Tue.Mar 12, 2019

article thumbnail

Georgia County Pays $400,000 to Ransomware Attackers

Data Breach Today

Cybercrime Gang Wielding Ryuk Eyed as Culprit Officials in Jackson County, Georgia, along with the FBI are investigating a ransomware attack that crippled IT systems over a two-week period and reportedly led local officials to pay a bitcoin ransom worth $400,000 to restore systems and infrastructure.

article thumbnail

Patch Tuesday, March 2019 Edition

Krebs on Security

Microsoft on Tuesday pushed out software updates to fix more than five dozen security vulnerabilities in its Windows operating systems, Internet Explorer , Edge , Office and Sharepoint. If you (ab)use Microsoft products, it’s time once again to start thinking about getting your patches on. Malware or bad guys can remotely exploit roughly one-quarter of the flaws fixed in today’s patch batch without any help from users.

Security 162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Endpoint Investigation Made Easier: Better Data. Better Decisions.

Data Breach Today

How to use endpoint data to see the full context - resulting in a faster time to decision for you. With the right data and the right context, anyone can investigate and make decisions with speed, clarity, and confidence.

210
210
article thumbnail

MY TAKE: What the Ethiopian 737 Max 8 crash should tell us about the safety of ‘smart’ jetliners

The Last Watchdog

When news broke about the crash of a Ethiopian Airlines Boeing 737, the first question that popped into my head was whether an older 737 model, still using the flawed rudder actuator, might have been involved. Related: Historical context of the rudder flaws on older model 737s. Of course it was actually the newest iteration of the 737, the Max 8. I’m no longer covering aviation.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

With Privacy as Its Shield, Facebook Hopes To Conquer the Entire Internet.

John Battelle's Searchblog

Never mind that man behind the privacy curtain. I’ll never forget a meal I had with a senior executive at Facebook many years ago, back when I was just starting to question the motives of the burgeoning startup’s ambition. I asked whether the company would ever support publishers across the “rest of the web” – perhaps through an advertising system competitive with Google’s AdSense.

Privacy 103

More Trending

article thumbnail

AI-empowered business: Five foundational elements

DXC Technology

Successful AI implementations rarely hinge on the unique innovation of a specific algorithm or data science technique. Those are important factors, but even more foundational to successful AI enablement are the core data operations and enabling platforms. These act as the fuel and chassis of the AI machine that a business must build and evolve […].

article thumbnail

Citrix Breach Underscores Password Perils

Dark Reading

Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network.

Passwords 102
article thumbnail

Data privacy is changing the relationship between you and your customers

OpenText Information Management

The capture and collection of personal data is an important requirement in order to provide the individual, customized and tailored experience that people are demanding. Whether it’s to provide recommendations on sites such as Amazon, Netflix or YouTube, or customized experiences within apps we use every day, access to personal information and preferences is necessary … The post Data privacy is changing the relationship between you and your customers appeared first on OpenText Blogs.

article thumbnail

The 12 Worst Serverless Security Risks

Dark Reading

A new guide from the Cloud Security Alliance offers mitigations, best practices, and a comparison between traditional applications and their serverless counterparts.

Risk 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Users claim Samsung Galaxy S10 Face Recognition can be bypassed

Security Affairs

The screen lock feature in the Samsung Galaxy S10 that is based on face recognition can be easily bypassed using a photo or a video of the owner. The discovery was made by users and tech reviewers that demonstrated how to bypass face recognition screen lock implemented in the Samsung Galaxy S10 model. Even if in the past there were reported several cases of facial recognition lock bypass, new generation devices (Samsung Galaxy S9, S9 + and Note 9, Apple iPhone XS, XS Max and XR) promises better

Access 82
article thumbnail

Citrix Hack Exposes Customer Data

Adam Levin

Citrix, a major network software company, had its internal network compromised by what appears to be an international hacking campaign. The company was alerted to the cyberattack by the FBI earlier this month. “While not confirmed, the FBI has advised that the hackers likely used a tactic known as password spraying, a technique that exploits weak passwords.

article thumbnail

On Surveillance in the Workplace

Schneier on Security

Data & Society just published a report entitled " Workplace Monitoring & Surveillance ": This explainer highlights four broad trends in employee monitoring and surveillance technologies: Prediction and flagging tools that aim to predict characteristics or behaviors of employees or that are designed to identify or deter perceived rule-breaking or fraud.

article thumbnail

FTC Seeks Comment on Proposed Changes to its GLBA Safeguards and Privacy Rules

Data Matters

Over the last few years, States have enacted increasingly aggressive legislation concerning data privacy and security, raising concerns that companies will be subject to a patchwork of different standards. Congress has recently taken notice, convening hearings on potential federal privacy legislation, with the possibility of preemption a hot topic during the hearings.

