Mon.Dec 10, 2018

article thumbnail

GDPR: 8,000 Data Breach Reports Filed So Far in UK

Data Breach Today

Privacy Watchdog Counts 41 Daily Breach Reports Since GDPR Enforcement Began The U.K.'s privacy watchdog says that six months after enforcement of the EU's General Data Protection Regulation began, it's seen a dramatic increase in data breach reports - as well as privacy complaints from the public.

article thumbnail

GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

The Last Watchdog

The holiday season is upon us and the bright lights and greenery aren’t the only indicators that we’ve reached December. Sadly, data breaches often occur at this time of year. Recently we’ve seen major news stories about breaches at Starwood Hotels and Quora. Related podcast: The need to lock down unstructured data. Last year, at this time, it was announced that there was a significant privacy leak at eBay affecting many customers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Credit Card System Hack Led to HIPAA Breach Report

Data Breach Today

Baylor Scott & White Medical Center - Frisco Notifying Those Affected The hacking of a credit card processing system has prompted a Texas hospital to notify federal regulators and affected individuals of a breach as required by the HIPAA Breach Notification Rule.

213
213
article thumbnail

Hackers defaced Linux.org with DNS hijack

Security Affairs

The Linux.org website was defaced last week via DNS hijack, attackers breached into associated registrar account and changed the DNS settings. Attackers changed the defacement page a few times, they protested against the new Linux kernel developer code of conduct in a regrettable way with racial slurs and the image of an individual showing the anus.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

After Mega-Breach, Marriott May Pay for New Passports

Data Breach Today

But Victims Must Prove Fraud for Hotel Giant to Cover Cost of New Passport Victims of the massive Marriott International data breach, which exposed data for 500 million customers, including some passport numbers, may be able to claim reimbursement for the cost of obtaining a replacement passport, provided they can prove it led to fraud.

More Trending

article thumbnail

Fighting Credential Stuffing Attacks

Data Breach Today

Credential abuse attacks and identity theft incidents are rising, with attackers leveraging botnets to launch coordinated campaigns with high success rates, says Aseem Ahmed of Akamai Technologies, who shares best practices for mitigating the threats.

170
170
article thumbnail

A new Mac malware combines a backdoor and a crypto-miner

Security Affairs

Experts from Malwarebytes discovered a new strain of Mac malware, tracked as DarthMiner, that is a combination of two open-source programs. . Experts from Malwarebytes discovered a new piece of Mac malware, tracked as DarthMiner, that is the combination of two open source tools. The malware is distributed through Adobe Zii, an application supposedly helps in the piracy of various Adobe programs.

article thumbnail

Eastern European Bank Hackers Wield Malicious Hardware

Data Breach Today

'DarkVishnya' Heists Stole Tens of Millions of Dollars, Kaspersky Lab Says Hackers have been plugging inexpensive hardware into banks' local area networks to help perpetrate heists that have stolen tens of millions of dollars, warns Kaspersky Lab. It says that since 2017, the "DarkVishnya" attack campaign has hit at least eight Eastern European banks.

IT 164
article thumbnail

Do schools need to appoint a data protection officer?

IT Governance

Finding a qualified DPO is arguably one of the GDPR’s hardest requirements, but is it something that schools need to be concerned about? The EU GDPR (General Data Protection Regulation) contains particularly strong requirements for protecting children’s data. These can be seen most clearly in the rules surrounding the appointment of a DPO (data protection officer).

GDPR 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

2018 Annual Report from AI Now

Schneier on Security

The research group AI Now just published its annual report. It's an excellent summary of today's AI security challenges, as well as a policy agenda to address them. This is related, and also worth reading.

article thumbnail

Next Steps with DOI Records Schedule

National Archives Records Express

We have been posting updates on the status of our ongoing appraisal of Department of the Interior’s proposed big-bucket records schedule. Now that the period for public comment has closed, we would like to provide an update on the next steps in this process. First, we would like to thank everyone who took the time to review the schedule and submit a comment.

article thumbnail

Duke-Cohan sentenced to three years in prison due to false bomb threats and DDoS

Security Affairs

The British teenager George Duke-Cohan (19) has been sentenced to three years in prison due to false bomb threats and carrying out DDoS attacks. A. Cohan was arrested in August by the U.K. National Crime Agency (NCA), the teenager, aka “7R1D3N7,” “DoubleParallax” and “optcz1,” was arrested on August 31 and pleaded guilty to three counts of making hoax bomb threats.

