Tue.Jul 02, 2019

article thumbnail

More US Cities Battered by Ransomware

Data Breach Today

Infected City Fires IT Manager; New Victims in Florida, Georgia More U.S. cities and other governmental units reportedly have been hit by ransomware in an unrelenting wave that has proved profitable for hackers. Here's a roundup of the latest incidents.

article thumbnail

Google Releases Basic Homomorphic Encryption Tool

Schneier on Security

Google has released an open-source cryptographic tool: Private Join and Compute. From a Wired article : Private Join and Compute uses a 1970s methodology known as "commutative encryption" to allow data in the data sets to be encrypted with multiple keys, without it mattering which order the keys are used in. This is helpful for multiparty computation, where you need to apply and later peel away multiple layers of encryption without affecting the computations performed on the encrypted data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook Takes Down Pages Loaded With Malware

Data Breach Today

Campaign Targeted Those Interested in Libyan Politics Malicious actors are increasingly using social media platforms to spread malware to unsuspecting victims. In the latest incident, Facebook removed more than 30 pages from its platform after security analysts with Check Point Research found that a hacker had loaded them with malware.

Security 235
article thumbnail

I Opted Out of Facial Recognition at the Airport—It Wasn't Easy

WIRED Threat Level

Opinion: We've been assured that facial recognition technology is secure, reliable, and accurate. That's far from certain.

IT 110
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Health Data Breach Tally: A Mid-Year Update

Data Breach Today

What Trends Does the Breach List Reveal So Far in 2019? With half of 2019 in the rear-view mirror, what are the emerging healthcare data breach trends so far this year? Hacker/IT incidents continue to be the dominant cause of breaches, while another formerly common cause - lost or stolen devices - has become relatively rare, according to the federal tally.

More Trending

article thumbnail

UpGuard: Unsecured Amazon S3 Buckets Exposed 1 TB of Data

Data Breach Today

Cloud-Based Databases Belonged to IT Firm Attunity Several unsecured Amazon S3 buckets belonging to IT services firm Attunity left at least 1 TB of data, including files from companies such as Netflix, TD Bank and Ford, exposed to the internet, UpGuard researchers disclosed. Although the databases have been secured, an investigation is continuing.

Cloud 158
article thumbnail

The Case for Encryption: Fact vs. Fiction

Dark Reading

The common belief that encryption enables bad behavior primarily used by thieves, international terrorists, and other villainous characters is simply not true. Here's why.

article thumbnail

Sidley Honored at 2019 Who’s Who Legal Awards

Data Matters

Sidley was honored as the Data – Security “Firm of the Year” at the 2019 Who’s Who Legal Awards. Click here for more information on our Privacy and Cybersecurity practice. The post Sidley Honored at 2019 Who’s Who Legal Awards appeared first on Data Matters Privacy Blog.

Privacy 68
article thumbnail

Prison Time for Former Equifax Executive

Adam Levin

The former CIO of Equifax has been sentenced to prison for selling his stock in the company before news of its 2017 data breach was publicly announced. Jun Ying, the former Chief Information Office of Equifax U.S. Information Solutions, sold his shares in the company for over $950,000 ten days before the company admitted that its data had been accessed by hackers.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Lake City Employee Fired Following Ransom Payment

Dark Reading

The Florida city approved its insurer to pay $460,000 in ransom for a cyberattack that shut down servers, email, and phone.

article thumbnail

US Cyber Command warns of Iran-linked hackers exploiting CVE-2017-11774 Outlook flaw

Security Affairs

US Cyber Command posted on Twitter an alert about cyber attacks exploiting the CVE-2017-11774 vulnerability in Outlook. Yesterday I was using Twitter when I noticed the following alert issued by the account managed by the US Cyber Command : USCYBERCOM has discovered active malicious use of CVE-2017-11774 and recommends immediate #patching. Malware is currently delivered from: 'hxxps://customermgmt.net/page/macrocosm' #cybersecurity #infosec — USCYBERCOM Malware Alert (@CNMF_VirusAl

article thumbnail

Are predictive analytics and machine learning platforms worth the investment?

OpenText Information Management

There is a lot of buzz in the market around AI. However, does it justify the investment? Here at OpenText™ we regularly speak with leading companies who are interested in partnering with us and deploying OpenText™ Magellan™ to embark on their AI journey. But when it comes to making the investment in the platform and … The post Are predictive analytics and machine learning platforms worth the investment?

article thumbnail

Jamf Now and Apple Business Manager: Dynamic Duo

Jamf

With Apple’s launch of Apple Business Manager, will you still need Jamf Now to manage your devices? If you use Jamf Now, should you also use Apple Business Manager? The short answer: Yes!

