Tue.Jan 15, 2019

article thumbnail

Ransomware Claims to Fund Child Cancer Treatments

Data Breach Today

Separately, Texas City's Operations Disrupted by Crypto-Locking Ransomware Ransomware attacks continue, with the city of Del Rio, Texas, saying its operations have been disrupted by crypto-locking malware. Meanwhile, CryptoMix ransomware urges victims to pay ransoms, claiming it will fund treatments for seriously ill children, while GandCrab gets distributed via malvertising attacks.

article thumbnail

For Digital Transformation, You Need Content AI

AIIM

Digital transformation means reworking business processes to take maximum advantage of data and digital content. Better, faster, and cheaper content management is one goal, but the real payoff is in automating routine tasks including customer interactions. More data and process improvement will, in turn, allow us to do more with our content, to reach new audiences and boost satisfaction and profitability, however you measure it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hard-Coded Credentials Found in ID, Access Control Software

Data Breach Today

Researchers Say Other Flaws Also Remain Unpatched Researchers from Tenable Security claim they have found what is essentially a skeleton key for an ID and access control system that could open the doors for anyone, plus other less severe but nonetheless zero-day vulnerabilities.

Access 182
article thumbnail

Facebook's '10 Year Challenge' Is Just a Harmless Meme—Right?

WIRED Threat Level

Opinion: The 2009 vs. 2019 profile picture trend may or may not have been a data collection ruse to train its facial recognition algorithm. But we can't afford to blithely play along.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Why Software Bugs Are So Common

Data Breach Today

Recent Breach at Singapore Airlines Reveals Lack of Attention to Security at Development Stage The recent exposure of customer data on the website of Singapore Airlines as a result of a software bug is further evidence of the persistent challenge of adequately addressing security during the development stage.

Security 171

More Trending

article thumbnail

Government Shutdown Leaves Americans More Vulnerable to Identity Theft, Scams

Adam Levin

U.S. citizens are more vulnerable to the effects of identity theft and scams as a result of the ongoing government shutdown. The two primary websites created by the government as resources for victims of identity theft, IdentityTheft.gov and FTC.gov/complaint , are currently offline as part of the partial shutdown of the Federal Trade Commission. This effectively leaves victims unable to file reports or get documentation of their stolen identities, which is typically a first step for mitigating

article thumbnail

A flaw in vCard processing could allow hackers to compromise a Win PC

Security Affairs

A security expert discovered a zero-day flaw in the processing of VCard files that could be exploited by a remote attacker to compromise a Windows PC. The security expert John Page (@hyp3rlinx), discovered a zero-day vulnerability in the processing of VCard files that could be exploited by a remote attacker, under certain conditions, to hack Windows PC.

article thumbnail

AT&T, T-Mobile To Stop Selling Location Data

Adam Levin

AT&T and T-Mobile announced that in March 2019 they would stop selling user location data to third parties. The announcements came on the heels of a Motherboard article that reported on the ability to track individual cellular phones via “location aggregator” companies with access to mobile customer information. Cellular location data was sold as a customer-friendly feature that could streamline things like roadside assistance and fraud prevention.

Privacy 79
article thumbnail

Disruptive technologies in the supply chain

OpenText Information Management

Disruptive technologies like AI, IoT and blockchain are impacting the supply chain at unprecedented rates. Many analysts and vendors in the market today focus on these disruptions independently or in silos. According to Mark Morley, Director of Product Marketing, Business Network at OpenText™, the future of the supply chain is in finding ways to leverage … The post Disruptive technologies in the supply chain appeared first on OpenText Blogs.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Online Fraud: Now a Major Application Layer Security Problem

Dark Reading

The explosion of consumer-facing online services and applications is making it easier and cheaper for cybercriminals to host malicious content and launch attacks.

article thumbnail

How GPS Tracking Technology Can Curb Domestic Violence

WIRED Threat Level

Opinion: GPS-monitored violent offenders are 95 percent less likely to commit a new crime. We need to implement an integrated, nationwide domestic violence program that tracks domestic abusers.

article thumbnail

Cranes, drills and other industrial machines exposed to hack by RF protocols

Security Affairs

Researchers from Trend Micro have analyzed the communication protocols used by cranes and other industrial machines and discovered several flaws. Security experts from Trend Micro have discovered several vulnerabilities in the communication protocols used by cranes, hoists, drills and other industrial machines. The experts found vulnerabilities in products from several vendors, including Saga, Juuko, Telecrane, Hetronic, Circuit Design, Autec, and Elca.

article thumbnail

Office 365 Hybrid Migration – 5 Factors for Smooth Mailbox Migration

Daymark

A large number of businesses are increasingly embracing all that Microsoft Office 365 cloud technology has to offer and are getting there using a hybrid model. This model is based on - maintaining their on-premises Exchange infrastructure while slowly migrating mailboxes into the O365 cloud tenant. It’s a strategy that makes sense when organizations have large numbers of mailboxes or don’t have sufficient staff to support a “big bang” cutover approach.