Privacy 68
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Food for thought – a visit to IBM Think 2019

Micro Focus

A global event for those moving in the twin worlds of digitalization and the mainframe, IBM Think 2019 hosted 30,000 visitors in San Francisco, CA. Que Mangus, Product Marketing Manager, found genuine synergy between the event content and the Micro Focus modernization story. Here’s the first of two blogs … There was so much to. View Article.

article thumbnail

ThreatList: Phishing Attacks Doubled in 2018

Threatpost

Scammers used both older, tested-and-true phishing tactics in 2018 - but also newer tricks, such as fresh distribution methods, according to a new report.

article thumbnail

Vulnerability research hub Crowdfense is willing to pay $3 Million for iOS, Android zero-day exploits

Security Affairs

orld-leading vulnerability research hub Crowdfense is offering up to $3 million for full-chain, zero-day exploits for iOS and Android. Vulnerability research firm Crowdfense is offering up to $3 million for working exploits for iOS and Android zero-day. In 2018, Crowdfence ran a $10 million bug bounty program, now the company decided to increment the value of the bug bounty program and extended them to other areas, including Messengers, Networking Devices, and WiFi/Baseband. “In 2019 we ar

article thumbnail

Questions to ask a document imaging provider – Part 1

TAB OnRecord

Choosing a document imaging partner isn’t an easy task. Document conversions are often large, high-profile projects, which means the stakes are high and you want to be sure you get it right. Another big challenge is knowing what to look for. Different imaging providers offer different services, so how do you know what’s really important? Read More. The post Questions to ask a document imaging provider – Part 1 appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Education use cases for the new Jamf Setup and Jamf Reset apps

Jamf

From streamlining iPad cart checkout to improving new student orientation, see how these apps are changing the way schools leverage their education technology.

article thumbnail

Microsoft Patch Tuesday: 64 Vulnerabilities Patched, 2 Under Attack

Dark Reading

Seventeen vulnerabilities patches today are rated critical, four are publicly known, and two have been exploited in the wild.

81
article thumbnail

Why It's So Hard to Restart Venezuela's Power Grid

WIRED Threat Level

Approaching a full week, Venezuela's national power outage shows just how hard it is to restart a grid from scratch.

IT 80
article thumbnail

Unpatched Windows Bug Allows Attackers to Spoof Security Dialog Boxes

Threatpost

Microsoft won't be patching the bug, but a proof of concept shows the potential for successful malware implantation.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage

Thales Cloud Protection & Licensing

At the 2019 RSA Conference, Pure Storage and Thales introduced Vormetric Transparent Encryption for Efficient Storage – the IT and security industries’ first end-to-end data encryption framework that realizes storage array data reduction. This new capability removes the compromise between encryption and storage efficiency, providing the granular access controls security professionals have come to expect from Thales combined with the industry-leading data reduction technologies from Pure St

article thumbnail

How the Best DevSecOps Teams Make Risk Visible to Developers

Dark Reading

DevOps-minded CISOs say enterprise security teams need to do a better job scoring and visualizing risk for developers and business executives.

Risk 66
article thumbnail

Firefox Send Is an Easy Way to Share Large Files Securely

WIRED Threat Level

Mozilla has made public an encrypted file-sharing service with a self-destruct twist.

article thumbnail

Web Apps Are Becoming Less Secure

Dark Reading

Critical vulnerabilities in Web applications tripled in 2018, according to a new study.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Adobe Patch Tuesday updates address critical in Photoshop, Digital Editions

Security Affairs

Adobe Patch Tuesday updates for March 2019 address critical vulnerabilities in Photoshop CC and Digital Editions products. Adobe Patch Tuesday updates for March 2019 address critical flaws in Photoshop CC and Digital Editions products. The updates address a heap overflow issue affecting the Digital Editions ebook reader software, the bug could be exploited by attackers to execute arbitrary code in the context of the current user (CVE-2019-7095). “Adobe has released a security update for Ad

article thumbnail

There May be A Ceiling on Vulnerability Remediation

Dark Reading

Most organizations are doing all they can to keep up with the release of vulnerabilities, new research shows.

75
article thumbnail

Majority of organizations still report a lack of cyber security budget

DXC Technology

Despite years of widespread data breaches and increased regulatory demands, 75 percent of respondents to a recent survey do not believe that they have an adequate information security budget. Additionally, attackers continue to successfully use compromised credentials in attacks, and while 93 percent of organizations surveyed are aware of the vulnerability and attack technique — […].