Thu.Feb 28, 2019

article thumbnail

Dow Jones Data Exposed on Public Server

Data Breach Today

'Authorized Third Party' Responsible for Leak, Company Says An "authorized third party" exposed a Dow Jones database with more than 2.4 million records of risky businesses and individuals on a public server without password protection. The incident points to the importance of proper vendor risk management, security experts say.

Passwords 248
article thumbnail

Booter Boss Interviewed in 2014 Pleads Guilty

Krebs on Security

A 20-year-old Illinois man has pleaded guilty to running multiple DDoS-for-hire services that launched millions of attacks over several years. The plea deal comes almost exactly five years after KrebsOnSecurity interviewed both the admitted felon and his father and urged the latter to take a more active interest in his son’s online activities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dongle Danger: Operating Systems Don't Defend Memory

Data Breach Today

Researchers Say Connecting to USB 3 Devices Could Lead to Data Theft Windows, MacOS and Linux operating systems don't sufficiently protect memory, making it possible for a fake network card to sniff banking credentials, encryption keys and private files, according to new research. Fixes are in the pipeline, but caution should be used before connecting to peripherals in public areas.

article thumbnail

Can Everybody Read the US Terrorist Watch List?

Schneier on Security

After years of claiming that the Terrorist Screening Database is kept secret within the government, we have now learned that the DHS shares it "with more than 1,400 private entities, including hospitals and universities.". Critics say that the watchlist is wildly overbroad and mismanaged, and that large numbers of people wrongly included on the list suffer routine difficulties and indignities because of their inclusion.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

15 GDPR Probes in Ireland Target Facebook, Twitter, Others

Data Breach Today

Facebook Alone the Focus of 10 Separate Regulatory Investigations by Privacy Watchdog Ireland's privacy watchdog has its eye on Facebook. Ten of the 15 major investigations that the Data Protection Commission launched since the EU's tough new privacy law, GDPR, went into full effect in May 2018 are focused on Facebook.

GDPR 221

More Trending

article thumbnail

Guarding Against Cybertheats Targeting End Users

Data Breach Today

Guarding against threats targeting end users is among the top security priorities this year at a large group of surgical centers in Washington state - and artificial intelligence could play an important role, says CIO Curt Kwak of Proliance Surgeons.

article thumbnail

IBM Streams brings real-time insights to IBM Cloud Private for Data

IBM Big Data Hub

Today, we’re pleased to announce the availability of IBM Streams as a premium add-on to IBM Cloud Private for Data, delivering on the promise of joining data with AI together in real-time.

Cloud 77
article thumbnail

CoinHive Cryptocurrency Mining Service will shut down on March 8, 2019

Security Affairs

The popular in-browser cryptocurrency mining service Coinhive has announced that it will shut down on March 8, 2019. The service made the headlines across the years because it was used by crooks to abuse computational resources of the victims that were visiting compromised websites hosting the Coinhive script. Coinhive was initially launched as a legitimate service for site administrators to generate revenue from the traffic visiting their websites.

Mining 75
article thumbnail

Turkish Group Using Phishing Emails to Hijack Popular Instagram Profiles

Dark Reading

In some cases, attackers have demanded ransom, nude photos/videos of victims in exchange for stolen account, Trend Micro says.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Facing uncertainty – Part 2: Three steps to creating agility and resilience

Collibra

This is part two of a two-part blog series about facing uncertainty and creating ability and resilience in data management. Being resilient in the face of uncertainty. No matter the source of the political uncertainties that can impact international data flows, organizations need to be prepared. The outcome of good preparation should be the agility that enables organizational resilience in the face of politically-motivated disruption to international data flows.

article thumbnail

Weekly podcast: ICANN, DNS and DNSSEC; credential stuffing; passwords managers; and EDPS report

IT Governance

This week, we discuss ICANN’s warning about DNS attacks, the extent of credential stuffing attacks on the retail sector, password managers’ responses to recent research into security flaws, and the European Data Protection Supervisor’s annual report for 2018. Hello, and welcome to the IT Governance podcast for Thursday, 28 February 2019.

article thumbnail

Data Leak Exposes Dow Jones Watchlist Database

Dark Reading

The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone.

