Sun.Aug 26, 2018

article thumbnail

USBHarpoon a look-like charging cable that can hack into your computer

Security Affairs

A team of security experts has devised a rogue USB charging cable named USBHarpoon that can be used to compromise a computer in just a few seconds. The team was composed of Olaf Tan and Dennis Goh of RFID Research Group , Vincent Yiu of SYON Security , and the popular Kevin Mitnick. The USBHarpoon takes inspiration on the BadUSB project built by researchers at Security Research Labs lead by Karsten Nohl.

article thumbnail

New Phishing Scam Goes After Office 365 Users: Cybersecurity Trends

eDiscovery Daily

According to a recent blog post, there’s a new phishing campaign where the scammers are taking advantage of a small, but serious oversight in Microsoft’s Office 365 suite of online services to serve phishing emails that are visually indistinguishable from work-related emails and appear completely safe. This new attack has impacted an estimated 10% of Office 365 users worldwide.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google researcher found Fortnite Android App vulnerable to Man-in-the-Disk attacks

Security Affairs

A Google security researcher disclosed a vulnerability in the newcome Fortnite Android App that exposes it to Man-in-the-Disk attacks. After a long wait, Fortnite Android app has finally arrived but it hides an ugly surprise, it is vulnerable to Man-in-the-Disk (MitD) attacks that can allow a third-party application to crash it or run malicious code.

Risk 48
article thumbnail

Labels

InfoGovNuggets

Labels are shorthand. Does the person using the label mean the same thing as you do? “For Some Bonds, It’s Too Easy Being Green,” The Wall Street Journal , August 20, 2018 B1. A quarter of Chinese bonds marketed as green bonds were rejected by “a de facto watchdog for the market” as not really being environmentally friendly.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Personal details of 37,000 Eir customers exposed after the theft of a laptop

Security Affairs

Personal details of 37,000 Eir customers exposed after the theft of a laptop, including names, email addresses, phone numbers and account numbers. Eir, the fixed, mobile and broadband telecommunications company of Ireland, has suffered a data breach this week. Personal details of 37,000 Eir customers have been exposed according to the telecommunications company.

More Trending

article thumbnail

Security Affairs newsletter Round 177 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Paper Copy. Once again thank you! · Chinas Belt and Road project (BRI) is a driver of regional cyber threat activity. · North Korea-linked Dark Hotel APT leverages CVE-2018-8373 exploit. · Flaw in SOLEO IP Relay Service potentially exposed

article thumbnail

Who exactly are your partners?

InfoGovNuggets

“U.S. Probes Microsoft on Bribery,” The Wall Street Journal, August 24, 2018 B1. DOJ probes sales of software licenses to middlemen for ultimate sales to smaller governments. Did the middlemen in, say, Hungary, share their discounted purchase price with government officials by way of bribes? Even if they did, is Microsoft liable? Unless the middlemen were Microsoft sales agents (who didn’t take title to the software licenses), or Microsoft knew of the scheme, hard to see FC

Sales 28
article thumbnail

Who’s the boss?

InfoGovNuggets

To have governance, is a single point of accountability required? “Workers Deal With Too Many Bosses,” The Wall Street Journal , August 21, 2018 B1. According to a recent poll, two-thirds of employees have more than one boss. Some employees respond by trying to manage their bosses. From a Governance perspective, if you have multiple bosses, who sets your priorities?

Paper 28