Thu.Aug 01, 2019

article thumbnail

The psychology behind phishing attacks

IT Governance

article thumbnail

The Top 8 Benefits of Data Lineage

erwin

111
111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Visa Contactless Cards Vulnerable to Fraudsters: Report

Data Breach Today

Researchers Say Proxy Machine Can Bypass Transaction Limits Via Man-in-the-Middle Attack A newly discovered vulnerability in Visa's contactless payment cards could allow fraudsters to bypass payment limits of 30 British pounds ($37) at U.K. banks, according to researchers at Positive Technologies, who claim the vulnerability could be exploited in other countries as well.

207
207
article thumbnail

ROUNDTABLE: Huge Capital One breach shows too little is being done to preserve data privacy

The Last Watchdog

Company officials at Capital One Financial Corp ought to have a crystal clear idea of what to expect next — after admitting to have allowed a gargantuan data breach. Capital One’s mea culpa coincided with the FBI’s early morning raid of a Seattle residence to arrest Paige Thompson. Authorities charged the 33-year-old former Amazon software engineer with masterminding the hack.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Pentagon Buys Equipment With Known Vulnerabilities: Audit

Data Breach Today

Report Also Highlights Cybersecurity Concerns About Use of Equipment Made in China The U.S. Department of Defense has purchased IT gear known to have significant cybersecurity vulnerabilities, according to a new inspector general audit, which also highlights concerns about the use of equipment manufactured in China.

More Trending

article thumbnail

Report Highlights Risk of Medical Device 'Workarounds'

Data Breach Today

Experts: Problems at VA Medical Center Are Common at Many Healthcare Entities A watchdog agency review of a VA medical center in California spotlights security issues involving medical device "workarounds" that some experts say are common but often overlooked or underestimated risks.

Risk 155
article thumbnail

How to Help Teams through the Cycle of Change

AIIM

It is common to take great care in the selection and implementation of new technology. Interactions between hardware and software are cautiously investigated; operating systems and network connections are carefully tested, and uptime on critical systems is painstakingly protected. But one very influential factor that is often overlooked is the natural and emotional reactions of people when things change.

article thumbnail

Cisco Settles Whistleblower Case for $8.6 Million

Data Breach Today

Settlement Stems From Flaws in Video Surveillance Software Sold to Government Agencies Cisco has agreed to pay $8.6 million to settle a whistleblower lawsuit that claimed the networking company sold video surveillance software to local, state and federal agencies over a six-year period that contained serious security vulnerabilities.

article thumbnail

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US Gov

Security Affairs

Cisco is going to pay $8.6 million to settle a legal dispute for selling vulnerable software to the US government. Back in 2008, a whistle-blower identifies a vulnerability in Cisco video surveillance software, but the tech giant continued to sell the software to US agencies until July 2013. The case was filed in the Federal District Court for the Western District of New York and was handled under the False Claims Act, which specifically addresses fraud and misconduct in federal government contr

Sales 89
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cisco Pays $8.6M in First False Claims Suit for Vulnerabilities in Security Product

Dark Reading

A security consultant reported vulnerabilities in Cisco's Video Surveillance Manager in 2009 - but the company ignored the issues and fired the consultant.

article thumbnail

New Mirai botnet hides C2 server in the Tor network to prevent takedowns

Security Affairs

Researchers at Trend Micro have discovered a new Mirai Botnet that has command and control server in the Tor network to make takedowns hard. Experts at Trend Micro have discovered a new Mirai Botnet that uses a Command and Control hidden in the Tor Network, a choice that protects the anonymity of the operators and makes takedowns operated by law enforcement hard. “Barely a month since discovering a new Miori variant , we found another new Mirai sample through our research.” reads th

IoT 82
article thumbnail

Unpatched Flaws in IoT Smart Deadbolt Open Homes to Danger

Threatpost

Researchers are warning that unpatched flaws found in the Hickory Smart Bluetooth Enabled Deadbolt allow an attacker with access to a victim's phone to break into their houses.

IoT 78
article thumbnail

Recently discovered Hexane group targets the oil and gas industry

Security Affairs

Security researchers at Dragos Inc have tracked the activity of a threat actor recently discovered and dubbed Hexane. Security experts at Dragos Inc. have discovered a new threat actor, tracked as Hexane, that is targeting organizations in the oil and gas industry and telecommunication providers. The Hexane group has been active since at least the middle of 2018, it intensified its activity since early 2019 with an escalation of tensions within the Middle East. “Dragos identified a new act

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Demystifying New FIDO Standards & Innovations

Dark Reading

Staying on top of the latest cybersecurity risks and preferred attack methods can feel impossible, but standards like FIDO2 are designed to help relieve the burden.

article thumbnail

7 reasons why retail mobile technology is growing in 2019

Jamf

According to a recent study Jamf commissioned, here are 7 reasons why retail mobile technology is growing in 2019. A powerful Mobile Device Management (MDM) system is key to keeping it all running smoothly.

