Wed.Apr 17, 2019

article thumbnail

10 Highlights: Cryptographers' Panel at RSA Conference 2019

Data Breach Today

Facebook's Cryptocurrency Folly, Scaling Security and Why Doomsday Is Temporary From blockchains and surveillance to backdoors and GDPR, a group of leading cryptographers rounded up the top cybersecurity and privacy matters of the day at the cryptographers' panel held at the recent RSA Conference 2019 in San Francisco.

article thumbnail

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

The Last Watchdog

It’s edifying what you can find shopping in the nether reaches of the dark web. Related: Why government encryption backdoors should never be normalized. Academic researchers from Georgia State University in the U.S. and the University of Surrey in the U.K. recently teamed up and found evidence of an emerging market for stolen and spoofed machine identities.

Marketing 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers: Malware Can Be Hidden in Medical Images

Data Breach Today

But Does 'Flaw' in DICOM File Format Represent a Serious Risk? A "flaw" in the file format of the DICOM standard for communication of medical imaging information could be exploited to hide malware in MRI and CT scans alongside patient data, according to a new research report. But the developer of DICOM contends the feature isn't a flaw and any risks can be mitigated.

article thumbnail

A "Department of Cybersecurity"

Schneier on Security

Presidential candidate John Delaney has announced a plan to create a Department of Cybersecurity. I have long been in favor of a new federal agency to deal with Internet -- and especially Internet of Things -- security. The devil is in the details, of course, and it's really easy to get this wrong. In Click Here to Kill Everybody , I outline a strawman proposal; I call it the "National Cyber Office" and model it on the Office of the Director of National Intelligence.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

'Sea Turtle' DNS Hijacking Group Conducts Espionage: Report

Data Breach Today

Cisco Talos Researchers Describe Group's Methods A nation-state sponsored espionage campaign dubbed "Sea Turtle" has been manipulating the domain name system to target more than 40 organizations, including intelligence agencies - especially in North Africa and the Middle East, Cisco Talos warns. Experts say defenses against DNS hijacking lag.

217
217

More Trending

article thumbnail

Code execution – Evernote

Security Affairs

A local file path traversal issue exists in Evernote 7.9 for macOS which allows an attacker to execute arbitrary programs. Technical observation: A crafted URI can be used in a note to perform this attack using file:/// as an argument or by traversing to any directory like (././././something.app ). Since Evernote also has a feature of sharing notes, in such a case an attacker could leverage this vulnerability and send crafted notes (.enex) to the victim to perform further attacks.

article thumbnail

ISO 27001 checklist: a step-by-step guide to implementation

IT Governance

We’re not going to lie: implementing an ISO 27001 -compliant ISMS (information security management system) is hard work. But as the saying goes, nothing worth having comes easy, and ISO 27001 is definitely worth having. Anyone needing guidance should take a look at our nine-step guide to implementing ISO 27001. 1. Assemble an ISO 27001 implementation team.

Risk 75
article thumbnail

A new variant of HawkEye stealer emerges in the threat landscape

Security Affairs

A new variant of the HawkEye data stealer emerges in the threat landscape as part of ongoing malware distribution campaigns. New malware campaigns leveraging a new variant of the HawkEye data stealer have been observed by experts at Talos. has been under active development since at least 2013. The malicious code is under continuous enhancement, it is offered for sale on various hacking forums as a keylogger and stealer, it allows to monitor systems and exfiltrate information.

article thumbnail

Robot receptionists aren’t the answer: Why the hotel industry should rethink its approach to smart technology

IT Governance

The hospitality sector has been clamouring for technological innovation recently, with organisations eager to find novel ways to improve the customer experience. You might have heard about Connie, a Watson-enabled robot concierge that’s been introduced at the Hilton in McLean, Virginia. But that’s just one example of cutting-edge technology sweeping the hotel industry, with many organisations leveraging IoT (Internet of Things) and other ‘smart’ tech to give customers a taste of the future.

IT 75
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A call to rethink the banking value chain

DXC Technology

Financial services is shifting to platforms for business functions and processes, and that’s a good thing. Moving from applications to Software as a Service (SaaS) and then to Platform as a Service (PaaS) can create new value chains. It can also dramatically reduce the number of error-prone manual processes and foster industry collaboration for superior […].

article thumbnail

How to Conduct a Vulnerability Assessment: 5 Steps toward Better Cybersecurity

eSecurity Planet

A vulnerability assessment is a core requirement for IT security. We outline the benefits and steps for keeping your network and data safe.

article thumbnail

Los cinco grandes desarrollos en la nube

DXC Technology

Abróchense los cinturones. Vamos a viajar a lugares interesantes en la nube, en poco tiempo. La nube híbrida despega Durante años, la nube híbrida no se movió a ningún lado. El motivo es que no resultaba fácil integrar nubes públicas y privadas. Entonces, llegó Kubernetes y todo cambió. Con Kubernetes, siempre y cuando una plataforma […].