Cloud 66
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

7 Privacy Mistakes That Keep Security Pros on Their Toes

Dark Reading

When it comes to privacy, it's the little things that can lead to big mishaps.

Privacy 99
article thumbnail

Bestselling GDPR solutions

IT Governance

For many, 2018 will go down as the year of the GDPR (General Data Protection Regulation). The Regulation overturned organisational procedures, infiltrated our email inboxes with dozens of last-minute policy updates and, for those in the industry, became dinnertime conversation as family members wanted someone to explain the ins and outs of Article 6.

GDPR 63
article thumbnail

Hijacking a PLC Using its Own Network Features

Dark Reading

Researcher to show how attackers can exploit the built-in advanced connectivity functions in some Rockwell PLCs.

IT 80
article thumbnail

ThreatList: $1.7M is the Average Cost of a Cyber-Attack

Threatpost

Brand damage, loss of productivity, falling stock prices and more contribute to significant business impacts in the wake of a breach.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why Cyberattacks Are the No. 1 Risk

Dark Reading

The paradigm shift toward always-on IT requires business leaders to rethink their defense strategy.

Risk 84
article thumbnail

IDenticard Zero-Days Allow Corporate Building Access, Location Recon

Threatpost

Multiple hardcoded passwords allow attackers to create badges to gain building entry, access video surveillance feeds, manipulate databases and more.

Access 66
article thumbnail

Illinois BIPA Suit Dismissed for Lack of Article III Standing

Hunton Privacy

As we previously reported in February 2017, an Illinois federal judge denied a motion to dismiss two complaints brought under the Illinois Biometric Information Privacy Act, 740 ILCS 14 (“BIPA”) by individuals who alleged that Google captured, without plaintiff’s consent, biometric data from facial scans of images that were uploaded onto Google Photos.

article thumbnail

Report: Bots Add Volume to Account Takeover Attacks

Dark Reading

Bots that can launch hundreds of attacks per second are making account takeover fraud more difficult to defend against.

66
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Advocate General Finds Search Engine Operators May Limit the Scope of Right to Be Forgotten to the EU

Hunton Privacy

On January 10, 2018, Advocate General Maciej Szpunar (“Advocate General”) of the Court of Justice of the European Union (“CJEU”) issued an Opinion in the case of Google v. CNIL , which is currently pending before the CJEU. In the Opinion, the Advocate General provided his views concerning the territorial scope of the right to be forgotten under the relevant EU Data Protection Directive in the case at hand.

article thumbnail

Robust data governance is key for machine learning success

Information Management Resources

Data governance as a framework defines, and helps implement the overall management of the obtainability, usability, integrity, security and effectiveness of data used in any ecosystem.

article thumbnail

US Judge: Police Can't Force Biometric Authentication

Dark Reading

Law enforcement cannot order individuals to unlock devices using facial or fingerprint scans, a California judge says.

article thumbnail

News Aggregation and Harvesting

Import.IO

Leveraging Timely News As more and more credible news sources move to digital formats to meet readers where they engage regularly, businesses have to do more to monitor, harvest, and aggregate key news content. Relevant news should be used to inform your strategies, if they aren’t already. While all news mediums have seen drops in […].

45
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

U.S. Citizenship & Immigration Services Invests $1Million in Document Scanning Solution from Kodak Alaris

Info Source

ROCHESTER, N.Y, January 15, 2019 – Alaris, a Kodak Alaris business and FS Partners, LLP have secured a new contract win with a total revenue value of nearly $1 million. Following a competitive RFP process, U.S. Citizenship & Immigration Services (USCIS) signed a three-year deal with Alaris and FS Partners to deliver production scanners, capture software and Professional Services , across five USCIS Service Center locations.

Paper 45
article thumbnail

SEC Issues Charges in 'Edgar' Database Hack

Dark Reading

One defendant is still facing charges issued in 2015 for a $30 million hacking and securities fraud scheme.

article thumbnail

It’s Never Too Early to Start Talking About the U-Fla E-Discovery Conference Here’s Why: eDiscovery Best Practices

eDiscovery Daily

Believe it or not, this is the seventh year for the University of Florida E-Discovery Conference. As usual, the panel of speakers is an absolute who’s who in eDiscovery. And, if you act quickly you can save as much as 75% to attend! The conference focus this year is effectively managing discovery from the opposition. As they state on the site: “The opposition often holds the keys to the case.