Tue.Jul 16, 2019

article thumbnail

Security Flaw Exposed Valid Airline Boarding Passes

Data Breach Today

Amadeus Patches Check-In Software Used by Hundreds of Airlines A vulnerability in global airline check-in software used by 500 airlines could have been exploited to download other individuals' valid boarding passes, potentially giving them access to restricted airport spaces, warns security expert David Stubley. The flaw in Amadeus travel software has now been fixed.

Security 268
article thumbnail

Professional Development – 4 Missed Opportunities for Solution Providers

AIIM

I've been thinking a lot lately about the role of solution providers in the information management industry, specifically as applied to education and professional development. In this post I am focusing on the members of solution providers’ staff that are marketing to customers, selling to customers, acting as the voice of the customer, and implementing and supporting customers’ solutions.

Paper 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OnDemand Webinar | The Power of AI to Disrupt Security Ops

Data Breach Today

How utilizing AI can and will be realistic for any security organization. Learn about the concept of autonomous security driven by AI, probability theory and advanced algorithms in this exclusive webinar.

Security 155
article thumbnail

The Netherlands – First GDPR fine imposed: EUR 460,000

DLA Piper Privacy Matters

Today, the Dutch Data Protection Authority ( Autoriteit Persoonsgegevens , “ Dutch DPA “) issued its first GDPR-fine of EUR 460,000. The fine is imposed on the Dutch Haga Hospital for having an insufficient internal security of patient records. The fact that the first GDPR-fine was imposed on a hospital isn’t a complete surprise, as already in December 2018, the Dutch DPA already announced that it would focus its enforcement actions on the public and health sector.

GDPR 104
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Will Cyberattacks Lead to Prolonged Conflicts?

Data Breach Today

There's good news and bad news about the current state of cybersecurity, according to Richard A. Clarke and Robert K. Knake, two former federal advisers who have written a new book. Learn about their concerns that cyberattacks could escalate into prolonged conflicts.

More Trending

article thumbnail

Insider Medicaid Fraud Case: 'An Important Reminder'

Data Breach Today

Insider Threat a 'Consistent Problem,' a Legal Expert Says The sentencing of a former worker at a substance abuse treatment provider in connection with a Medicaid fraud conspiracy "is an important reminder about the threats from insiders," one privacy attorney says.

Privacy 134
article thumbnail

Zoom Vulnerability

Schneier on Security

The Zoom conferencing app has a vulnerability that allows someone to remotely take over the computer's camera. It's a bad vulnerability, made worse by the fact that it remains even if you uninstall the Zoom app: This vulnerability allows any website to forcibly join a user to a Zoom call, with their video camera activated, without the user's permission.

IT 96
article thumbnail

How a Big Rock Revealed a Tesla XSS Vulnerability

Data Breach Today

Bug Hunter Sam Curry's Find Left Tesla Slightly Red-Faced Software vulnerabilities sometimes have an uncanny knack of revealing themselves, even when a bug hunter is looking someplace else. Sam Curry's probing eventually revealed a cross-site scripting flaw in a Tesla service, which netted him a $10,000 bounty.

125
125
article thumbnail

US Mayors Commit to Just Saying No to Ransomware

Dark Reading

The group of more than 1,400 top elected municipal officials takes the admirable, recommended stance against paying ransoms. However, can towns and cities secure their information technology infrastructure to withstand attacks?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A Closer Look at California Privacy Law Bar on Two Contract Clauses

Data Matters

*This article first appeared in Law360 on July 8, 2019. In September of 2018, California passed a significant new consumer privacy law, the California Consumer Privacy Act, which is the first U.S. law to regulate how businesses with a presence in California collect, share, and use consumer data. The CCPA not only imposes significant compliance obligations on companies conducting business with California residents but also incentivizes class action litigation through both the CCPA’s private right

Privacy 74
article thumbnail

Sprint revealed that hackers compromised some customer accounts via Samsung site

Security Affairs

US telecommunications company Sprint revealed that hackers compromised an unknown number of customer accounts via the Samsung.com “add a line” website. The mobile network operator Sprint disclosed a security breach, the company revealed that hackers compromised an unknown number of customer accounts via the Samsung.com “add a line” website. “On June 22, Sprint was informed of unauthorized access to your Sprint account using your account credentials via the Samsung.c

article thumbnail

New QoreStor takes a byte out of secondary storage costs

Quest Software

Taking a byte out of secondary storage costs is about to get a lot easier with today’s release of QoreStor ! Just as a refresher, QoreStor helps IT organizations accelerate backup performance, reduce backup storage costs significantly and levera.( read more ).