article thumbnail

Former headteacher’s prosecution demonstrates the risks of storing personal data on USB sticks

IT Governance

This week, the ICO (Information Commissioner’s Office) prosecuted and fined a former deputy headteacher for unlawfully obtaining personal data from two schools he had previously worked at. Darren Harrison was suspended from Isleworth Town Primary School only six months into his new role. Harrison uploaded large volumes of sensitive personal data from Spelthorne Primary and The Russell School in Richmond to Isleworth Town Primary’s server via USB stick.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

6 Cloud Security Predictions for 2019

Dark Reading

How the fast pace of cloud computing adoption in 2018 will dramatically change the security landscape next year.

Cloud 90
article thumbnail

DarkVishnya Attacks Loot Millions from Banks

Adam Levin

Hackers stole tens of millions of dollars from Eastern European banks in a campaign called “DarkVishnya.” The method deployed by the hackers relied on devices connected at the physical location of the targets, rather than attempting to breach networks remotely. There were several steps to the hack. The first step involved planting in the target banks a device.

article thumbnail

'Highly Active' Seedworm Group Hits IT Services, Governments

Dark Reading

Since September, the cyber espionage actors have targeted more than 130 victims in 30 organizations including NGOs, oil and gas, and telecom businesses.

article thumbnail

8 top artificial intelligence and analytics trends for 2019

Information Management Resources

Artificial intelligence will deliver approximately $2 trillion worth of business value worldwide over the next year. Companies that fail to adopt AI will lose out. Some industries may even be wiped out.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Satan Ransomware Variant Exploits 10 Server-Side Flaws

Dark Reading

Windows, Linux systems vulnerable to self-propagating 'Lucky' malware, security researchers say.

article thumbnail

Google+ Exposed Data of 52.5 Million Users and Will Shut Down in April

WIRED Threat Level

A month after Google had already decided to shut down Google+, a new bug made its problems much, much worse.

IT 80
article thumbnail

Women in Cyber Take the Spotlight

Threatpost

Women are key to solving the workforce shortage, which is expected to reach 3.5 million open jobs by 2022.

80
article thumbnail

'Dr. Shifro' Prescribes Fake Ransomware Cure

Dark Reading

A Russian firm aims to capitalize on ransomware victims' desperation by offering to unlock files then passing money to attackers.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Accelerates Google+ Shutdown After New Bug Discovered

Threatpost

The consumer version of Google+ will now be shut down in April instead of August after a bug was found that impacts at least 50 million users.

Privacy 67
article thumbnail

New Google+ Breach Will Lead to Early Service Shutdown

Dark Reading

A breach affecting more than 52 million users was patched, but not before leading to the company rethinking the future of the service.

66
article thumbnail

The Guide to Good Record Keeping in the Classroom: Tips and Its Importance

Record Nations

There are a range of things in the classroom that need consideration such as tracking attendance, creating daily lesson plans, and most importantly developing an efficient system for managing class records themselves. In this video learn more about why record keeping is important for teachers, how an organized system can help in the classroom, and […].

IT 53
article thumbnail

AI Advances

Import.IO

How Advanced Is Current AI Web Technology? Right now, artificial intelligence (AI) seems like a future technology that is years away from being realized. However, it is becoming more and more of an everyday reality instead of remaining in the realm of just a possibility as technology evolves that supports it. As history proves, milestones […].

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Sextortion Emails Force Payment via GandCrab Ransomware

Threatpost

Emails say they contain a link with screenshots of victims' compromising activity. In reality, the link executes ransomware.

article thumbnail

How to choose the best content services platform in 2019

OpenText Information Management

In a previous blog, we covered the growth of content services as it evolves from traditional Enterprise Content Management (ECM). Organizations are now turning to content services platforms to build on the strengths of ECM and create a holistic information management environment that connects, shares and governs content across the entire enterprise.

article thumbnail

DanaBot Malware Adds Spam to its Menu

Dark Reading

A new generation of modular malware increases its value to criminals.

IT 79