Risk 73
article thumbnail

Update on the Federal Electronic Records Modernization Initiative (FERMI)

National Archives Records Express

Here is the latest on the Federal Electronic Records Modernization Initiative (FERMI) , our effort to make it easier for Federal agencies to obtain electronic records management (ERM) services and solutions. Since last August when we hosted an Industry Day with GSA , we have been working on a number of FERMI-related projects. We are continuing to work with two groups at the General Services Administration (GSA): the Unified Shared Services Management (USSM) office under the Office of Shared Solu

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Ransomware, Trojan and Miner together against “PIK-Group”

Security Affairs

Security expert Marco Ramilli analyzed a new piece of malware apparently designed to target PIK-Group that implements ransomware , Trojan, and Miner capabilities. When an unknown sender suggests me to click on a super wired url , dropping a ZIP file straight in my box, by saying it’s getting the next targeted attack on a huge company, well I kinda looking forward to it!

article thumbnail

EDPB Issues Statement on U.S. Foreign Account Tax Compliance Act

Hunton Privacy

On February 25, 2019, the European Data Protection Board (the “EDPB”) issued a statement regarding the transfer of personal data from Europe to the U.S. Internal Revenue Service (the “IRS”) for purposes of the U.S. Foreign Account Tax Compliance Act (“FATCA”). Enacted in 2010, FATCA requires that foreign financial institutions report information about financial accounts and assets held by their U.S. account holders to the IRS.

article thumbnail

In 2019, Cryptomining Just Might Have an Even Better Year

Dark Reading

The practice today is so pervasive that cryptojacking scripts are said to be running on an estimated 3% of all sites that users visit.

81
article thumbnail

Modernize applications with automated, self-service data

IBM Big Data Hub

IBM recently released IBM InfoSphere Virtual Data Pipeline (VDP) to help clients innovate at the speed of customer demands.

81
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Solving Security: Repetition or Redundancy?

Dark Reading

To effectively defend against today's risks and threats, organizations must examine their failings as well as their successes.

article thumbnail

Cisco Fixes Critical Flaw in Wireless VPN, Firewall Routers

Threatpost

Cisco said that CVE-2019-1663, which has a CVSS score of 9.8, allows unauthenticated, remote attackers to execute arbitrary code.

IoT 79
article thumbnail

Microsoft Debuts Azure Sentinel SIEM, Threat Experts Service

Dark Reading

New services, which are both available in preview, arrive at a time when two major trends are converging on security.

article thumbnail

Organizations Face Cyber Threats Big and Small: Research

eSecurity Planet

Social media, encrypted data traffic and nation-states are just some of the cybersecurity threats organizations face, research shows.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Dow Jones Leak Exposes Watchlist Database

Dark Reading

The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone.

Risk 58
article thumbnail

AI use cases, job opportunities set to explode this year

DXC Technology

Artificial intelligence (AI) already is changing industries across the world, from manufacturing to healthcare to technology to retail. But the changes really are just beginning; AI’s infiltration of every aspect of our economy, culture, and personal lives will only intensify and accelerate. Forbes contributor Bernard Marr predicts five significant developments/trends on the AI front this […].

article thumbnail

Five technology trends driving the energy sector in 2019

OpenText Information Management

In the energy sector, it’s not just change that organizations must prepare for – it’s the speed of change. In October last year, the price of Brent crude was as high as $85 per barrel. Optimism was in the air and there was talk of new capital investments and new development projects. By early this … The post Five technology trends driving the energy sector in 2019 appeared first on OpenText Blogs.

article thumbnail

Loi sur l’égalité salariale : les dividendes de la justice

DXC Technology

DXC Technology et Beqom organisent un petit déjeuner le 15 mars 2019 sur la loi Pénicaud d’égalité H/F et le calcul de son index. L’inscription est gratuite pour les professionnels des ressources humaines. Dernières places disponibles. L’une des principales mesures du gouvernement pour lutter contre le sexisme au travail vise à s’attaquer résolument aux écarts […].

53
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

FTC Issues Record $5.7 Million COPPA Penalty Against Music.ly

Hunton Privacy

On February 27, 2019, the Federal Trade Commission announced a record $5.7 million civil penalty against popular video creation and sharing app Music.ly (now known as TikTok) for violations of U.S. children’s privacy rules. According to the FTC’s complaint, Music.ly is designed to appeal to young children (among others), and the company was aware that a significant percentage of Music.ly users were children under the age of 13.

Privacy 53
article thumbnail

10 top digital investment trends for 2019

Information Management Resources

Collaborative intelligence, AI, open banking, omniscient healthcare and 5G technology are among the trends that will have the biggest impact on business this year.

60
article thumbnail

Spoofing in Depth

Adam Shostack

I’m quite happy to say that my next Linkedin Learning course has launched! This one is all about spoofing. It’s titled “ Threat Modeling: Spoofing in Depth.” It’s free until at least a week after RSA. Also, I’m exploring the idea that security professionals lack a shared body of knowledge about attacks, and that an entertaining and engaging presentation of such a BoK could be a useful contribution.