Wed.Jun 20, 2018

article thumbnail

Perverse Vulnerability from Interaction between 2-Factor Authentication and iOS AutoFill

Schneier on Security

Apple is rolling out an iOS security usability feature called Security code AutoFill. The basic idea is that the OS scans incoming SMS messages for security codes and suggests them in AutoFill, so that people can use them without having to memorize or type them. Sounds like a really good idea, but Andreas Gutmann points out an application where this could become a vulnerability: when authenticating transactions: Transaction authentication, as opposed to user authentication, is used to attest the

article thumbnail

Is Regulating Cryptocurrency Necessary and Feasible?

Data Breach Today

Government regulation is key to minimizing the misuse of cryptocurrencies for cybercrime, says Brett Johnson, a former cybercriminal who now consults on crime prevention. But regulating cryptocurrencies is no easy task, he acknowledges. Johnson will keynote ISMG's Fraud and Breach Prevention Summit in Chicago.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Intel VP Talks Data Security Focus Amid Rise of Blockchain, AI

Dark Reading

Intel vice president Rick Echevarria discusses the challenges of balancing data security with new technologies like blockchain and artificial intelligence.

article thumbnail

Hackers Hit Satellite Operators and Telecoms, Symantec Says

Data Breach Today

Thrip Group's Latest Attacks Trace to China, Maybe Beyond Symantec says it has uncovered a cyber espionage campaign that targets telecommunications operators in Southeast Asia - as well as a defense contractor and satellite communications operator - and warns that the hacking group, dubbed Thrip, may be laying the groundwork for more destructive attacks.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Will cryptocurrency mining soon saturate AWS, Microsoft Azure and Google Cloud?

The Last Watchdog

Don’t look now but cryptojacking may be about to metastasize into the scourge of cloud services. Cryptojacking, as defined by the Federal Trade Commission , is the use of JavaScript code to capture cryptocurrencies in users’ browsers without asking permission. There’s a temptation to dismiss it as a mere nuisance; companies deep into ‘digital transformation,’ in particular, might be lulled into this sort of apathy.

Mining 126

More Trending

article thumbnail

Sidley Partner William Long Recognized by Best Lawyers 2019

Data Matters

Sidley Partner William RM Long has been recognized by Best Lawyers 2019 for Privacy & Data Protection Law in London. William is global co-leader of Sidley’s Privacy and Cybersecurity practice and also leads the EU data protection practice at Sidley. Recognition by Best Lawyers is based entirely on peer review. Best Lawyers ’ methodology is designed to capture, as accurately as possible, the consensus opinion of leading lawyers about the professional abilities of their colleagues within

Privacy 68
article thumbnail

GDPR Hates Santa

Hanzo Learning Center

Twitter can be a goldmine of fun stuff slanted a little bit off-center. It's always extra fulfilling when the twitterverse takes a break from the Kardashians to give us a good dose of compliance humor.

GDPR 75
article thumbnail

Data protection fee: how much must data controllers pay to register with the ICO?

IT Governance

Since 25 May 2018, the Data Protection (Charges and Information) Regulations 2018 has required every organisation or sole trader that processes personal data to register with the ICO (Information Commissioner’s Office) – unless all the processing they carry out is exempt. Their details are then published in a publicly searchable register of data controllers.

GDPR 71
article thumbnail

The Best and Worst Tasks for Security Automation

Dark Reading

As with all new tech, there are good times and and bad times to use it. Security experts share which tasks to prioritize for automation.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Does the GDPR apply to old data breaches?

IT Governance

A number of people have asked whether the GDPR (General Data Protection Regulation) applies to data breaches that occurred before 25 May 2018 but were discovered after that date. The short answer appears to be yes, but, as ever, it’s not entirely clear. Not retroactive. An anonymous European Commission official confirmed that, although the GDPR was not retroactive, it would still apply to historic data breaches discovered after 25 May, telling a press conference the day before the EU’s Digital D

article thumbnail

Agencies Step Up to Data Security Challenge

Thales Cloud Protection & Licensing

Data-level security is not just another mandate. It’s a necessity. That was a recurring theme during a roundtable discussion held in advance of the Data Security Summit at Spire in Washington, D.C. The theme of the summit, sponsored by Thales eSecurity, was “IT Modernization: The New Cyber Agenda.”. The roundtable, including more than a dozen IT and cyber leaders from government and industry, explored the business drivers, challenges and evolving strategies around cybersecurity in government.

article thumbnail

'Hidden Tunnels' Help Hackers Launch Financial Services Attacks

Dark Reading

Hackers are using the infrastructure, meant to transmit data between applications, for command and control.

article thumbnail

Off the Record: Data vs. Information Wealth in the Public Sector, Peril of Data Management, and EPA?s Slow Release of Records

The Texas Record

Tune in monthly for a curated collection of articles we found interesting on a broad range of topics; some which are directly related to records management and others which might share common themes. No, we didn’t write these articles —hence the name of this series, “Off the Record”— but fortunately, we didn’t need to in order to share the knowledge with our subscribers.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

China-Based Cyber Espionage Campaign Targets Satellite, Telecom, Defense Firms

Dark Reading

Threat group Thrip is using three computers based in China to steal data from targeted companies in Southeast Asia and the US, Symantec says.

