Thu.Feb 15, 2018

article thumbnail

Criminals Hide 'Billions' in Cryptocurrency, Europol Warns

Data Breach Today

Police Want More Help From Cryptocurrency Exchanges During Major Investigations Criminals in Europe are annually laundering at least $4 billion - and growing - via cryptocurrencies, warns Europol. The agency is calling on regulators and legislators to regulate cryptocurrencies to help battle money laundering and protect consumers.

150
150
article thumbnail

Going Down the Rabbit Hole

AIIM

When I was a young child, in an era when school papers had to be researched in libraries with card catalogs and shelves upon shelves of books, my father had the bright idea to purchase a complete set of Encyclopedia Britannica. Now, we lived on a tight budget and my mother wasn’t too thrilled with this splurge when a perfectly good library was so close to home.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Health Data Breaches: Comparing UK, US Trends

Data Breach Today

Cyber Incidents Grow, But Low-Tech Breaches Still a Challenge A look at some of the United Kingdom's recent health data breach statistics shows some interesting similarities to the U.S., despite differences in the two countries' health systems and breach reporting practices.

article thumbnail

Facebook's Onavo Protect VPN Offers Less Privacy Protection Than Other Apps

WIRED Threat Level

The "Protect" menu item in Facebook's mobile apps refers users to the company's Onavo Protect VPN, but the tool falls short of basic privacy standards.

Privacy 110
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cryptocurrency Miners: How to Shield Browsers From Bad Guys

Data Breach Today

Browsealoud Subversion Points to Larger Trust Issues With Third-Party Code Attackers recently snuck cryptomining code onto thousands of websites by inserting it into a third-party accessibility plug-in called Browsealoud. Web specifications designed to guard against these types of rogue actions by third-party code libraries already exist. Why aren't more sites using them?

Libraries 113

More Trending

article thumbnail

Have We Become Apathetic About Breaches?

Thales Cloud Protection & Licensing

Another day, another breach. It’s sarcastic, it’s comical, but it’s also real. Barely a day goes by where we don’t hear of a data breach. Affecting big companies and small in virtually every vertical and hitting government institutions at the local, state and federal level, sensitive data is routinely exfiltrated, stolen and leveraged with shocking regularity.

IoT 89
article thumbnail

City & County of Denver: How to redesign a document-intensive business process – Part 2

TAB OnRecord

When Colorado approved the retail sale of marijuana in 2013, the City & County of Denver was hit with a massive influx of applications from hopeful retailers. In a two-part blog post we show how they dealt with the backlog and redesigned their business process in the new era of legalized marijuana sales. In part [.] Read More. The post City & County of Denver: How to redesign a document-intensive business process – Part 2 appeared first on TAB Records Management Blog | TAB OnRecord.

Retail 83
article thumbnail

How to decrease shopping cart abandonment using AB testing

OpenText Information Management

One of the most common challenges e-tailers face today is high cart abandonment rates. According to a 2017 Baymard study, the average cart abandonment rate is just over 69%. Without a doubt, the high abandonment rate signifies a serious disconnect between visitor expectations and their actual online buying experience. So the question then becomes, what is causing that … The post How to decrease shopping cart abandonment using AB testing appeared first on OpenText Blogs.

article thumbnail

Facebook Notification Spam Has Crossed the Line

WIRED Threat Level

From SMS notifications to an egregious number of emails, the social media company's desperation has gone too far.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

31% of organisations rely on outdated cyber security tools

IT Governance

Cyber security spending continues to rise steadily but many organisations are failing to upgrade essential tools to identify and respond to threats, a study from consultancy company Ovum has found. The report, Business Has a Crucial Need for Continuous Threat Visibility and Cybersecurity Management Services , found that 31% of respondents relied solely on outdated cyber security tools, such as basic search and monitoring.

article thumbnail

North Korea's Olympic Diplomacy Hasn't Stopped Its Hacking

WIRED Threat Level

Despite its Olympics diplomacy towards the South, the Kim regime is still engaged in brazen cybercrime targeting its neighbor.

IT 73
article thumbnail

The key elements of data flow mapping under the EU GDPR

IT Governance

With only a few months until the EU General Data Protection Regulation (GDPR) comes into effect, it is vital that your organisation is compliant. One requirement of the Regulation is that organisations map their data flows to assess their privacy risks. Organisations need to be aware of what personal data they process and ensure this processing is in accordance with the law.

