Sun.Jul 29, 2018

article thumbnail

How Cloudflare Uses Lava Lamps to Guard Against Hackers

WIRED Threat Level

Inside Cloudflare's San Francisco office, 100 units of Edward Craven Walker’s groovy hardware help guard the internet.

Security 112
article thumbnail

My Health Record: former privacy head warned of dangers six years ago

The Guardian Data Protection

Malcolm Crompton says his cautions about an opt-out system were ignored by the government Australia’s former privacy commissioner warned government officials about the dangers of an opt-out My Health Record system six years ago, but said his cautions were ignored. Malcolm Crompton, now an advisor at one of Australia’s leading information privacy consultancies, has also warned digital health records will not be secure unless a widespread audit of every GP clinic in Australia is conducted.

Privacy 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tens of flaws in Samsung SmartThings Hub expose smart home to attack

Security Affairs

Cisco Talos researchers found tens of flaws in Samsung SmartThings Hub controller that potentially expose smart home devices to attack. Cisco Talos researchers have discovered 20 vulnerabilities in Samsung SmartThings Hub controller that potentially expose any supported third-party smart home devices to cyber attack. “Cisco Talos recently discovered several vulnerabilities present within the firmware of the Samsung SmartThings Hub.” reads the analysis published by Talos. “These

IoT 55
article thumbnail

Patients trust their doctors with secrets, not the government or the tax office | Ranjana Srivastava

The Guardian Data Protection

People have a right to worry about their health data falling into the wrong hands. Dismissing their concerns is unethical What is that antibiotic I am allergic to that sounds like penicillin but isn’t? What happens when I take ibuprofen? Did my last ECG have a left or right bundle branch block? Am I due for my pneumonia shot yet? What does proteinuria mean?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mysterious snail mail from China sent to US agencies includes Malware-Laden CD

Security Affairs

Several U.S. state and local government agencies have reported receiving suspicious letters via snail mail containing malware-laden CD. Crooks and cyberspies attempt to exploit any attack vector to compromise the targeted computers and the case we are going to discuss demonstrate it. The popular security expert Brian Krebs reported that several U.S. state and local government agencies have reported receiving suspicious letters via snail mail containing malware-laden compact discs (CDs).

More Trending

article thumbnail

Security bug in Swann IoT Camera allowed to access video feeds

Security Affairs

Security experts have discovered a security glitch in Swann IoT camera that could be exploited by attackers to access video feeds. Security experts from Pen Test Partners (Andrew Tierney, Chris Wade and Ken Munro) along with security researchers Alan Woodward, Scott Helme and Vangelis Stykas have discovered a security glitch in Swann IoT camera that could be exploited to access video feeds.

IoT 50
article thumbnail

The weak spot in banks’ cyberinsurance

Information Management Resources

A community bank in Virginia thought the $2.4 million hackers stole from its customers would be fully covered by its insurance policy, but its carrier begged to differ. Their highly technical legal fight is a cautionary tale for all bankers who assume they are sufficiently covered.

article thumbnail

Underminer Exploit Kit spreading Bootkits and cryptocurrency miners

Security Affairs

New Underminer exploit kit delivers a bootkit that infects the system’s boot sectors as well as a cryptocurrency miner dubbed Hidden Mellifera. Malware researchers from Trend Micro have spotted a new exploit kit, tracked as Underminer exploit kit, delivering a bootkit that infects the system’s boot sectors as well as a cryptocurrency miner dubbed Hidden Mellifera. “We discovered a new exploit kit we named Underminer that employs capabilities used by other exploit kits to deter researcher

article thumbnail

App gap poses threat to community banks

Information Management Resources

Small banks are being warned to slow down mobile tool development and check vendor arrangements, as researchers repeatedly find vulnerabilities that can be exploited by cybercriminals.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Security Affairs newsletter Round 173 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Paper Copy. Once again thank you! · Ecuador to withdraw asylum for Julian Assange in coming weeks or days. · TA505 gang abusing PDF files embedding SettingContent-ms to distribute FlawedAmmyy RAT. · CSE Malware ZLab – Chinese APT27 s long-

Mining 41