Thu.Sep 13, 2018

article thumbnail

Romanian Hacker 'Guccifer' to Be Extradited to US

Data Breach Today

Taxi Driver Turned Hacker Is Serving 7-Year Prison Sentence in His Home Country A Romanian court has ruled that the notorious hacker "Guccifer," who discovered the existence of Hillary's Clinton's private email server, will be extradited to the U.S. to serve a 52-month prison sentence after he finishes serving a seven-year sentence in his home country.

203
203
article thumbnail

MY TAKE: Here’s how diversity can strengthen cybersecurity — at many levels

The Last Watchdog

Of the many cybersecurity executives I’ve interviewed, Keenan Skelly’s career path may be the most distinctive. Skelly started out as a U.S. Army Explosive Ordnance Disposal (EOD) Technician. “I was on the EOD team that was actually assigned to the White House during 9/11, so I got to see our national response framework from a very high level,” she says.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Can a Watch Be a Medical Device?

Data Breach Today

New Apple Watch ECG Function Raises Risk Management Issues The new Apple Watch 4, which includes a sensor that can conduct an electrocardiogram, spotlights the emergence of consumer apps that appear to cross over into the territory of medical devices, raising potential cybersecurity concerns.

article thumbnail

Flaws in firmware expose almost any modern PC to Cold Boot Attacks

Security Affairs

New Firmware Flaws Resurrect Cold Boot Attacks. A team of security researchers demonstrated that the firmware running on nearly all modern computers is vulnerable to cold boot attacks. A team of experts from cybersecurity firm F-Secure has discovered security flaws affecting firmware in modern computers that could be exploited by hackers to carry out cold boot attacks and recover sensitive data from the memory of the affected machines.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Russian Pleads Guilty to Operating Kelihos Botnet

Data Breach Today

Peter Levashov's Botnets Spread Spam, Banking Trojans and Ransomware Russian national Peter Levashov, who was arrested in Spain last year and extradited to the U.S., has admitted to a two-decade crime spree that included running multiple botnets that harvested online credentials while also pumping out spam, banking Trojans and ransomware.

More Trending

article thumbnail

Fresh GDPR Complaints Take Aim at Targeted Advertising

Data Breach Today

Browser Upstart Alleges Ad Firms Are Seeing Too Much Personal Data A web browser startup, Brave, has filed complaints in Europe alleging Google and other behavioral advertising companies are violating Europe's GDPR. Brave's complaints could set up one of the biggest battles so far over how personal data gets used - or abused - for targeted advertising.

GDPR 124
article thumbnail

Reader favorites September 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover: Budgeting your imaging project, cloud storage, and filing assessments. Budgeting for your imaging project: Six overlooked cost factors If you are planning and budgeting a document imaging project, this guide can help. It explains six commonly overlooked cost factors that can drive up the cost of your [.] Read More.

article thumbnail

GCHQ data collection violated human rights, Strasbourg court rules

The Guardian Data Protection

UK agency breached right to privacy in programme revealed by Edward Snowden, judges say GCHQ’s methods in carrying out bulk interception of online communications violated privacy and failed to provide sufficient surveillance safeguards, the European court of human rights has ruled in a test case judgment. But the Strasbourg court found that GCHQ’s regime for sharing sensitive digital intelligence with foreign governments was not illegal.

article thumbnail

2 Billion Bluetooth Devices Remain Exposed to Airborne Attack Vulnerabilities

Dark Reading

One year after Armis disclosed 'BlueBorne,' a large number of Android, Linux, and iOS devices remain unpatched.

92
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Kelihos botmaster pleads guilty in U.S. District Court in Connecticut

Security Affairs

The creator of the infamous Kelihos Botnet , Peter Yuryevich Levashov (38) pleaded guilty this week to computer crime, fraud, conspiracy and identity theft charges. Yuryevich Levashov (38), the botmaster of the dreaded Kelihos Botnet pleaded guilty this week to computer crime, fraud, conspiracy and identity theft charges. In April 2017, the United States Department of Justice announced that Peter Yuryevich Levashov (36) (also known as Petr Levashov, Peter Severa, Petr Severa and Sergey Astak

article thumbnail

ThreatList: Microsoft Macros Remain Top Vector for Malware Delivery

Threatpost

The second-most popular delivery method is CVE-2017-11882, a patched Microsoft vulnerability that allows the attacker to perform arbitrary code-execution.

article thumbnail

From student to Senior Product Manager

OpenText Information Management

Mike Stover, now Senior Product Manager at OpenText™, has always enjoyed understanding how things work — getting down to the nuts and bolts to see how components work together to create an output. For him, product management is a natural fit, and an incredible opportunity to get to know how a company’s products work. In this … The post From student to Senior Product Manager appeared first on OpenText Blogs.

63
article thumbnail

OilRig APT Continues Its Ongoing Malware Evolution

Threatpost

The Iran-linked APT appears to be in a state of continuous tool development, analogous to the DevOps efforts seen in the legitimate software world.