GDPR 53
article thumbnail

9 Top Secure Web Gateway Vendors

eSecurity Planet

A look at top vendors in the market for web security gateway solutions, a critical tool for defending against web threats.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Credit Card Fraud and Identity Theft: Which States Are Most ‘At Risk’?

Rippleshot

While the Equifax breach has dominated headlines about fears over credit card fraud and identity theft, there are many less widely-reported incidents that occur on a much more regular basis. The real impact of financial fraud is its long-lasting effect once a consumer’s personal credentials are compromised. From tracking down where and when the fraud occurred, how much damage was done, and what other records may have been breached, credit card fraud presents plenty of expensive headaches for bot

Risk 45
article thumbnail

Bing Maisog Speaks on Security Standards in China

Hunton Privacy

In a recent video, Hunton & Williams LLP’s partner Manuel (“Bing”) Maisog discusses the Standardization Administration of China’s recent specifications for security standards in China. The specifications will come into effect on May 1, 2018, and will act as a best practices guide for the collection and use of personal information. Bing provides an overview of the specifications, and also asserts that because the specifications are more straightforward and easy to understand than compulsory

article thumbnail

Cybercrime Gang Ramps up Ransomware Campaign

Dark Reading

In the last few weeks, Gold Lowell group has collected over $350K after infecting victims with SamSam crypto malware, researchers at Secureworks found.

article thumbnail

Election Security

Schneier on Security

Good Washington Post op-ed on the need to use voter-verifiable paper ballots to secure elections, as well as risk-limiting audits.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Word-based Malware Attack Doesn’t Use Macros

Threatpost

Malicious e-mail attachments used in this campaign don’t display any warnings when opened and silently install malware.

article thumbnail

The Mirai Botnet Is Attacking Again.

Dark Reading

And the spinoff bots - and all their command and control hostnames buried in the morass of digital data - are hilarious.

52
article thumbnail

Project revives old software, preserves ‘born-digital’ data

Preservica

YaleNews - Euan Cochrane, digital preservation manager at Yale University Library discusses their emulation project that will establish a shareable infrastructure, providing on-demand access to old software and recreating the original software environment on a current-day device. "Digital preservationists at Yale University Library are building a shareable “emulation as a service” infrastructure to resurrect thousands of obsolete software programs and ensure that the information produced on them

article thumbnail

IRS Reports Steep Decline in Tax-Related ID Theft

Dark Reading

Research group Javelin confirms that the numbers are trending in the right direction, with total fraud losses dropping more than 14% to $783 million.

44
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

UPDATED State Records Management Education Materials

The Texas Record

We are pleased to announce the State Records Management Education Materials have been updated and are available on the Records Management Interagency Coordinating Council (RMICC) website. In 2014, RMICC identified a need to broadly disseminate information about records management requirements at state agencies and universities. Also, the council determined a need for a second document to address legislators’ and legislative records.

article thumbnail

Reminder: Comments due by February 23, 2018 on Draft ERM Federal Integrated Business Framework and Use Cases for Electronic Messages

National Archives Records Express

As we announced in a previous post , we are requesting comments on two draft documents as part of our Federal Electronic Records Modernization Initiative (FERMI). The documents are the Electronic Records Management Federal Integrated Business Framework (ERM-FIBF) and the Use Cases for Electronic Messages. We would like to receive feedback from a variety of stakeholders, so please share widely.

article thumbnail

Event Wrap-Up: LegalTech 2018 

Hanzo Learning Center

From January 31 to Februrary 1, the Hanzo team was onsite at LegalTech 2018 to gain valuable industry insight and to meet with our customers. Take a look at our recap below to see some of the highlights of the event.

40
article thumbnail

Connecticut case finds health care privacy cause of action

Data Protection Report

On January 16, 2018, the Connecticut Supreme Court unilaterally created a new state law cause of action for violation of a patient’s health care privacy. ( Byrne v. Avery Center for Obstetrics & Gynecology, P.C. , 327 Conn. 540, __ A.3d __ (Jan. 16, 2018)). Particularly noteworthy is the new standard for a physician’s level of care: compliance with HIPAA.

Privacy 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

North Korea-Linked Cyberattacks Spread Out of Control: Report

Dark Reading

New details on old cyberattacks originating from North Korea indicate several forms of malware unintentionally spread wider than authors intended.

44
article thumbnail

A Guide to Secure Web Gateways

eSecurity Planet

A look at top vendors in the market for web security gateway solutions, a critical tool for defending against web threats.

article thumbnail

Democracy & DevOps: What Is the Proper Role for Security?

Dark Reading

Security experts need a front-row seat in the application development process but not at the expense of the business.