Tue.Jul 10, 2018

article thumbnail

Software Flaws: Why Is Patching So Hard?

Data Breach Today

Federal Agency Offers Insights on Vulnerability Mitigation; Others Weigh In Federal regulators are reminding organizations about the importance of identifying and patching software vulnerabilities. But why are these seemingly basic security steps so challenging for so many?

Security 113
article thumbnail

With So Many Eyeballs, Is Open Source Security Better?

eSecurity Planet

VIDEO: Dirk Hohndel, VP and Chief Open-Source Officer at VMware, talks about how dev security should be done, whether the code is open source or proprietary.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Timehop: Lack of Multifactor Login Controls Led to Breach

Data Breach Today

Breach Underlines Need for Strong Authentication in Cloud Services Timehop, an application that revives older social media posts, says the lack of multifactor authentication on a cloud services account led to a data breach affecting 21 million users. The breach exposed names, email addresses, phone numbers and access tokens Timehop used to read information from accounts.

article thumbnail

Patch Tuesday, July 2018 Edition

Krebs on Security

Microsoft and Adobe each issued security updates for their products today. Microsoft’s July patch batch includes 14 updates to fix more than 50 security flaws in Windows and associated software. Separately, Adobe has pushed out an update for its Flash Player browser plugin, as well as a monster patch bundle for Adobe Reader/Acrobat. According to security firm Qualys , all but two of the “critical” fixes in this round of updates apply to vulnerabilities in Microsoft’s b

Security 130
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Facebook fined for data breaches in Cambridge Analytica scandal

The Guardian Data Protection

Firm fined £500k for lack of transparency and failing to protect users’ information Facebook is to be fined £500,000, the maximum amount possible, for its part in the Cambridge Analytica scandal , the information commissioner has announced. The fine is for two breaches of the Data Protection Act. The Information Commissioner’s Office (ICO) concluded that Facebook failed to safeguard its users’ information and that it failed to be transparent about how that data was harvested by others.

More Trending

article thumbnail

Ticketmaster Breach Part of Massive Payment Card Hacking Campaign

Dark Reading

Threat actor Magecart has infiltrated over 800 e-commerce sites with card skimming software installed on third-party software components, RiskIQ says.

62
article thumbnail

A Landmark Legal Shift Opens Pandora’s Box for DIY Guns

WIRED Threat Level

Cody Wilson makes digital files that let anyone 3-D print untraceable guns. The government tried to stop him. He sued—and won.

article thumbnail

Recovering Keyboard Inputs through Thermal Imaging

Schneier on Security

Researchers at the University of California, Irvine, are able to recover user passwords by way of thermal imaging. The tech is pretty straightforward, but it's interesting to think about the types of scenarios in which it might be pulled off. Abstract: As a warm-blooded mammalian species, we humans routinely leave thermal residues on various objects with which we come in contact.

article thumbnail

Apple's China-Friendly Censorship Caused an iPhone-Crashing Bug

WIRED Threat Level

The bug serves as a reminder of China-friendly censorship code hidden in all iOS devices.

Security 106
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What triggered the ICO's political data inquiry?

The Guardian Data Protection

And why was Facebook fined so little? Facebook fined for data breaches in Cambridge Analytica scandal In March 2017 the UK Information Commissioner’s Office (ICO) announced an inquiry into how voters’ data was being obtained and used by political campaigns following the Observer’s early investigative reports into Cambridge Analytica. Related: Facebook fined for data breaches in Cambridge Analytica scandal Continue reading.

article thumbnail

Tapping Into Africa’s IG Potential – An Interview With Amb-Dr. Oyedokun Ayodeji Oyewole

Information Governance Perspectives

Amb-Dr. Oyedokun Ayodeji Oyewole is the Chairman of the Board at the Institute of Information Management (IIM) based in Nigeria. Prior to leading the institute, he spent years in IT and cyber-security roles for Swedish firms and consulting for the Oil and Gas industry. Dr. Oyewole is both an accomplished Records and Information Management practitioner and a fierce advocate for the discipline.

article thumbnail

7 Ways to Keep DNS Safe

Dark Reading

A DNS attack can have an outsize impact on the targeted organization - or organizations. Here's how to make hackers' lives much more difficult.

58
article thumbnail

OpenText Enterprise World 2018 – Day One

OpenText Information Management

A ‘Mundus Novus’ – or new world – of competing and conflicting macro-trends is converging to pose unprecedented challenges for businesses today. Delivering the opening keynote on day one of OpenText™ Enterprise World 2018 in Toronto, our Vice-chair, CEO and CTO Mark Barrenechea told over 4000 delegates that “The new demands of a millennial workforce, the … The post OpenText Enterprise World 2018 – Day One appeared first on OpenText Blogs.

