Thu.Mar 21, 2019

article thumbnail

Report: Facebook Stored Millions of Passwords in Plaintext

Data Breach Today

Facebook Under Fresh Scrutiny Over How It Stored User Passwords Facebook has corrected an internal security issue that allowed the company to store millions of user passwords in plaintext that were then available to employees through an internal search tool.

Passwords 262
article thumbnail

GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

The Last Watchdog

Unless you decide to go Henry David Thoreau and shun civilization altogether, you can’t — and won’t — stop generating data , which sooner or later can be traced back to you. Related: The Facebook factor. A few weeks back I interviewed a white hat hacker. After the interview, I told him that his examples gave me paranoia. He laughed and responded, “There’s no such thing as anonymous data; it all depends on how determined the other party is.”.

Metadata 218
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Carolina County Suffers Repeat Ransomware Infections

Data Breach Today

Third Time is the Charm as Orange County Keeps Having to Recover? Attackers have hit North Carolina's Orange County with ransomware for the third time in six years. Government officials say IT teams have been working overtime to restore systems, and that no data has been lost.

article thumbnail

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

As sure as the sun will rise in the morning, hackers will poke and prod at the web applications companies rely on – and find fresh weaknesses they can exploit. Related: Cyber spies feast on government shut down. Companies are scaling up their use of web apps as they strive to integrate digital technology into every aspect of daily business operation.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Magecart Nightmare Besets E-Commerce Websites

Data Breach Today

Bedding Retailers May Not Be Sleeping Soundly Script-based payment card malware continues its successful run, impacting a range of e-commerce sites, security researchers warn. With fraudsters continuing to refine their tactics, countering card-sniffing scripts continues to be difficult.

Retail 205

More Trending

article thumbnail

Email Server Migration Incident Impacts 277,000

Data Breach Today

Third-Party Vendor at Center of Breach An incident involving a third-party vendor migrating a server containing archived email of a medical device provider has resulted in a reported health data breach impacting more than 277,000 individuals. What went wrong?

article thumbnail

A guide to the GDPR’s EU representative requirements

IT Governance

You might have heard increased chatter recently about the need for an EU representative under the GDPR (General Data Protection Regulation). This rule applies to any organisation outside the EU that monitors the behaviour of, or provides goods or services to, EU residents. The representative will be a point of contact for data subjects and supervisory authorities concerning data protection queries.

GDPR 103
article thumbnail

Repeat Trick: Malware-Wielding Criminals Collaborate

Data Breach Today

Gangs Help Each Other to Distribute and Disguise Trojans and Ransomware Emotet pushes Ryuk, GandCrab taps NTCrypt, and BokBot borrows from Trickbot. With millions to be potentially stolen from victims, is it any wonder that malware-wielding gangs continue to get a little help from their cybercrime friends?

article thumbnail

Pwn2Own 2019 Day 1 – participants hacked Apple, Oracle, VMware products

Security Affairs

Pwn2Own 2019 hacking competition is started and participants hacked Apple Safari browser, Oracle VirtualBox and VMware Workstation on the first day. As you know I always cover results obtained by white hat hackers at hacking competitions, for this reason, today I’ll share with you the results of the first day of the Pwn2Own 2019. Pwn2Own 2019 is the hacking competition organized by Trend Micro’s Zero Day Initiative (ZDI) that is taking place in Vancouver, Canada, alongside the CanSecWest c

Security 102
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mitigating the Insider Threat at Scale

Data Breach Today

Mohan Koo of Dtex Systems on the Roles of People and Analytics Enterprises are getting wiser to understanding the insider threat. But mitigating it? That remains a challenge - especially at a large scale. Mohan Koo of Dtex Systems talks about how to blend human and data analytics to address the challenge.

Analytics 174
article thumbnail

First Look Media Shutting Down Access to Snowden NSA Archives

Schneier on Security

The Daily Beast is reporting that First Look Media -- home of The Intercept and Glenn Greenwald -- is shutting down access to the Snowden archives. The Intercept was the home for Greenwald's subset of Snowden's NSA documents since 2014, after he parted ways with the Guardian the year before. I don't know the details of how the archive was stored, but it was offline and well secured -- and it was available to journalists for research purposes.

article thumbnail

Beyond Phishing: The New Face of Cybersecurity Awareness

Data Breach Today

Terranova's Lise Lapointe on How Cybersecurity Awareness Must Evolve As CEO of Terranova Security, an awareness training provider, Lise Lapointe sees an evolution of education programs that used to be merely phishing simulation tests. What are the most effective forms of training?

Phishing 170
article thumbnail

Facebook Stored Millions of Passwords in Plaintext—Change Yours Now

WIRED Threat Level

Facebook has disclosed that it stored hundreds of millions of user passwords in plaintext, where employees could search them.