75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

'Human Side-Channels': Behavioral Traces We Leave Behind

Dark Reading

How writing patterns, online activities, and other unintentional identifiers can be used in cyber offense and defense.

94
article thumbnail

The Simple Way Apple and Google Let Domestic Abusers Stalk Victims

WIRED Threat Level

To prove a point about common location-sharing apps, I asked my wife to use them to spy on me.

Privacy 95
article thumbnail

New MacOS Malware Discovered

Dark Reading

A wave of new MacOS malware over the past month includes a zero-day exploit and other attack code.

100
100
article thumbnail

TikTok under investigation over child data use

The Guardian Data Protection

UK inquiry looking at whether video-sharing app breaches data protection law The video-sharing app TikTok is under investigation in the UK for how it handles the personal data of its young users, and whether it prioritises the safety of children on its social network. Elizabeth Denham, the information commissioner, told a parliamentary committee the investigation began in February, prompted by a multi million-dollar fine from the US Federal Trade Commission (FTC) for similar violations.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

In Cybercrime's Evolution, Active, Automated Attacks Are the Latest Fad

Dark Reading

Staying ahead can feel impossible, but understanding that perfection is impossible can free you to make decisions about managing risk.

Risk 83
article thumbnail

A cyberattack took offline websites of the Georgia agency

Security Affairs

Some court websites of a Georgia state were brought offline after their systems were infected by ransomware in a cyber attack. A Georgia state agency confirmed that a cyberattack has brought offline some court websites. According to local media, hackers infected the systems of the Georgia Administrative Office of the Courts with ransomware, “News outlets report hackers demanding a ransom infected computers with malware at the Georgia Administrative Office of the Courts.” reported the

article thumbnail

Toyota's Car-Hacking Tool Now Available

Dark Reading

'PASTA' hardware and software kit now retails for $28,300.

Retail 109
article thumbnail

Tory pair say Johnson team may be breaching data protection laws

The Guardian Data Protection

Minister and former MP ask watchdog to investigate and party chair to launch inquiry A minister and a former Conservative MP have asked the information watchdog to investigate whether Boris Johnson’s campaign to become party leader is breaching data protection laws. Harriet Baldwin, a foreign office minister, and Ben Howlett, a former MP for Bath, have also asked the party’s chair, Brandon Lewis, to launch an inquiry after receiving allegedly unsolicited requests for support from the BackBoris.c

Privacy 64
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Mac Malware Pushed via Google Search Results, Masquerades as Flash Installer

Threatpost

A new malware is targeting Macs with new tactics to sniff out antivirus and virtual machines.

article thumbnail

#ModernDataMasters: Martin Squires, The Analysis Foundry

Reltio

Kate Tickner, Reltio. Martin Squires is a leader with extensive experience in customer insight, marketing analytics & data science. He has had senior roles with organisations that include: M&S Money, Walgreens Boots Alliance, HomeServe and Bradford & Bingley. Selected for the last 5 years as a member of the Data IQ Data 100 , Martin has considerable experience helping organisations drive value from building a deeper understanding of their customers.

article thumbnail

IBM Patches Critical, High-Severity Flaws in Spectrum Protect

Threatpost

IBM has disclosed multiple critical and high-severity flaws across an array of products, the most severe of which exist in its IBM Spectrum Protect tool.

IT 64
article thumbnail

Firefox finally addressed the Antivirus software TLS Errors

Security Affairs

Firefox finally addressed the issues with antivirus apps crashing HTTPS websites starting with the release of Firefox 68. Mozilla announced that it will resolve the issues that caused antivirus apps crashing HTTPs websites with the release of Firefox 68 version. The problems began after the release of Firefox 65 in December 2018, since then experts observed a significant increase in a certain type of TLS error that is triggered by the interaction of antivirus software with the browser.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

15 top paying markets for data professionals mid-way through 2019

Information Management Resources

California, Washington DC and New York are dolling out the highest salaries for data scientists, data analysts, data engineers and machine learning pros.

article thumbnail

Google July Android Security Bulletin Fixes 3 Critical RCE Bugs

Threatpost

Google fixed several critical and high-severity vulnerabilities in its Android operating system.

article thumbnail

Deliver a customer experience fit for royalty with data science and AI

IBM Big Data Hub

Delivering a great customer experience is more important than ever. Learn what you can deliver with data science and AI.