58
article thumbnail

15 top companies providing ?big data fabric?

Information Management Resources

This emerging tech trend automates the process of ingestion, curation and integration of big data sources to enable advanced analytics. Here are 15 top players, according to Forrester Research.

article thumbnail

New Phishing Scam Reels in Netflix Users to TLS-Certified Sites

Threatpost

Researchers are warning of a new Netflix phishing scam that leads to sites with valid TLS certificates.

article thumbnail

Inside a SamSam Ransomware Attack

Dark Reading

Here's how hackers use network tools and stolen identities to turn a device-level compromise into an enterprise-level takedown.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Don?t miss these eDOCS sessions at Enterprise World 2018

OpenText Information Management

We’re looking forward to seeing you at OpenText™ Enterprise World 2018 from July 10-12 in Toronto, Canada. OpenText Enterprise World is the world’s largest information conference, and always a great opportunity to: Learn about upcoming OpenText™ eDOCS product releases Get practical tips for getting more out of your eDOCS work environment Interact with industry peers to understand … The post Don’t miss these eDOCS sessions at Enterprise World 2018 appeared first on OpenText Blog

Cloud 45
article thumbnail

Alphabet Launches VirusTotal Monitor to Stop False Positives

Dark Reading

Alphabet's Chronicle security division releases VirusTotal Monitor, a tool for developers to check if their product will be flagged as malware.

article thumbnail

Time tells all in the Philippines

OpenText Information Management

Here at OpenText™, our commitment to attracting and retaining great people is always a priority. While many people switch jobs more frequently today than in previous generations, it’s our focus on employee growth and development that encourages OpenText employees to stick with us. Here are some of their stories and tips for growing your career … The post Time tells all in the Philippines appeared first on OpenText Blogs.

45
article thumbnail

Mylobot Botnet Emerges with Rare Level of Complexity

Threatpost

A new botnet from the Dark Web displays a never-before-seen level of complexity in terms of the sheer breadth of its various tools.

IT 50
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Mylobot Malware Brings New Sophistication to Botnets

Dark Reading

The malware pulls together a variety of techniques to gain a foothold and remain undiscovered.

59
article thumbnail

Kofax Robotic Process Automation Software Creates Smarter Robots

Info Source

Irvine, CA, June 20, 2018 – Kofax ® , a leading supplier of software to automate and digitally transform information intensive processes, today announced the addition of artificial intelligence (AI), machine learning and other capabilities in its Kapow 10.3 Robotic Process Automation (RPA) software. Kapow, the #originalbot, automates and digitally transforms a wide range of human and information intensive processes across front and back office operations.

article thumbnail

Hard Drive Health: Top 10 Maintenance Tips

Record Nations

Computers are often one of a business’s most valuable tools and protecting their hard drives and the important information and software they store is crucial. In this video learn more about the value and top 10 tips for regular drive maintenance, the average hard drive lifespan, and strategies for what to do with failing or overheated drives. […].

40
article thumbnail

IoT, AI, Blockchain, Cloud, Cybersecurity?are you ready?

OpenText Information Management

Your enterprise operates a complex ecosystem of systems, applications and business processes that must connect people, systems and things. OpenText™ Business Network provides the necessary digital foundation for automating, and insight for optimizing, business processes across your extended ecosystem. With tighter control over how information is exchanged and increasing the security and reliability of sensitive … The post IoT, AI, Blockchain, Cloud, Cybersecurity…are you ready?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hard Drive Health: Top 10 Maintenance Tips

Record Nations

Computers are often one of a business’s most valuable tools and protecting the hard drives that store important information and software is crucial. In this video learn more about the value and top 10 tips for regular drive maintenance, the average hard drive lifespan, and strategies for what to do with failing or overheated drives. […].

40
article thumbnail

How change data capture technology aids in real-time analytics

Information Management Resources

CDC software is the driving force behind the rise of modern data architectures that improve the efficiency, scale and speed of data consumption, while reducing the impact on production applications.

article thumbnail

Improving the Adoption of Security Automation

Dark Reading

Four barriers to automation and how to overcome them.