Retail 75
article thumbnail

Cloud Pak for Data on Red Hat OpenShift: The best of both worlds

IBM Big Data Hub

IBM’s integrated platform for Data & AI, which is 100% complimentary to Red Hat offerings. It runs on OpenShift today and has a hardware version called Cloud Pak for Data System. The beauty of Cloud Pak for Data is that it includes all of IBM’s strategic Data and AI services – including Watson – as one integrated offering. This allows customers to consume what they need in a cloud-native fashion on the infrastructure of their choice (on-prem, IBM Cloud, AWS, Azure and more) and build persona

Cloud 73
article thumbnail

PCI Security Council, Retail ISAC Warn Retailers on Magecart Attacks

Dark Reading

Online card-skimming activities grew sharply this summer fueled by the availability of attack kits and other factors, Malwarebytes says.

Retail 82
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

MICROCHIPS Act aims at improving tech supply chain

Security Affairs

MICROCHIPS Act ( S. 2316 ) – Two US Senators have introduced a bill to protect US government supply chain against foreign sabotage and cyber espionage. Two US senators have introduced legislation a bill, dubbed Manufacturing, Investment and Controls Review for Computer Hardware, Intellectual Property and Supply ACT (MICROCHIPS Act – S. 2316) that aims at protecting US government supply chain against foreign sabotage and cyber espionage.

article thumbnail

A Realistic Path Forward for Security Orchestration and Automation

Dark Reading

Security teams often look to technology to solve their security challenges. Yet sometimes investing in new products can create more issues.

article thumbnail

Colorado State Archives selects Preservica to protect permanent state records

Preservica

Preservica , the market leader in SaaS-based active digital preservation, has been selected by the Colorado State Archives (CSA) to preserve and streamline access to all mandated permanent records generated by Colorado government agencies, divisions, courts, special districts and other entities. The initial project will include more than 50 terabytes of audio recordings of the Colorado State General Assembly proceedings from 1973-2012.

article thumbnail

DARPA to Bring its Smart Ballot Boxes to DEF CON for Hacking

Dark Reading

The agency this week will share the source code and hardware specifications for the secure voting system prototypes.

IT 86
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cyber Defense Magazine – August 2019 has arrived. Enjoy it!

Security Affairs

Cyber Defense Magazine August 2019 Edition has arrived. We hope you enjoy this month’s edition … packed with over 205 pages of excellent content. Our Growing Media Platforms… www.cyberdefenseawards.com www.cyberdefensemagazine.com www.cyberdefenseradio.com www.cyberdefensetv.com After 7 Years, We’ve Completely Rebuilt CyberDefenseMagazine.com – Please Let Us Know What You Think.

IT 66
article thumbnail

1M Payment Cards Exposed in South Korea Breach

Dark Reading

South Korea is the largest victim of card present data theft at a time when criminals are ramping up cyberattacks in the Asia-Pacific region.

77
article thumbnail

For $8.6M, Cisco Settles Suit Over Bug-Riddled Video Surveillance Software

Threatpost

The complaint claims the networking giant knowingly sold bug-riddled software to federal and state governments, that would allow complete network compromise.

article thumbnail

47% of Android Anti-Malware Apps Are Flawed

Dark Reading

Protection failures come at a time when malicious Android software is becoming more of a problem.

86
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

EUROPE: e-Privacy Regulation – changes regarding electronic communications and digital marketing

DLA Piper Privacy Matters

Since the European Commission unveiled a proposal for an e-Privacy Regulation in January 2017, this new piece of legislation, aiming to adapt rules on electronic communications and cookies, has undergone many iterations. The European Parliament has left its version untouched since October 2017, and in the meantime the Council of the EU has regularly published changes of its own (reflecting points of divergence between the various EU Member States).

article thumbnail

SecOps Success Through Employee Retention

Dark Reading

To keep your turnover low, focus on these areas: compensation, advancement opportunities, training, and environment.

76
article thumbnail

Facebook Plans on Backdooring WhatsApp

Schneier on Security

This article points out that Facebook's planned content moderation scheme will result in an encryption backdoor into WhatsApp: In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is dec