evidence that the malicious code doesn’t infect Russian users.

article thumbnail

PCI SSC Works on Security for New Payment Options

Data Breach Today

As new payment options continue to emerge via mobile phones and internet of things devices, the PCI Security Standards Council is broadening its security efforts, starting with a new standard for contactless payments coming early next year, says Troy Leach, PCI SSC's chief technology officer.

Security 141
article thumbnail

Foxit Reader 9.3 addresses 118 Vulnerabilities, 18 of them rated as critical

Security Affairs

Foxit Software released a security update for its Foxit Reader product that addresses over 100 vulnerabilities, 18 of them rated as critical. Foxit Software released a security update for its Foxit Reader product that addresses over 100 vulnerabilities, some of them that could be exploited by a remote attacker to execute arbitrary code. Foxit Reader is a multilingual freemium PDF tool that can create, view, edit, digitally sign, and print PDF files, it has hundreds of millions of installations.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Battling the Insider Threat: What Works?

Data Breach Today

Education plays a critical role in any program designed to combat insider threats, says Christopher Greany, head of group investigations at Barclays. He'll discuss how to start an insider threat program in a presentation at Information Security Media Group's Security Summit: London, to be held Oct. 23.

Education 135
article thumbnail

Tips and advice for staying safe in the digital world

IT Governance

With an ever-increasing diversity of digital threats, it is important to understand the risks of going online. Graham Day, author of October’s book of the month, Security in the Digital World , says, “Attackers are slowly discovering all the ways that devices can be used to attack others. As this knowledge develops, the number and sophistication of attacks also increase.”.

article thumbnail

Adobe security updates for Acrobat fix 86 Vulnerabilities, 46 rated as critical

Security Affairs

Adobe has released security updates to fix 86 vulnerabilities in Mac and Windows version of Adobe Acrobat and Adobe Reader, 46 of them rated as critical. Adobe has released security updates to address 86 vulnerabilities affecting Mac and Windows version of Adobe Acrobat and Adobe Reader. The security updates fix 47 vulnerabilities classified as ‘critical’ and 39 flaws classified as ‘important’ “Adobe has released security updates for Adobe Acrobat and Reader for Win

article thumbnail

Sophisticated Voice Phishing Scams

Schneier on Security

Brian Krebs is reporting on some new and sophisticated phishing scams over the telephone. I second his advice: "never give out any information about yourself in response to an unsolicited phone call." Always call them back, and not using the number offered to you by the caller. Always.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The ‘Gazorp’ Azorult Builder emerged from the Dark Web

Security Affairs

Checkpoint experts discovered in the Dark Web an online builder, dubbed Gazorp, that allows crooks to create customized binaries for the Azorult malware. Security researchers from Checkpoint have discovered in the Dark Web an online builder, dubbed Gazorp, that allows crooks to easily create customized binaries for the Azorult info-stealing malware.

article thumbnail

The importance of knowing ‘where’ in digital forensic analysis

OpenText Information Management

With so many devices, file systems, operating systems, user artifacts, application artifacts, and more, keeping-up with relevant knowledge is a real struggle. As examiners, we tend to gravitate towards actions which make our lives easier and only seek deeper knowledge out of necessity when a case requires it. This issue is often exacerbated by a … The post The importance of knowing ‘where’ in digital forensic analysis appeared first on OpenText Blogs.

IT 79
article thumbnail

FCA fines Tesco Bank £16.4m over 2016 cyber attack

Security Affairs

Tesco Bank agreed to pay £16.4m as part of a settlement with the Financial Conduct Authority following the 2016 security breach. The Financial Conduct Authority (FCA) has assigned a £16.4m fine to Tesco Bank for the vulnerabilities in its systems that were exploited by hackers to steal millions of pounds from customers’ online accounts in 2016. In November 2016, Tesco Bank halted all online transactions after a cyber heist affected thousands of its customers.

Risk 79
article thumbnail

Foxit PDF Reader Fixes High-Severity Remote Code Execution Flaws

Threatpost

Foxit Software has patched over 100 vulnerabilities in its popular Foxit PDF Reader. Many of the bugs tackled by the company include a wide array of high severity remote code execution vulnerabilities. Foxit on Friday released fixes for Foxit Reader 9.3 and Foxit PhantomPDF 9.3, which addressed a whopping 124 vulnerabilities. It’s important to note […].

IT 77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CISOs: How to Answer the 5 Questions Boards Will Ask You

Dark Reading

As boards learn the importance of cybersecurity, certain issues arise on a regular basis. These tips can help you address them.

article thumbnail

New Pluralsight Course: Adapting to the New Normal: Embracing a Security Culture of Continual Change

Troy Hunt

I take more pleasure than I probably should in watching the bewilderment within organisations as the technology landscape rapidly changes and rushes ahead of them. Perhaps "pleasure" isn't the right word, is it more "amusement"? Or even "curiosity"? Whichever it is, I find myself rhetorically asking "so you just expected everything to stay the same forever, did you?

article thumbnail

Cybersecurity Awareness Month Blog Series: Leading the cybersecurity jobs of the future

Thales Cloud Protection & Licensing

Some might say the month of October is the official kickoff to the Holiday Season. There is one holiday this month which we are particularly passionate about (and it’s not Halloween). This October marks the 15 th annual National Cybersecurity Awareness Month (NCSAM) – an initiative to raise awareness around the importance of cybersecurity. Since its inception, NCSAM has grown exponentially, reaching consumers, small and medium-sized business, corporations, educational institutions and young peop

article thumbnail

Win with AI: How to move up the maturity curve

IBM Big Data Hub

Rob Thomas, general manager of IBM Analytics, sat down with Dave Vellante in New York City on the eve of the 13 September taping of the Win with AI digital broadcast to talk about the evolution of big data and how clients can take the next leap forward into self-service analytics before using AI to grow their business.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Financial Sector Data Breaches Soar Despite Heavy Security Spending

Dark Reading

Banks and other financial firms have disclosed three times as many breaches so far this year than they did in 2016, Bitglass says.

article thumbnail

How the Kavanaugh Information War Mirrors Real Warzones

WIRED Threat Level

Opinion: From using open source intelligence to spreading false reports to brazenly rewriting history, social media warriors on both sides of the controversy are taking a page from Russia.

article thumbnail

When Facebook Gets Hacked, Everyone Gets Hacked

Dark Reading

Facebook's attackers may have gained access to several third-party apps and websites via Facebook Login.

Access 92
article thumbnail

Chipotle Consumer Plaintiffs’ Putative Class Case Survives in Part

Hunton Privacy

On September 26, 2018, the U.S. District Court for the District of Colorado (“the Court”) refused to dismiss all putative class claims against Chipotle Mexican Grill, Inc. (“Chipotle”). This litigation arose from a 2017 data breach in which hackers stole customers’ payment card and other personal information by using malicious software to access the point-of-sale systems at Chipotle’s locations. .

Sales 68
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Cracks Down on Malicious Chrome Extensions in Major Update

Threatpost

Starting today, extensions with obfuscated code are banned and developers must go through a stricter extensions review process.

Privacy 79
article thumbnail

Sharpen Your Security Skills at Black Hat Trainings Chicago!

Dark Reading

Black Hat is bringing its highly-regarded Trainings to Chicago next month, October 22 and 23.Don't miss this opportunity to develop your skills in some of the most technical, hands-on security courses available.

article thumbnail

Google Patches Critical Vulnerabilities in Android OS

Threatpost

The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices.

Privacy 70