Tue.Jan 23, 2018

article thumbnail

Intel: Stop Installing Patches Due To Reboot Problems

Data Breach Today

Struggles With Firmware Fixes For Meltdown and Spectre The usual advice for major security flaws is to patch as quickly as possible. Now Intel is calling for a full stop due to imperfect patches for a trio of chip security vulnerabilities known as Meltdown and Spectre.

Security 162
article thumbnail

New Malware Hijacks Cryptocurrency Mining

Schneier on Security

This is a clever attack. After gaining control of the coin-mining software, the malware replaces the wallet address the computer owner uses to collect newly minted currency with an address controlled by the attacker. From then on, the attacker receives all coins generated, and owners are none the wiser unless they take time to manually inspect their software configuration.

Mining 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Blockchain in Healthcare: The Potential and Limitations

Data Breach Today

Blockchain holds potential for supporting secure health data exchange, but it has limitations that organizations need to keep in mind, says Intel's David Houlding in this in-depth interview on the technology.

article thumbnail

3 Challenges Created by an Ad Hoc Approach to Information Capture

AIIM

Scanning and information capture lead a curious double life. On one hand, it seems like we’ve been doing scanning and capture forever, at least within larger companies. Scanning and capture are stable, mature technologies with a well-documented ROI. On the other hand, they are still somewhat new when it comes to adoption by many smaller and mid sized organizations.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Meltdown and Spectre Patches From Intel and Others Have a Rough Start

WIRED Threat Level

In the haste to address the Meltdown and Spectre vulnerabilities that shook the computer industry, several clumsy patch attempts have had to be pulled.

Security 107

More Trending

article thumbnail

Tinder's Lack of Encryption Lets Strangers Spy on Your Swipes

WIRED Threat Level

Thanks to Tinder's patchwork use of HTTPS, researchers found they could reconstruct someone's entire experience in the app.

article thumbnail

Can I really rely on my entire workforce to support a recovery?

IT Governance

This is a guest article written by Robert A. Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. The author’s views are entirely his own and may not reflect the views of IT Governance. In the northern hemisphere, we have entered the flu season, and people are starting to become sick.

Risk 75
article thumbnail

8 top tips when selecting an EIM Managed Services partner

OpenText Information Management

The Enterprise Information Management (EIM) market is growing rapidly. This is not surprising given the amount of data and content that every enterprise has to deal with today. Optimal management of EIM systems can be challenging for even the largest organization. Managed Services for EIM offers an effective and attractive alternative – but how can … The post 8 top tips when selecting an EIM Managed Services partner appeared first on OpenText Blogs.

article thumbnail

DDoS Attacker Targeted Banks, Police, Former Employer

Data Breach Today

Records From Hacked Stresser/Booter Service vDos Helped Unmask Suspect In separate cases, two hackers have either pleaded guilty or been sentenced to serve jail time in part for launching or facilitating DDoS attacks. One defendant, John Kelsey Gammell, was unmasked after taunting a former employer over the "ongoing IT issues" his DDoS attacks were causing.

IT 72
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Come together at Legaltech

OpenText Information Management

Another year, another Legaltech New York — the largest legal technology conference of the year. But for us, this year is no ordinary Legaltech®. OpenText arrives this year in full-force to represent itself as a whole larger than the sum of its individual parts. Our technology track session theme, Come together, right now: aligning InfoSec, … The post Come together at Legaltech appeared first on OpenText Blogs.

IT 69
article thumbnail

Off the Record: Federal Record Keeping in a Digital Dark Age, Capture and Protect Social Media from the Wolf

The Texas Record

Tune in monthly for a curated collection of articles we found interesting on a broad range of topics; some which are directly related to records management and others which might share common themes. No, we didn’t write these articles —hence the name of this series, “Off the Record”— , but fortunately we didn’t need to in order to share the knowledge with our subscribers.

article thumbnail

OpenText and Documentum: reflecting on the past 12 months

OpenText Information Management

One year ago today, OpenText acquired Documentum, InfoArchive, Captiva, and more from Dell EMC. At the time, some considered the future uncertain but, as we take this opportunity to look back and review the past 12 months, we see clear signs that this acquisition is delivering for Documentum customers. Products such as InfoArchive and ApplicationXtender … The post OpenText and Documentum: reflecting on the past 12 months appeared first on OpenText Blogs.