Cloud 69
article thumbnail

Justdial is leaking personal details of all customers real-time

Security Affairs

A database belonging to the Indian local search service JustDial was left online without protection exposing personal data of over 100M users. The archive is still leaking personally identifiable information of more than JustDial customers that are accessing the service via its website, mobile app, or even by calling on the customer care number (“88888 88888”).

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Protect your organization from failures or unavailability of remote access infrastructure

OpenText Information Management

In today’s organizations, team members are often geographically dispersed, making high-quality remote access critical to productivity. OpenText™ Exceed™ TurboX is a leading remote access software solution that provides remote access to graphically demanding software on Windows, Linux and UNIX. Used across industries like Electronic Design Automation, Manufacturing, Finance, Oil and Gas, and more, Exceed TurboX … The post Protect your organization from failures or unavailability of remote a

Access 66
article thumbnail

Regulations with Digitization Standards for Temporary Records Issued

National Archives Records Express

On April 10, 2019, we published on the Federal Register , the revised electronic records management regulation (final rule) found for 36 CFR Chapter XII, Subchapter B, Part 1236 , Subpart D – Digitizing Temporary Federal Records. This regulation will be effective on May 10, 2019. It provides standards for digitizing and validating temporary Federal records to allow agencies to dispose of original source records according to a NARA-approved disposition authority.

article thumbnail

Tips for the Aftermath of a Cyberattack

Dark Reading

Incident response demands technical expertise, but you can't fully recover without non-IT experts.

IT 90
article thumbnail

ICO Issues GBP 400,000 Fine for Illegal Collection and Sharing of Personal Data

Hunton Privacy

On April 9, 2019, the UK Information Commissioner’s Office (the “ICO”) levied one of its most significant fines under the Data Protection Act 1998 (the “DPA”) against pregnancy and parenting club Bounty (UK) Limited (“Bounty”), fining the company GBP 400,000. Bounty, which provides new and expectant mothers with information and offers for products and services, collects personal data online, via an app, and offline through hard copy cards.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Nation-State Hacker Group Hijacking DNS to Redirect Email, Web Traffic

Dark Reading

'Sea Turtle' group has compromised at least 40 national security organizations in 13 countries so far, Cisco Talos says.

article thumbnail

Ubiquitous Bug Allows HIPAA-Protected Malware to Hide Behind Medical Images

Threatpost

The ubiquitous nature of the flaw opens the door for rapidly spreading, crippling cyberattacks.

84
article thumbnail

VPN Vulnerabilities Point Out Need for Comprehensive Remote Security

Dark Reading

VPNs are the primary tool for securing remote access, but recently disclosed vulnerabilities point out the weakness of relying on them as the only tool.

article thumbnail

Top 5 Takeaways From The “ForAllSecure Makes Software Security Automous” Livestream

ForAllSecure

In February 2019, Dr. David Brumley, ForAllSecure CEO, and Zach Walker, DIU project manager, discussed how Mayhem, ForAllSecure’s behavior testing solution, has helped secure the Department of Defense’s most critical platforms. The Defense Innovation Unit, also known as DIU, is a progressive group within the Department of Defense employing bleeding-edge technology to solve the nation’s defense challenges.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Ever-Sophisticated Bad Bots Target Healthcare, Ticketing

Dark Reading

From criminals to competitors, online bots continue to scrape information from sites and pose as legitimate users.

71
article thumbnail

Cyberspies Hijacked the Internet Domains of Entire Countries

WIRED Threat Level

A mysterious new group called Sea Turtle targeted 40 organizations in a DNS hijacking spree.

article thumbnail

Researchers: Facebook’s Data-Leveraging Scandal Puts Users on Notice

Threatpost

After a report revealed that Facebook used user data to leverage its relationships with other companies, researchers are stressing that both firms and users need to re-assess data privacy.

article thumbnail

New Malware Campaign Targets Financials, Retailers

Dark Reading

The attack uses a legitimate remote access system as well as several families of malware.

Retail 77
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Data governance in the cloud versus on-premise: Which to use

Information Management Resources

Cloud companies offer convenience, but only if their data governance principles align with your needs. And, if customization is one of your top concerns, on-premise data governance gives you the most flexibility to make tweaks as your company evolves.

article thumbnail

European Commission is not in possession of evidence of issues with Kaspersky products

Security Affairs

The European Commission confirmed that has no evidence of issues associated with using products designed by Kaspersky Lab. In June 2018, European Parliament passed a resolution that classified the security firm’s software as “malicious” due to the alleged link of the company with the Russian intelligence. The call for a ban on Kaspersky’s software among the members of the European Union was part of a report on cyber defense written by Estonian MEP Urmas Paet of the Committee on Foreign Affairs.

article thumbnail

eDiscovery Can Be Murder: eDiscovery Charities

eDiscovery Daily

I know that working on some eDiscovery projects with difficult clients or opposing parties could get you thinking of murder, but, as I said before, I don’t know why anyone would consider committing a murder these days with DNA and all the ways we are tracked by Internet of Things (IoT) devices. However, if you like to solve murders and are in the DC area (or plan to be in mid-May), here’s an event that’s for you.