45
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Businesses Struggle to Build 'Security-First' Culture

Dark Reading

New Accenture study finds half of businesses provide cybersecurity training for new hires and only 40% of CISOs prioritize building or expanding insider threat programs.

article thumbnail

Adobe Issues Over 100 Patches for Flash, Acrobat and Reader

Threatpost

The company issued fixes for 111 vulnerabilities in products spanning from Flash Player, Acrobat and Reader, Experience Manager, to Adobe Connect.

article thumbnail

For Data Thieves, the World Cup Runneth Over

Dark Reading

Large sporting events are always going to be targets, but the fact that the competition is in Russia adds another layer of concern. Here are three tips to stay safer.

50
article thumbnail

Six big takeaways for financial institutions from CBA LIVE

CGI

Six big takeaways for financial institutions from CBA LIVE. pallavi.m@cgi.com. Tue, 07/10/2018 - 04:34. As a consulting executive, I help clients in the banking industry on everything from their vision for digital transformation, to the nitty-gritty of implementation and execution. While it’s good to have this level of focus with individual clients, I also appreciate the chance to step back and see what else is going on in this dynamic sector.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Asian APT Groups Most Active in Q2

Dark Reading

Researchers at Kaspersky Lab published data on the most prolific threat groups and campaigns, compiled from private intelligence reports developed this quarter.

43
article thumbnail

Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?

The Security Ledger

Voice based interfaces are growing in popularity, complexity and influence. But securing these interfaces has, thus far, been an afterthought. If we are destined to interact with the smart systems around us using our voice, how exactly will we manage to authenticate to those devices? In this podcast we speak with Ben Rafferty of the firm Semafone. Read the whole entry. » Related Stories Episode 100: Estonia’s Former CIO talks about engineering a secure electronic vote Fitness apps: Go

article thumbnail

WithumSmith+Brown Announces Formation of Digital Currency and Blockchain Technology Services Group

Info Source

Princeton, N.J./New York, N.Y., July 9, 2018 – National-ranking audit, tax and advisory firm WithumSmith+Brown PC (Withum) has announced the formation of a Digital Currency and Blockchain Technology Services Group to address the unique challenges posed by digital assets, cryptocurrencies and blockchain technology. As an extension of the firm’s Technology Services Group, the team provides a deep level of expertise to a diverse client base involved with and entering into today’s new alternative as

article thumbnail

Fitness apps: Good for your health, not so much for military security

The Security Ledger

Fitness apps are proving to be a lot less beneficial to military security than they are for military fitness. That after researchers in the Netherlands discovered that data from the Polar fitness app revealed the homes and habits of those exercising in clandestine locations around the world, including intelligence agencies, military bases, nuclear. Read the whole entry. » Related Stories Mobile, automation-industry leaders promote two new IoT security efforts Evasive new botnet can take ove

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Researchers Reveal Workaround for Apple’s USB Restricted Mode

Threatpost

Researchers released a workaround for Apple's USB Restricted Mode security feature the same day it was rolled out.

article thumbnail

5 top trends driving big data analytics

Information Management Resources

Organizations need to quickly adapt to the evolving and ever-changing information management environment or they face the risk of being left behind the competition.

article thumbnail

Bomgar Acquires Avecto

Dark Reading

Purchase adds layers to privileged access management system.

Access 58
article thumbnail

Microsoft Fixes 17 Critical Bugs in July Patch Tuesday Release

Threatpost

Microsoft patches 17 critical bugs and 34 important bugs as part of its monthly security bulletin.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Microsoft July Security Updates Mostly Browser-Related

Dark Reading

Patch Tuesday includes 53 security updates, including mitigation for the latest side-channel attack.

article thumbnail

ILTA Women in eDiscovery Interviews Show the Impact Women Make on our Profession: eDiscovery Trends

eDiscovery Daily

We’re just a little over a month away from ILTACON 2018 , one of the most important conferences every year in the legal technology world. This year’s conference is at the Gaylord National Resort and Conference Center at National Harbor, MD. CloudNine will be exhibiting at the conference and I will be speaking at the conference! More on that to come later.

article thumbnail

AT&T to Buy AlienVault

Dark Reading

Terms of the deal - which closes in Q3 - were not disclosed.

51