Mon.Nov 19, 2018

article thumbnail

Magecart Spies Payment Cards From Retailer Vision Direct

Data Breach Today

Card-Sniffing JavaScript Posed as Google Analytics Script on Retailer's Sites Online contact lens retailer Vision Direct says it suffered a data breach that exposed customers' names and complete payment card details. Researchers say fake Google Analytics JavaScript designed to capture card details appears to have been planted by the prolific cybercrime gangs known as Magecart.

Retail 221
article thumbnail

GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

The Last Watchdog

Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. A string of advances in biometric authentication systems has brought facial recognition systems, in particular, to the brink of wide commercial use. Related: Drivers behind facial recognition boom. Adoption of facial recognition technology is fast gaining momentum, with law enforcement and security use cases leading the way.

Privacy 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Here's Why Account Authentication Shouldn't Use SMS

Data Breach Today

Database Blunder Left Two-Step Codes, Account Reset Links Exposed A database security blunder revealed on Friday serves as a reminder that the days of SMS-based authentication should be over. The exposed database, which wasn't protected by a password, contained 26 million text messages, many of which were two-step verification codes and account-reset links.

article thumbnail

10 things you must do to become cyber secure

IT Governance

Preparing your organisation for cyber attacks and data breaches is complicated, and you should look for advice wherever you can get it. One of the most trusted resources is the NCSC’s (National Cyber Security Centre) ten-step guide. In this blog we summarise its guidance and recommend tools and resources to help you along the way. Create a risk management regime.

Security 105
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Texas Hospital Catches Dharma Ransomware Infection

Data Breach Today

Altus Baytown Hospital Among Latest Healthcare Cyberattack Victims An attack on Altus Baytown Hospital in Texas is the latest ransomware incident reported to federal regulators as a health data breach. What other major ransomware incidents are impacting the healthcare sector?

More Trending

article thumbnail

HHS Deputy Secretary Eric Hargan Describes Cyber Initiative

Data Breach Today

So what's the mission of the newly launched Department of Health and Human Services' Health Sector Cybersecurity Coordination Center, and how will it function? HHS Deputy Secretary Eric Hargan explains the initiative and addresses top healthcare sector cybersecurity challenges in this in-depth interview.

article thumbnail

Radisson Rewards programme breached

IT Governance

Last month the Radisson Hotel Group, a global player in the hospitality industry with more than 1,400 hotels in 114 countries, discovered that its rewards programme had been breached. The hack occurred on 11 September 2018 but was only detected on 1 October. Affected Radisson Rewards members were informed several weeks later, on 30 and 31 October. According to Radisson, less than 10% of its members were impacted.

GDPR 93
article thumbnail

Protecting Big Data, while Preserving Analytical Agility

Thales Cloud Protection & Licensing

The age of Big Data is upon us. And, as more data is available for analytical purposes, more sensitive and private information is at risk. As The 2018 Thales Global Data Threat Report notes, “The top Big Data security issue is that sensitive data can be anywhere – and therefore everywhere – a concern expressed by 34% of global and U.S. respondents.”.

article thumbnail

Tianfu Cup PWN hacking contest – White hat hackers earn $1 Million for Zero-Day exploits

Security Affairs

Hackers earned more than $1 million for zero-day exploits disclosed at the Tianfu Cup PWN hacking contest that took place on November 16-17 in Chengdu. Hackers earned more than $1 million for zero-day exploits disclosed at the Tianfu Cup PWN competition that took place on November 16-17 in Chengdu during the Tianfu Cup conference. According to organizers, hackers earned $1,024,000 for a total of 30 vulnerabilities.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What Happened to Cyber 9/11?

Schneier on Security

A recent article in the Atlantic asks why we haven't seen a"cyber 9/11" in the past fifteen or so years. (I, too, remember the increasingly frantic and fearful warnings of a "cyber Peal Harbor," "cyber Katrina" -- when that was a thing -- or "cyber 9/11." I made fun of those warnings back then.) The author's answer: Three main barriers are likely preventing this.

Risk 80
article thumbnail

Proposed Changes to Federal Health Privacy Regulations Now at OMB for Review

Data Matters

The Administration is preparing to release a Request for Information (“RFI”) on potential modifications to Health Insurance Portability and Accountability Act (HIPAA) rules. The draft RFI was recently submitted by the Department of Health and Human Services (“HHS”) to the White House’s Office of Management and Budget (“OMB”) for pre-release review.

