Fri.Oct 05, 2018

article thumbnail

Report: Chinese Spy Chip Backdoored US Defense, Tech Firms

Data Breach Today

If Accurate, Bloomberg Report Would Mark a New Era of Mass Hardware Compromise Did the Chinese government pull off one of the most secretive hardware hacks of all time? That's what information security experts are pondering after a Bloomberg report has detailed an espionage operation that purportedly planted a tiny spying chip on widely distributed server motherboards.

article thumbnail

Document Automation: Having Your Cake…

AIIM

Having your cake and eating it, too, is a proverb that’s almost 500 years old, which means you cannot have two incompatible things at the same time. So many examples of situations exist where you face two mutually exclusive options. Let’s take document capture. Document capture software is designed to automate document-oriented tasks such as sorting or extracting key data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Indict 7 Russians for Hacking and Disinformation

Data Breach Today

Russian Military Intelligence Team Allegedly Conducted Close-Access Operations The U.S. Justice Department unsealed a criminal indictment charging seven alleged Russian GRU military intelligence agency officers with hacking multiple organizations, including the World Anti-Doping Agency, as part of APT 28 - aka Fancy Bear - cyber espionage operations.

Military 188
article thumbnail

Sales intel firm Apollo data breach exposed more than 200 million contact records

Security Affairs

The sales intelligence firm Apollo is the last victim of a massive data breach that exposed more than 200 million contact records. Apollo collects a lot of its information from public sources, including names, email addresses, and company contact information, it also gathers data by scraping Twitter and LinkedIn. The company already notified the security breach to its customers last week, the incident occurred on 23 Jul 2018. “On discovery, we took immediate steps to remediate our systems

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Analysis: Facebook Breach's Impact

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the latest developments in Facebook's massive data breach and expert analysis of the potential for nation-state interference in the U.S. midterm elections.

More Trending

article thumbnail

Dutch and British Governments Slam Russia for Cyberattacks

Data Breach Today

Officials Attribute BadRabbit Ransomware, WADA Breach to APT28, aka 'Fancy Bear' The British and Dutch governments have issued a strong rebuke to the Russian government over an ongoing series of "Fancy Bear" hack attacks that they say were launched by Russia's military intelligence agency Russian Main Intelligence Directorate, aka the GRU.

article thumbnail

Detecting Credit Card Skimmers

Schneier on Security

Interesting research paper: " Fear the Reaper: Characterization and Fast Detection of Card Skimmers ": Abstract: Payment card fraud results in billions of dollars in losses annually. Adversaries increasingly acquire card data using skimmers, which are attached to legitimate payment devices including point of sale terminals, gas pumps, and ATMs. Detecting such devices can be difficult, and while many experts offer advice in doing so, there exists no large-scale characterization of skimmer technol

Paper 82
article thumbnail

Analysis: Opioid Legislation Stripped of Privacy Provision

Data Breach Today

Although the passage by Congress of the Support for Patients and Communities Act this week is an important step in the nation's battle against the opioid drug addiction crisis, it lacks a critical privacy provision, says Geisinger Health CIO John Kravitz, who analyzes the implications.

Privacy 113
article thumbnail

Learn how to switch on AI at our virtual conference

IBM Big Data Hub

IBM is launching a live, virtual conference around AI. Community Day: Artificial Intelligence on October 11 from 10 AM to 4 PM Eastern Daylight Time (EDT). It’s a one-day exploration of applied AI, the tools that can help you harness it, and coding tutorials.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Successful Scammers Call After Lunch

Dark Reading

Analysis of 20,000 voice phishing, or vishing, calls reveals patterns in how social engineers operate and how targets respond.

article thumbnail

SEC Fines Broker-Dealer $1 Million in First Enforcement Action Under Identity Theft Rule

Hunton Privacy

On September 26, 2018, the SEC announced a settlement with Voya Financial Advisers, Inc. (“Voya”), a registered investment advisor and broker-dealer, for violating Regulation S-ID, also known as the “Identity Theft Red Flags Rule,” as well as Regulation S-P, the “Safeguards Rule.” Together, Regulations S-ID and S-P are designed to require covered entities to help protect customers from the risk of identity theft and to safeguard confidential customer information.

article thumbnail

The Apollo Breach Included Billions of Data Points

WIRED Threat Level

Sales intelligence firm Apollo left a "staggering amount" of exposed online, including 125 million email addresses and nine billion data points.

