Thu.Nov 08, 2018

article thumbnail

Bankers Life Hack Affects More Than 566,000

Data Breach Today

Company Says Medicare Supplemental Plan Policyholders Among Those Impacted Bankers Life is notifying more than 566,000 individuals, including Medicare supplemental insurance policyholders, that their personal information was exposed in a hacking incident. Employee credentials were compromised, enabling unauthorized access to certain company websites containing personal data.

Insurance 207
article thumbnail

Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide

Security Affairs

Security researchers revealed in a recent paper that over the past years, China Telecom used BGP hijacking to misdirect Internet traffic through China. Security researchers Chris C. Demchak and Yuval Shavitt revealed in a recent paper that over the past years, China Telecom has been misdirecting Internet traffic through China. China Telecom was a brand of the state-owned China Telecommunications Corporation, but after marketization of the enterprise spin off the brand and operating companies as

Paper 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dutch Police Bust 'Cryptophone' Operation

Data Breach Today

Another Secure Service - As Allegedly Marketed to Criminals - Fails to Deliver Once again, a supposedly secure service allegedly marketed to criminals has proven to have limits. Dutch police have busted a "cryptophone" operation, allowing them to decrypt more than 258,000 encrypted chat messages, leading to a drug lab bust, 14 arrests and the seizure of cash, drugs and weapons.

article thumbnail

What’s the difference between a risk assessment and a business impact analysis?

IT Governance

Whether you’re creating a disaster recovery or business continuity plan, you must conduct a risk assessment and a BIA (business impact analysis). These processes inform your decision making and are often grouped together because they tackle similar issues, but don’t think you can get away with doing only one. Think of them instead as two parts of a whole.

Risk 90
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

iOS 12.1 Vulnerability

Schneier on Security

This is really just to point out that computer security is really hard : Almost as soon as Apple released iOS 12.1 on Tuesday, a Spanish security researcher discovered a bug that exploits group Facetime calls to give anyone access to an iPhone users' contact information with no need for a passcode. [.]. A bad actor would need physical access to the phone that they are targeting and has a few options for viewing the victim's contact information.

Access 91

More Trending

article thumbnail

Cisco Accidentally Released Dirty Cow Exploit Code in Software

Threatpost

Cisco revealed that it had "inadvertently" shipped an in-house exploit code that was used in test scripts as part of its TelePresence Video Communication Server and Expressway Series software.

article thumbnail

XSS flaw in Evernote allows attackers to execute commands and steal files

Security Affairs

Security expert discovered a stored XSS flaw in the Evernote app for Windows that could be exploited to steal files and execute arbitrary commands. A security expert that goes online with the moniker @sebao has discovered a stored cross-site scripting (XSS) vulnerability in the Evernote application for Windows that could be exploited by an attacker to steal files and execute arbitrary commands.

article thumbnail

5 Things the Most Secure Software Companies Do (and How You Can Be Like Them)

Dark Reading

What sets apart the largest and most innovative software engineering organizations? These five approaches are a good way to start, and they won't break the bank.

article thumbnail

Compliance to Cybersecurity Requirements and False Claims Act

Security Affairs

There’s a growing risk of companies receiving substantial fines for not complying with cybersecurity standards under False Claims Act. However, an emerging concern for businesses that act as contract-based service providers for government entities is that those establishments could also be liable under the False Claims Act (FCA). What Is the False Claims Act?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to write a GDPR privacy notice – with documentation template example

IT Governance

Updated 8 November 2018. This blog was originally published before the GDPR took effect in May 2018. An integral part of EU GDPR (General Data Protection Regulation) compliance is producing appropriate documentation. If you are classified as a data controller under the GDPR, this includes creating a privacy notice that informs data subjects of your corporate privacy policy.

GDPR 76
article thumbnail

689,272 plaintext records of Amex India customers exposed online

Security Affairs

Records associated with 689,272 plaintext records Amex India customers were exposed online via unsecured MongoDB server. Personal details of nearly 700,000 American Express (Amex India) India customers were exposed online via an unsecured MongoDB server. The huge trove of data was discovered by Bob Diachenko from cybersecurity firm Hacken, most of the records were encrypted, but 689,272 records were stored in plaintext.

article thumbnail

Avoid managing a myriad of code signing solutions

Thales Cloud Protection & Licensing

Code signing is here to stay as all organizations that plan to distribute code or other data over the Internet risk corruption and tampering. In the Internet of Things, where installations can vary from just a few devices to millions of devices, controls are needed to make sure that the connected devices remain secure, that only valid software or firmware updates are received, and that only authorized software can execute on the device.

article thumbnail

How to write a GDPR-compliant data subject access request procedure – with template

IT Governance

Updated X November 2018. This blog was originally published before the GDPR took effect in May 2018. The EU’s GDPR (General Data Protection Regulation) gives data subjects the right to access their personal data from data controllers that are processing it and “to exercise that right easily and at reasonable intervals, in order to be aware of, and verify, the lawfulness of the processing”.