Passwords 111
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Facebook Stored Passwords in Plain Text For Years

Threatpost

The social media giant said that it is notifying users whose passwords it stored in plain text, which made them accessible for Facebook employees to view.

article thumbnail

Practical guidance on implementing an effective legal hold program

OpenText Information Management

In December 2018, the second edition of The Sedona Conference Commentary on Legal Holds was published with new guidelines for implementing an effective legal hold program. The Sedona Conference is a nonpartisan, nonprofit research and educational institute dedicated to the advanced study of law and policy in the areas of antitrust law, complex litigation, and intellectual … The post Practical guidance on implementing an effective legal hold program appeared first on OpenText Blogs.

article thumbnail

Hackers Take Down Safari, VMware and Oracle at Pwn2Own

Threatpost

On the first day of Pwn2Own 2019 hackers poked holes in Apple Safari, VMware Workstation and Oracle VirtualBox.

Security 101
article thumbnail

Hacker AI vs. Enterprise AI: A New Threat

Dark Reading

Artificial intelligence and machine learning are being weaponized using the same logic and functionality that legitimate organizations use.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cisco Patches High-Severity Flaws in IP Phones

Threatpost

The most serious vulnerabilities in Cisco's 8800 Series IP Phones could allow unauthenticated, remote attackers to conduct a cross-site request forgery attack or write arbitrary files to the filesystem.

article thumbnail

In security, it’s usually the basic stuff that gets you — like passwords

DXC Technology

There are some very smart hackers out there with access to the latest techniques and exploits, but time and again it has been observed that attackers don’t need to deploy the latest and greatest because they can achieve their goals with the older and basic. Why bother with something complex or burn a new tool […].

article thumbnail

What is going on over at Microsoft? AZ – 100, 101, and 103 explained

ITPro.TV

Last September, at Microsoft Ignite in Orlando, Microsoft showcased several new role-based certifications. As an early adopter, I naturally was excited to learn about the new certifications and began researching and preparing to take the AZ-100 and AZ-101 certification exams. I have already sat and passed the AZ-100 exam, and I have begun preparing to … Continue reading What is going on over at Microsoft?

IT 76
article thumbnail

The Top 11 Mistakes to Avoid During Engineering Document Management Implementations and Upgrades, Part 2

Synergis Software

Engineering document management (EDM) systems are a big investment. But while a poorly planned and implemented EDM rollout can cause lost productivity and delays, a successful implementation can help your organization streamline workflows, cut costs, and much more—in other words, the benefits greatly outweigh the risks. In this second installment of the Top 11 Mistakes to Avoid, we’ll be covering the final six mishaps our Applications Consultants see companies make during Adept implementations—a

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Le changement : disruptif mais humain

DXC Technology

Par Mattis Vimard, consultant Digital Strategy, DXC Technology D’après une étude de 1995, menée par la Harvard Business Review, 70% des changements organisationnels n’atteindraient pas leurs objectifs. Plus de vingt ans après ce constat, la vision de l’entreprise s’avère encore éloignée des aspirations individuelles des collaborateurs. Les résistances aux changements restent l’un des principaux freins […].

article thumbnail

Lead, Business Affairs

John Battelle's Searchblog

Do you know this person? Might it be you? Over the years I’ve found some of the best business partners by posting on this site. The overall audience for Searchblog has waxed and waned, but I’m deeply appreciative that there’s a core group of you who still watch this feed to see whatever it is I happen to be thinking about. You may have noticed I’ve not been posting as much as I normally do, and there’s a reason for that.

Sales 69
article thumbnail

WordPress Plugin Removed After Zero Day Discovered

Threatpost

The plugin, Social Warfare, is no longer listed after a cross site scripting flaw was found being exploited in the wild.

article thumbnail

FIN7 Cybercrime Gang Rises Again

Dark Reading

The group now employs a new administrative interface for managing its campaigns, as well as documents that link to SQL databases for downloading its code.

IT 71
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Researchers Built an "Online Lie Detector." Honestly, That Could Be a Problem

WIRED Threat Level

Critics point out serious flaws in a study promising an "online polygraph," with potential to create deep biases.

article thumbnail

Artificial intelligence seen taking over most project management functions

Information Management Resources

By 2030, 80 percent of the work of today’s project management discipline will be eliminated as AI takes on traditional PM functions such as data collection, tracking and reporting.

article thumbnail

CIPL Issues White Paper on Principles for a Revised U.S. Privacy Framework

Hunton Privacy

The Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP has issued a white paper on Ten Principles for a Revised U.S. Privacy Framework (the “White Paper”). CIPL believes that the use of personal information and privacy can most effectively be regulated at the federal level, and puts forward ten principles that should be included in any new federal privacy framework to ensure appropriate protection for consumers while facilitating the digital economy, innovation and the

Paper 63