Sales 76
article thumbnail

Who Do You Trust? Parsing the Issues of Privacy, Transparency & Control

Dark Reading

Technology such as Apple's device trust score that decides "you" is "not you" is a good thing. But only if it works well.

Privacy 79
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Is your organization ready for EIM managed services?

OpenText Information Management

Moving to managed services for your Enterprise Information Management (EIM) systems is a major step for any organization. A great deal has been written about how to select the ideal managed services provider for your business, but there has been less attention given to whether your business is ready for EIM managed services. This blog … The post Is your organization ready for EIM managed services?

article thumbnail

Most Home Routers Are Full of Vulnerabilities

Dark Reading

More than 80% of surveyed routers had, on average, 172 security vulnerabilities, new research shows.

article thumbnail

FTC’s Privacy Shield Enforcement Actions Show Broader Enforcement Lens

HL Chronicle of Data Protection

On September 27, the Federal Trade Commission (FTC) announced proposed settlement agreements with four companies it alleges violated Section 5 of the FTC Act by misrepresenting their certification status and compliance with the EU-U.S. Privacy Shield. This latest set of enforcement actions brings the FTC’s Privacy Shield related enforcement to settlements with eight defendants since the framework was adopted in July 2016.

Privacy 58
article thumbnail

12 AppSec Activities Enterprises Can't Afford to Skip

Dark Reading

The latest Building Security in Maturity Model (BSIMM9) report offers a statistically backed, bare-minimum benchmark for software security initiatives.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Weekly Update 107

Troy Hunt

It's another "business as usual" week; past events, upcoming events, major security news, someone forgetting to renew a certificate and a new Pluralsight course. Actually, thinking about it more, this is possibly the most normal week I can remember, which is kinda disconcerting considering the (potential) impact of some of that news. Next week I'll be back in the US and in Texas so the schedule may be a little erratic, but I'll do what I can to pump out another update on time and with more of th

article thumbnail

Splunk Enterprise Security (ES) - SIEM Product Overview and Insight

eSecurity Planet

We review Splunk's SIEM, which includes integration with the company's User Behavior Analytics (UBA) and Machine Learning toolkit.

article thumbnail

Virus Bulletin 2018: Saudi Dissident Spyware Attack Belies Bigger Threat

Threatpost

A spyware attack on a Saudi dissident living in Canada made headlines this week, but Citizen Lab warns that simpler attacks are the real epidemic.

article thumbnail

10 interview questions to help land the best data pro hires

Information Management Resources

Organizations are desperate to find data scientists and analysts that can help them get the most value from data. These questions can help seperate the best candidates from the rest.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Virus Bulletin 2018: Exposing the Social Media Fraud Ecosystem

Threatpost

The business of fake likes and followers turns out to be a sprawling enterprise -- likely tied back to IoT botnet activity.

IoT 66
article thumbnail

Mandia: Tipping Point Now Here for Rules of Cyber Engagement

Dark Reading

FireEye CEO and nation-state hacking expert Kevin Mandia says Russia began changing the game in 2015.

66
article thumbnail

Sony Smart TV Bug Allows Remote Access, Root Privileges

Threatpost

Software patching becomes a new reality for smart TV owners.

Access 87
article thumbnail

Gimmal is Revolutionizing the Electronic Management of Physical Records and Assets

Gimmal

Physical records management has always been tricky, especially as complex systems have grown up around it. As more of our business information is created and stored electronically, physical records tend to become increasingly siloed. Normally, organizations need a segregated, on-premises system, or manual process that is not well-integrated with the electronic side of the business.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Separating high value from low value KPIs in data government efforts

Information Management Resources

Key performance indicators for data governance help IT decision-makers determine if their business strategies are working. However, all KPIs need periodic assessment to ensure they're adequate.

article thumbnail

Simplified macOS and iOS upgrade workflows

Jamf

Choose when and how you upgrade to macOS Mojave and iOS 12 with the help of two workflow guides.

60
article thumbnail

FTC’s Privacy Shield Enforcement Actions Show Broader Enforcement Lens

HL Chronicle of Data Protection

On September 27, the Federal Trade Commission (FTC) announced proposed settlement agreements with four companies it alleges violated Section 5 of the FTC Act by misrepresenting their certification status and compliance with the EU-U.S. Privacy Shield. This latest set of enforcement actions brings the FTC’s Privacy Shield related enforcement to settlements with eight defendants since the framework was adopted in July 2016.

Privacy 40