IT 70
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Cold Boot Attack Gives Hackers the Keys to PCs, Macs

Dark Reading

Researchers bypass a Trusted Computing Group security measure to manipulate the firmware and steal data in memory.

article thumbnail

Security Risks of Government Hacking

Schneier on Security

Some of us -- myself included -- have proposed lawful government hacking as an alternative to backdoors. A new report from the Center of Internet and Society looks at the security risks of allowing government hacking. They include: Disincentive for vulnerability disclosure Cultivation of a market for surveillance tools Attackers co-opt hacking tools over which governments have lost control Attackers learn of vulnerabilities through government use of malware Government incentives to push for less

article thumbnail

Enterprise Security Needs an Open Data Solution

Dark Reading

What would it look like if more than a tiny fraction of enterprises had access to all the signals hidden in their big data today?

article thumbnail

Experts Bemoan Shortcomings with IoT Security Bill

Threatpost

The infosec community say a recently approved IoT security bill is "nice," but doesn't hit on the important issues.

IoT 62
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Increasingly Vulnerable Software Supply Chain

Dark Reading

Nation-state adversaries from Iran to Russia have leveraged the supply chain as a vehicle to compromise infrastructure and disrupt businesses.

59
article thumbnail

SAA/CoSA/NAGARA 2018 recap: Session 103

The Schedule

Guest post by Cathrine Giles, State Records Branch Manager, Kentucky Department for Libraries and Archives. Wicked problems are defined as societal problems that are complex, vitally important, ill-defined, and rely on contested political judgements for resolution. Even just defining the scope and nature of a problem can be difficult. We can use “wicked problems” to frame a number of challenges the archival profession faces in order to identify where our professional knowledge can be applied to

article thumbnail

Global Scanning Bolsters Technical Support Team with Appointment of Carsten Mejlbo

Info Source

Chantilly, VA — September 12, 2018 — Global Scanning, a leader large format scanning technology, today announces the appointment of Carsten Mejlbo as technical support manager for Global Scanning, North and South America. Mejlbo brings more than three decades of experience in production, training and technical support to Global Scanning. In his new role, Mejlbo will help Global Scanning customers, dealers, and distribution partners to leverage the range of wide format scanning solutions offered

article thumbnail

Houston, We Have an Adverse Inference Finding: eDiscovery Case Law

eDiscovery Daily

In Hernandez, et al. v. City of Houston, No. 4:16-CV-3577 (S.D. Tex. Aug. 30, 2018) , Texas District Judge Kenneth M. Hoyt, finding that the defendant “intentionally destroyed” evidence by wiping the hard drives of several custodians no longer employed by the City, determined “that entering an adverse inference finding is appropriate” against the defendant.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Capture and RPA: Who’s the Cart and Who’s the Horse?

Info Source

Is document capture a subset of Robotics Process Automation (RPA) or vice-versa? This question came up at the recent Harvey Spencer Associates Capture Conference – an annual meeting of top executives in the document capture software industry. HSA’s Mike Spang presented RPA as a $200 million-plus branch of the $4.1 billion capture industry.

ECM 45
article thumbnail

Kelihos Botnet Operator Pleads Guilty in Federal Court

Dark Reading

The 38-year-old Russian national operated several botnets and infected thousands of systems with malware.

57
article thumbnail

K&IM Matters: From AI to the Chartered Knowledge Manager

CILIP

Knowledge and Information Management Insight September 2018. This month?s column is a round-up of what?s been happening this summer and what?s coming up on the theme of how information and knowledge professionals are reacting to the rapidly changing economic and social landscape. Artificial intelligence. Artificial intelligence is challenging the imagination, raising issues of ethics as well as technology.

article thumbnail

Bomgar Buys BeyondTrust

Dark Reading

The companies join forces to broaden their privileged access management portfolio and will take on the BeyondTrust name.

Access 52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Jisc Futurist Q&A ? and 25 per cent off ILI Conference 2018

CILIP

Martin Hamilton is Jisc's resident Futurist and will be a keynote at this year's ILI Conference 18 ? where CILIP members can get a 25 per cent discount on full delegate passes. The event takes place at London's Olympia centre on 16 and 17 October, with a day of workshops taking place on 15 October. Olympia will also host a two-day Taxonomy bootcamp on the 16 and 17 October, and again CILIP members can get a 25 per cent discount on full delegate entry ?

article thumbnail

Data Protection in the Event of a “No Deal Brexit”

HL Chronicle of Data Protection

As part of its preparations for a “no deal” scenario when the Article 50 negotiating period comes to an end on 29 March 2019, the Department for Digital, Culture, Media and Sport (“DDCMS”) has today released guidance on “Data protection if there’s no Brexit deal” The UK will become a “third country” on its exit from the European Union, which means that unhindered cross-border transfers of data will no longer automatically be able to take plac

GDPR 40
article thumbnail

UX in Libraries: Cognitive maps

CILIP

UX in Libraries: Cognitive maps. Andy Priestner ( info@andypriestnertraining.com. @andypriestner ) is a freelance UX trainer and consultant and Chair of the UX in Libraries conference andypriestnertraining.com uxlib.org. This month I?d like to focus on a UX research technique that offers unparalleled access to the thoughts, preferences and experiences of your users: the cognitive map.