IT 82
article thumbnail

A flaw in discontinued Iomega/Lenovo NAS devices exposed millions of files

Security Affairs

Experts at Vertical Structure and WhiteHat Security discovered a serious flaw that exposed millions of files stored on thousands of exposed Lenovo NAS devices. An analysis conducted by researchers at Vertical Structure and WhiteHat Security allowed discovering a vulnerability in discontinued Iomega/Lenovo NAS devices, tracked as CVE-2019-6160, that exposed millions of files.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Priming the payments ecosystem for explosive growth

Thales Cloud Protection & Licensing

This week marks the return of Amazon Prime Day – Amazon’s seasonal retail event which has fast become a masterclass in driving demand and growth through great customer experience. In fact, last year’s event was touted as ‘the biggest shopping event in history’ , with over 100 million products sold. In a savvy move to drive up premium subscriptions, Prime Day sees subscribed members of the Amazon Prime service access exclusive discounts on an array of products for a limited amount of time – 48 ho

article thumbnail

Apple Device Security for macOS and iOS Devices in Small and Medium Business

Jamf

Staying on top of Apple device security and information security is always a priority for small and medium businesses. With the power of mobile device management (MDM), take proactive steps to ensure protection for all of your Apple devices.

MDM 73
article thumbnail

FBI Publishes GandCrab Decryption Keys

Dark Reading

Publishing the keys should render existing versions of the ransomware far less dangerous for victims.

article thumbnail

NIST proposes Secure Software Development Framework

DXC Technology

Ever since Bill Gates fired off his famous Trustworthy Computing memo in January 2002, developing secure software has been a hot topic of discussion. It was important before then, for sure, but it was often overlooked. It took a series of high-profile worms such as Code Red and Nimda and a series of breaches to […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Attackers Infiltrate the Supply Chain & What to Do About It

Dark Reading

With some security best practices, enterprises can significantly reduce the chances that a potential supply chain attack will affect business operations.

IT 78
article thumbnail

Apollo 11 (and Moonraker) – Out Of This World!

Micro Focus

I’ve blogged about the world’s most famous agent and enterprise technology before, so today’s 50th anniversary of the Apollo 11 lunar mission prompted another blogpost on two of my favourite subjects. Written in the stars The Apollo 11 crew blasted off from Florida on 16 July 1969 on one of the riskiest and most ambitious. View Article.

67
article thumbnail

Media File Jacking allows manipulating media files users receive via Android WhatsApp and Telegram

Security Affairs

Media File Jacking – Security researchers at Symantec demonstrated how to manipulate media files that can be received via WhatsApp and Telegram Android apps. Security experts at Symantec devised an attack technique dubbed Media File Jacking that could allow attackers to manipulate media files that can be received via WhatsApp and Telegram Android apps.

article thumbnail

Organizational Accountability in U.S. Law and Its Relevance to a Federal Data Privacy Law: A CIPL Study

Hunton Privacy

The Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP recently published a white paper on Organizational Accountability’s Existence in U.S. Regulatory Compliance and its Relevance for a Federal Data Privacy Law (the “White Paper”). The White Paper looks at the origins and applications of organizational accountability in U.S. law, and concludes that accountability’s current role in U.S. regulatory frameworks lends significant support for including accountability in any

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Lenovo NAS Firmware Flaw Exposes Stored Data

Dark Reading

More than 5,100 vulnerable devices containing multiple terabytes of data are open to exploitation, researchers found.

81
article thumbnail

CIPL Publishes Q&A on Organizational Accountability in Data Protection

Hunton Privacy

The Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP recently published a Q&A document on organizational accountability in data protection (the “Q&A”). While CIPL has written extensively about the concept of organizational accountability over many years, the Q&A is designed to clarify frequently raised questions about accountability and provide greater context and understanding of the concept, including for law and policy makers considering data privacy l

article thumbnail

Understanding the role of governance in data lakes and warehouses

Information Management Resources

While they have innate differences, and serve organizations differently, there is a universal thread that runs through both, without which, would render them useless.

article thumbnail

Is 2019 the Year of the CISO?

Dark Reading

The case for bringing the CISO to the C-suite's risk and business-strategy table.

Risk 82
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

LenovoEMC Storage Gear Leaks Sensitive Financial Data

Threatpost

Lenovo patches enterprise and SMB network attached storage devices for a vulnerability that leaked data to the public internet.

Cloud 64
article thumbnail

Security Snapshot: OS, Authentication, Browser & Cloud Trends

Dark Reading

New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices.

article thumbnail

WhatsApp, Telegram Coding Blunders Can Expose Personal Media Files

Threatpost

The issue, present on Android versions, is similar to the known man-in-the-disk attack vector.

Privacy 71