GDPR 72
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Effective change management for your digital evolution – Part 3

TAB OnRecord

Our previous posts in this three-part series discussed the importance of recognizing office culture, accountability, inclusiveness, and the potential fears of your digital evolution for effective change management. In part three we explore where to begin when implementing your pilot project, and why you should celebrate every success of your pilot project.

article thumbnail

How the GDPR and NIS Regulations can help Cloud service providers win business

IT Governance

This year, two laws have taken effect in the UK that will reshape the way Cloud service providers operate. The EU GDPR (General Data Protection Regulation) and NIS Regulations (Network and Information Systems Regulations 2018) place an added emphasis on organisations’ ability to prevent data breaches and ensure that critical infrastructure remains operational in the event of disruption.

GDPR 71
article thumbnail

Symantec Uncovers North Korean Group's ATM Attack Malware

Dark Reading

Lazarus Group has been using FastCash Trojan on obsolete AIX servers to empty tens of millions of dollars from ATMs.

87
article thumbnail

Weekly podcast: HSBC, Evernote and Apache Struts

IT Governance

This week, we discuss a data breach affecting HSBC’s US customers, a XSS vulnerability in Evernote and a critical RCE vulnerability in Apache Struts. Hello and welcome to a the IT Governance podcast for Friday, 9 November. Here are this week’s stories. HSBC’s US division has reported that it suffered a data breach last month, in which customer accounts were accessed by “unauthorized users”.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Greg Hunt refuses to give My Health Record update as MPs push to extend opt-out period

The Guardian Data Protection

Reports of lengthy phone waits and hotline systems crash suggest many people opting out in final weeks The health minister, Greg Hunt, and the Australian Digital Health Agency have refused to give an update on how many Australians have opted out of the My Health Record system. All Australians who have not opted out by 15 November will have a My Health Record automatically created in their name, sparking fears from privacy experts that the public has not had sufficient time to opt out as demand i

Privacy 67
article thumbnail

Banking Malware Takes Aim at Brazilians

Dark Reading

Two malware distribution campaigns are sending banking Trojans to customers of financial institutions in Brazil.

82
article thumbnail

Pentagon Draws Back the Veil on APT Malware with Sudden Embrace of VirusTotal

Threatpost

Two samples have already been added to the malware zoo, indicating a new openness from the federal government when it comes to cyber.

article thumbnail

Connect Enterprise information with OpenText AppWorks Release 16 EP5 – and gain speed and agility

OpenText Information Management

Every organization is evaluating its business processes to meet today’s relentless demands for constant innovation and delivering engaging user experiences. One main challenge is that valuable information typically resides in disparate systems and applications across the organization, creating silos and process inefficiencies. These systems were never built to keep up with current requirements for: A … The post Connect Enterprise information with OpenText AppWorks Release 16 EP5 – and gain

IT 61
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft President: Governments Must Cooperate on Cybersecurity

Dark Reading

Microsoft's Brad Smith calls on nations and businesses to work toward "digital peace" and acknowledge the effects of cybercrime.

article thumbnail

DJI Patches Forum Bug That Allowed Drone Account Takeovers

Threatpost

Bug opened door for malicious link attack, giving hacker access to stored DJI drone data of commercial and consumer customers.

Access 73
article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

Consumer privacy rights in California are well established. The California Constitution expressly grants California citizens a right to privacy. And existing California law provides for the confidentiality of personal information in various contexts, including under the Online Privacy Protection Act, the Privacy Rights for California Minors in the Digital World Act, and Shine the Light.

Privacy 58
article thumbnail

OpenText Business Network Release 16 EP5 soars to new heights

OpenText Information Management

Your business network is complex – it’s an extensive ecosystem that extends beyond your four walls to business partners, suppliers, customers, banks and more. Mastering the art of business-to-business (B2B) process excellence can be challenging, but with the right digital platform that ensures optimal operations and speed to revenue, your digital business ecosystem becomes your … The post OpenText Business Network Release 16 EP5 soars to new heights appeared first on OpenText Blogs.

B2B 58
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Apple Modernizes Its Hardware Security with T2

Threatpost

Apple has widened the range of Macs running its T2 security chip. Is macOS finally catching up with other platforms when it comes to secure computing?

IT 61
article thumbnail

Top 10 takeaways from JNUC 2018

Jamf

Re-live your favorite 2018 Jamf Nation User Conference (JNUC) moments or get caught up on any of the action you may have missed.

61
article thumbnail

How automation will change the way data pros compete for top jobs

Information Management Resources

Data pros say aren’t worried about automation jeopardizing their job security. But what many do worry about is how automation technologies will change the nature of competition for top tech roles.