Thu.May 30, 2019

article thumbnail

Canada Uses Civil Anti-Spam Law in Bid to Fine Malware Purveyors

Krebs on Security

Canadian government regulators are using the country’s powerful new anti-spam law to pursue hefty fines of up to a million dollars against Canadian citizens suspected of helping to spread malicious software. In March 2019, the Canadian Radio-television and Telecommunications Commission (CRTC) — Canada’s equivalent of the U.S. Federal Communications Commission (FCC), executed a search warrant in tandem with the Royal Canadian Mounted Police (RCMP) at the home of a Toronto softwa

article thumbnail

Researcher Describes Docker Vulnerability

Data Breach Today

No Patch Available Yet, But Exploiting the Flaw Would Be 'Challenging' A security researcher has found a significant flaw all versions of Docker, an open source container platform, that can give attackers read and write access to all the files within the host system, allowing them to execute arbitrary code. As of now, there's no patch available.

Access 191
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of data breaches and cyber attacks in May 2019 – 1.39 billion records leaked

IT Governance

The cyber security story for May 2019 is much the same as it was last month, with one mammoth breach raising the monthly total. The offender this time is the First American Financial Corp. , which breached sixteen years’ worth of insurance data. That incident accounted for more than 60% of all of May’s breached records. In total, at least 1,389,463,242 records were compromised.

article thumbnail

Flipboard Resets Passwords After Database Intrusions

Data Breach Today

Hashed and Salted Usernames and Passwords Exposed News aggregator Flipboard has initiated a systemwide password reset affecting as many as 150 million users following two database intrusions. Flipboard doesn't collect ID or financial information, but users could be at risk if they have reused their Flipboard password on other services.

Passwords 179
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

VPNpro research: this Chinese-linked company secretly owns 10 VPNs with 86 million installs

Security Affairs

Innovative Connecting is actually a Chinese company that secretly owns 10 VPN products with a total of 86 million installs under its belt. Recent research by the cybersecurity experts at VPNpro shows that the popular mobile VPN developer Innovative Connecting is actually a Chinese company that secretly owns 10 VPN products with a total of 86 million installs under its belt.

Privacy 108

More Trending

article thumbnail

Seven Microservices Identity Questions to Secure your Data

Thales Cloud Protection & Licensing

As I noted in my last blog post , containers, which are now pervasive in enterprises, are ephemeral, and microservices frameworks like Kubernetes treat them as such. Data security is a complex subject, and, unfortunately, microservices only add to the complexity. I frequently try to untangle the threads of knotty issues by asking questions. So, in this and my next few blogs, I will share some questions you might want to ask as you go about securing your data in a microservices environment.

article thumbnail

Open Source Security - How to Defend at the Speed of Attack

Data Breach Today

On the sixth stop of a multi-city tour, ISMG and Sonatype visited San Francisco for an engaging discussion on how to mitigate risks introduced by open source software. Sonatype CMO Matt Howard discusses the relevance and value of this application security conversation.

Security 156
article thumbnail

Thailand’s First Personal Data Protection Law Enters into Effect

Hunton Privacy

On May 27, 2019, Thailand’s Personal Data Protection Act B.E. 2562 (A.D. 2019) (the “PDPA”), which was passed by the National Legislative Assembly on February 28, 2019, was finally published in the Government Gazette, and thus became effective on May 28, 2019. Although now effective, the main operative provisions concerning personal data protection (including requests for data subjects’ consent; collection/use and disclosure of personal data; rights of data subjects; complaints; civil liabilitie

article thumbnail

Convert Plus WordPress plugin flaw allows hackers to create Admin accounts

Security Affairs

The WordPress plugin Convert Plus is affected by a critical flaw that could be exploited by an unauthenticated attacker to create accounts with administrator privileges. The WordPress plugin Convert Plus is affected by a critical vulnerability that could be exploited by an unauthenticated attacker to create accounts with administrator privileges. A vulnerability ties with the lack of filtering when processing a new user subscription via a form implemented by the Convert Plus plugin that already

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Fraudulent Academic Papers

Schneier on Security

The term "fake news" has lost much of its meaning, but it describes a real and dangerous Internet trend. Because it's hard for many people to differentiate a real news site from a fraudulent one, they can be hoodwinked by fictitious news stories pretending to be real. The result is that otherwise reasonable people believe lies. The trends fostering fake news are more general, though, and we need to start thinking about how it could affect different areas of our lives.

Paper 88
article thumbnail

The Ransomware Dilemma: What if Your Local Government Is Next?

Dark Reading

Baltimore has so far refused to comply with a ransom demand. It's being forced to make a decision all such victims face: to act morally or practically.

article thumbnail

POS Malware Found at 102 Checkers Restaurant Locations

Threatpost

One of the most popular U.S. drive-through restaurants has been hit with a data breach due to POS malware.

article thumbnail

2.3B Files Currently Exposed via Online Storage

Dark Reading

Digital Shadows researchers scanned various online file-sharing services and concluded the number of exposed files is up 50% from March of 2018.