Privacy 68
article thumbnail

Securities Markets at High Risk of Cyberattack

Dark Reading

A report by BAE Systems and SWIFT shows that financial market areas such as equities trading, bonds, and derivatives face more threats than banking, forex, and trade finance.

article thumbnail

Why Cloud Storage Pricing Is Not a Major Factor When Choosing a Cloud Storage Provider

OneHub

Finding the best cloud storage option for your business can be a challenge. With tons of options available, it’s hard to know which is best. Additionally, how do you know which features are really necessary for your team and your clients’ needs? First, it’s important to consider the user experience of a cloud storage platform to ensure your customers can use it seamlessly.

Cloud 76
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Scotland: Protecting your information assets with ISO 27001

IT Governance

Since the EU GDPR (General Data Protection Regulation) took effect in May 2018, Scottish organisations are inevitably focusing on protecting the confidentiality, integrity and availability of the personal data they process in order to minimise the risk of administrative fines, reputational damage and legal action. It’s also important to remember that all information – not just personal data – is at risk of compromise, and that every Internet-facing organisation needs to implement effective measu

article thumbnail

7 Holiday Security Tips for Retailers

Dark Reading

It's the most wonderful time of the year - and hackers are ready to pounce. Here's how to prevent them from wreaking holiday havoc.

Retail 81
article thumbnail

Additional Background on DOI Records Schedule

National Archives Records Express

On October 26, we posted about the proposed big bucket records schedule submitted by the Department of the Interior (DOI). The post also included information on how to submit comments through the Federal Register process which all records schedules containing items proposed for temporary retention must follow. We are accepting comments through November 26.

FOIA 67
article thumbnail

OpenText Qfiniti now available for Amazon Connect in the AWS Marketplace

OpenText Information Management

OpenText™ is excited to announce that our cloud-ready Workforce Optimization (WFO) suite, OpenText™ Qfiniti, has been integrated with Amazon Connect, the self-service, cloud-based contact center service that makes it easy for any business to deliver better customer service at a lower cost. OpenText Qfiniti provides organizations using Amazon Connect with a robust Software as a service (SaaS) WFO … The post OpenText Qfiniti now available for Amazon Connect in the AWS Marketplace appeared fi

Cloud 61
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Divide Remains Between Cybersecurity Awareness and Skill

Dark Reading

Organizations understand the need for critical data protection but may lack the resources to respond.

article thumbnail

7 top technology trends that will shape business in 2019

Information Management Resources

Robotics, digital transformation, artificial intelligence and the Internet of Things will be among the top driving forces for corporate growth and competitiveness, says Forrester Research.

article thumbnail

Instagram Privacy Tool Exposed Passwords

Dark Reading

The 'Download Your Data' tool, intended to improve users' privacy, actually became a privacy risk.

Privacy 79
article thumbnail

Ford Eyes Use of Customers’ Personal Data to Boost Profits

Threatpost

Ford's CEO sees the tech company model as key to the company's next chapter.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Vulnerabilities Dip 7%, but Researchers Are Cautious

Dark Reading

Risk Based Security reports 16,172 bugs disclosed through the end of October, but researchers warn things may change.

Risk 71
article thumbnail

Stopping the Infiltration of Things

Threatpost

If a network-connected smoke detector starts communicating with the mail server, you know you have a problem.

article thumbnail

Tips for protecting your data when losing an employee

Information Management Resources

Most employers would be surprised to learn that departing internal employees can pose a much bigger threat to their business’s data security than external hackers.

article thumbnail

VisionDirect Blindsided by Magecart in Data Breach

Threatpost

Researchers say the Magecart threat group skimmed data of VisionDirect customers using fake Google Analytics scripts.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

OT2: Embracing EIM as a Service to extend the value of your existing EIM investments

OpenText Information Management

OpenText™ launched OT2, Enterprise Information Management (EIM) as a Service built on the OpenText Cloud platform, at Enterprise World this past July in Toronto. Three months later, OT2 continues to roll out new SaaS applications designed to help customers solve real-life business problems. Customers can rejoice as painful upgrades and long waits for new features become … The post OT2: Embracing EIM as a Service to extend the value of your existing EIM investments appeared first on OpenTex

Cloud 45
article thumbnail

Cryptojacking Attack Targets Make-A-Wish Foundation Website

Threatpost

Hackers took advantage of an unpatched Drupal vulnerability in the organization's website to launch a cryptojacking attack.

article thumbnail

FTC Release Staff Recap of Informational Injury Workshop

HL Chronicle of Data Protection

The Federal Trade Commission (FTC) recently published a paper recapping its December 2017 Informational Injury Workshop. Workshop participants, including academics, industry experts, consumer advocates, and government researchers, discussed what types of consumer harm might qualify as “substantial injury” under the FTC Act and what factors should be considered.

Privacy 40