ECM 68
article thumbnail

45% of Businesses Say Employees Are Biggest Security Risk

Dark Reading

The most common cloud security worries remain the same, with unauthorized access and malware infiltrations topping concerns.

Risk 62
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Turn regulatory compliance into competitive advantage

OpenText Information Management

For many, the new year is a time for new beginnings, new habits, and new ways of thinking. When the calendar flipped to 2018, I sifted through many posts encouraging readers to finally kick-start that fitness program, aim to become more productive, or mindful, or assertive. However, there was one particular article that caught my … The post Turn regulatory compliance into competitive advantage appeared first on OpenText Blogs.

article thumbnail

10 Costs Your Cyber Insurance Policy May Not Cover

Dark Reading

All the things you might think are covered but that don't actually fall under most policies.

article thumbnail

Intel Halts Spectre/Meltdown Patching for Broadwell and Haswell Systems

Threatpost

Widespread reports of reboot issues on some Intel systems force the chip giant to pump the brakes on rolling out patches for side-channel vulnerabilities.

51
article thumbnail

Hunton Publishes Retail Year in Review

Hunton Privacy

On January 18, 2018, Hunton & Williams LLP’s retail industry lawyers, composed of more than 100 lawyers across practices, released their annual Retail Year in Review publication. The Retail Year in Review includes several articles authored by our Global Privacy and Cybersecurity lawyers, and touches on many topics of interest including blockchain, ransomware, cyber insurance and the Internet of Things.

Retail 42
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Satori Author Linked to New Mirai Variant Masuta

Threatpost

Two related Mirai variants called Masuta and PureMasuta have links to a hacker identified as Nexus Zeta.

IoT 62
article thumbnail

Dark Caracal Campaign Breaks New Ground with Focus on Mobile Devices

Dark Reading

This is the first known global-scale campaign primarily focused on stealing data from Android devices, Lookout and EFF say.

51
article thumbnail

App Flaws Allow Snoops to Spy On Tinder Users, Researchers Say

Threatpost

The use of HTTP for photo transport and a flaw in Tinder's use of HTTPS can leave users exposed, Checkmarx says.

Privacy 52
article thumbnail

Meltdown, Spectre Patches, Performance & My Neighbor's Sports Car

Dark Reading

When a flaw in the engine of a data center server makes it run more like a Yugo than a Porsche, it's the lawyers who will benefit.

IT 47
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Algorithms show potential in measuring diagnostic errors using big data

Information Management Resources

Method uses statistical analyses to identify critical patterns, replacing labor-intensive reviews of medical records by hospital staff, to potentially predict negative consequences.

article thumbnail

Fallout from Rushed Patching for Meltdown, Spectre

Dark Reading

Not all systems require full patching for the flaws right now, anyway, experts say.

55
article thumbnail

Understanding eDiscovery in Criminal Cases, Part Five: eDiscovery Best Practices

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Thursday ( Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 ), which was great.

article thumbnail

Less than 10% of Gmail Users Employ Two-Factor Authentication

Dark Reading

Google software engineer reveals lack of user adoption for stronger authentication.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Jedediah Hotchkiss: Mapmaker of the Confederacy

Unwritten Record

The Cartographic Branch holds numerous maps created by noted Civil War mapmaker Jedediah Hotchkiss. Born in Windsor, New York, Hotchkiss moved to the Shenandoah Valley in Virginia prior to the Civil War. He worked as a tutor and eventually founded and opened two schools. Although not professionally trained in geography or cartography, Hotchkiss studied map-making in his spare time and taught himself the skills necessary to create maps.

article thumbnail

Why there is an urgent need for a new, smarter Wi-Fi protocol

Information Management Resources

The need to ensure adequate security of online connections has taken on more importance than ever, and current security standards just don't cut it.

article thumbnail

Self-test

InfoGovNuggets

How do you know that information provided by someone else is accurate/reliable? How reliable do others find that source? “Facebook To Alter Its News Feed,” The Wall Street Journal , January 20, 2018 B1. FB will “start ranking news sources it its feed based on user evaluations of credibility… ” So, your reputation for truth and veracity affects how highly information you provide gets placed.

IT 28