86
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Jamf Connect now offers Ping Identity integration

Jamf

Jamf Connect has expanded the list of cloud identity providers it supports to include Ping Identity. This integration offers support for both Jamf Connect LoginWindow and Verify (password sync).

article thumbnail

Checkers double drive-thru restaurants chain discloses card breach

Security Affairs

Checkers and Rally’s, one of the largest chains of double drive-thru restaurants in the United States, disclosed a credit card breach. “We recently became aware of a data security issue involving malware at certain Checkers and Rally’s locations.” reads a breach notice published by the company. “After discovering the issue, we quickly engaged leading data security experts to conduct an extensive investigation and coordinated with affected restaurants and federal law enfor

Sales 75
article thumbnail

Fax & Omnichannel Communications Learn Path at Enterprise World

OpenText Information Management

If you rely on OpenText™ fax and notifications solutions in your business, we’ve added a new element to Enterprise World that you need to know about: technology-specific Learn Paths designed to provide practical, technical and insightful information on the latest product features and capabilities. The Fax & Omnichannel Communications Learn Path delivers practical training, tools … The post Fax & Omnichannel Communications Learn Path at Enterprise World appeared first on OpenText B

article thumbnail

Happy anniversary: The innovation continues with IBM Cloud Pak for Data v2.1

IBM Big Data Hub

It’s been one year since we launched IBM Cloud Pak for Data (previously IBM Cloud Private for Data), IBM's data and AI platform for today's modern enterprise. Since then, this platform has been embraced by hundreds of customers, and Forrester ranked it No.

Cloud 72
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New Linux Malware ‘HiddenWasp’ Borrows from Mirai, Azazel

Threatpost

HiddenWasp is unique for Linux-based malware in that it targets systems to remotely control them.

IT 98
article thumbnail

Caveat Emptor: Calculating the Impact of Global Attacks on Cyber Insurance

Dark Reading

The reality for business owners and CISOs looking to protect their business from a cyberattack is that cyber insurance is not a catchall for protecting against risk and loss.

article thumbnail

AI, the Mandatory Element of 5G Mobile Security

Threatpost

The complexity and scale of the 5G ecosystem, combined with a lack of skills and training in software-centric security, will be important drivers for AI deployment in the carrier space.

article thumbnail

Vulnerability Leaves Container Images Without Passwords

Dark Reading

A old vulnerability in Alpine Linux containers has spread and propagated to as much as 20% of the containers on the Docker Store.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Emissary Panda APT group hit Government Organizations in the Middle East

Security Affairs

Chinese Cyber-Spies Target Government Organizations in Middle East. Chinese APT group Emissary Panda has been targeting government organizations in two different countries in the Middle East. Experts at Palo Alto Networks reported that the Chinese APT group Emissary Panda (aka APT27 , TG-3390 , Bronze Union , and Lucky Mouse ) has been targeting government organizations in two different countries in the Middle East.

article thumbnail

7 proven ways to get your ISO 27001 project on track

IT Governance

Do your research. Ditch the jargon and learn how to implement an ISMS (information security management system) in nine steps with our free guide. We’ve also got a handy pocket guide – Nine Steps to Success – An ISO 27001 Implementation Overview – that explains (in layman’s terms) how to develop and deploy an ISMS. Read the Standard. ISO/IEC 27001:2013 sets out the basic elements of an ISMS.

Risk 65
article thumbnail

Facebook user privacy suits over Cambridge Analytica have legs

Information Management Resources

A U.S. District judge is overseeing dozens of suits alleging users have no real control over their personal information, and that the company has repeatedly misled users to continue mining it.

Mining 62
article thumbnail

Palo Alto Networks Confirms PureSec Acquisition

Dark Reading

The company also agreed to buy container security company Twistlock as it develops its cloud security suite.

Cloud 73
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Major infrastructure investments needed to thwart growing cyber risks

Information Management Resources

A majority of C-suite executives and policy makers in the United States think investing in security software infrastructure and emerging technologies is critical to protecting U.S. data.

Risk 58
article thumbnail

Don’t trap your workers in an “open office”

DXC Technology

I’ve been working from my home for the past 20 years, a situation for which I am extremely grateful. It has all the advantages you could imagine. There’s no stressful, time-wasting commute. I control of my environment and have the flexibility to set my own schedule and take breaks without raising eyebrows. Plus I’m always […].

IT 51
article thumbnail

Five best practices for better marketing planning from Ventana Research

IBM Big Data Hub

Learn how to upgrade your marketing plans with some insights from Ventana Research.