Mon.Apr 29, 2019

article thumbnail

2 Million IoT Devices Have P2P Software Flaw: Researcher

Data Breach Today

Vulnerabilities Found in Security Cameras, Baby Monitors and More An independent security researcher is warning about a vulnerability in peer-to-peer software used in millions of IoT devices that could allow a hacker to eavesdrop on conversations or turn these items into a botnet.

IoT 237
article thumbnail

NEW TECH: How Semperis came to close a huge gap in Active Directory disaster preparedness

The Last Watchdog

In today’s complex IT environments, a million things can go wrong, though only a few systems touch everything. Related: Why Active Directory is so heavily targeted For companies running Microsoft Windows, one such touch-all systems is Active Directory, or AD, the software that organizes and provides access to information across the breadth of Windows systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Docker Hub Breach: It's Not the Numbers; It's the Reach

Data Breach Today

Potential Leak of GitHub, Bitbucket Tokens As Well Docker, which offers an open source container platform, is notifying users that an intruder briefly had access to sensitive data from 190,000 Docker Hub accounts, or less than 5 percent of Hub users. But the breach has caused a collective gasp because it potentially magnifies risks for enterprises.

IT 208
article thumbnail

Thanks AIIM—This Isn’t Goodbye

AIIM

Some of you may know that, when I was a kid, my dad was my high school principal and my mom was our high school drama teacher. Basically, it meant that NO ONE asked me out on a date. But it also meant that I had a unique front row seat for observing my parents in their ‘natural environments’. I knew they taught, I knew they loved what they did, and I knew they were really, really good at what they did because all the kids and teachers loved them.

ECM 145
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Huawei's Role in 5G Networks: A Matter of Trust

Data Breach Today

UK Government May Allow Chinese Manufacturer to Supply 'Noncore' Infrastructure As governments around the world continue plans to build out their nations' 5G networks, worries persist about whether Chinese manufacturers can be trusted. But the British government apparently is ready to allow Huawei to supply "noncore" parts of its network, and the Netherlands may be ready to follow suit.

More Trending

article thumbnail

HHS Lowers Some HIPAA Fines

Data Breach Today

Experts Weigh In on Potential Impact of the Changes The Department of Health and Human Services is lowering its top fines for less egregious HIPAA violations. Meanwhile, it's pledging to make a "big push" to enforce patients' right to access their health records. What's the potential impact?

Access 166
article thumbnail

Amnesty International Hong Kong Office hit by state-sponsored attack

Security Affairs

The Hong Kong office of Amnesty International has been hit by a long-running cyberattack carried out by China-linked hackers. Amnesty International’s Hong Kong office has been hit with a cyberattack launched by China-linked hackers. “This sophisticated cyber-attack underscores the dangers posed by state-sponsored hacking and the need to be ever vigilant to the risk of such attacks.

article thumbnail

Industry Guide to Public Sector: What’s driving digital transformation in government?

OpenText Information Management

Technology is rapidly changing how public sector organizations work and serve citizens. Those governments that make strategic decisions to embrace these technologies will discover real benefits in terms of efficiencies, productivity and citizen-engagement, better and smarter ways of working for employees and new abilities to do more with less. At OpenText™ Enterprise World 2019 in … The post Industry Guide to Public Sector: What’s driving digital transformation in government?

article thumbnail

Report: Unknown Data Breach Exposes 80 Million US Households

Security Affairs

vpnMentor ’s research team discovered a hack affecting 80 million US households, and the incident is still actively leaking data. Known hacktivists Noam Rotem and Ran Locar discovered an unprotected database impacting up to 65% of US households. Hosted by a Microsoft cloud server, the 24 GB database includes the number of people living in each household with their full names, their marital status, income bracket, age, and more.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Stealing Ethereum by Guessing Weak Private Keys

Schneier on Security

Someone is stealing millions of dollars worth of Ethereum by guessing users' private keys. Normally this should be impossible, but lots of keys seem to be very weak. Researchers are unsure how those weak keys are being generated and used. Their paper is here.

Paper 86
article thumbnail

New Emotet variant uses connected devices as proxy C2 servers

Security Affairs

Researchers at Trend Micro have uncovered a malware campaign distributing a new Emotet Trojan variant that compromises devices and uses them as Proxy C2 servers. Trend Micro discovered a new variant of the Emotet Trojan that is able to infect devices and use them as proxy command-and-control servers. The new variant also employs random URI directory paths to evade network-based detection rules. “Recently, an analysis of Emotet traffic has revealed that new samples use a different POST-infe

IoT 87
article thumbnail

2 Million IoT Devices Vulnerable to Complete Takeover

Threatpost

Millions of security cameras, baby monitors and "smart" doorbells are open to hijack - and no solution is currently available.

IoT 94
article thumbnail

Docker Forces Password Reset for 190,000 Accounts After Breach

Dark Reading

Organizations impacted by breach, which gave attackers illegal access to a database containing sensitive account information, need to check their container images.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

SEC FinHub’s Digital Asset Framework: A Guide for Issuers and Secondary Trading Markets

Data Matters

On April 3, the U.S. Securities and Exchange Commission (SEC)’s Strategic Hub for Innovation and Financial Technology (FinHub or Staff) released its much-anticipated guidance, the Framework for “Investment Contract” Analysis of Digital Assets (Framework), regarding its views on factors to consider in applying the Howey test to digital assets. In conjunction with the Framework, the SEC’s Division of Corporation Finance published its first no-action letter in connection with the sale of digi

article thumbnail

Peer-to-Peer Vulnerability Exposes Millions of IoT Devices

Dark Reading

A flaw in the software used to remotely access cameras and monitoring devices could allow hackers to easily take control of millions of pieces of the IoT.

IoT 83
article thumbnail

Did you know? AMC Monthly Newsletter

Micro Focus

In the know Spring is a time for new beginnings – and that could mean beginning the journey to digital transformation. With so many opinions out there, it’s good to hear some expert opinion. Que Mangus rounds up the recent observations from Gartner, IDC and others on modernization. View it here. If analyst insight is your thing, then. View Article.

article thumbnail

My sexual assault case was dropped when I refused to give police my phone | Anonymous

The Guardian Data Protection

Victims of rape and assault shouldn’t have to choose between privacy and justice. That’s why I’m suing the government A few years ago I was violently sexually assaulted by a “friend” on a night out. It was a sustained and sadistic attack that in no way began with consent. I made the incredibly difficult decision to report it to the police because I needed to take power back.

Privacy 75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Battle of Winterfell: A Tactical Analysis

WIRED Threat Level

If you're going up against an army of the undead, maybe plan a little better.

Security 112
article thumbnail

Credit Card Compromise Up 212% as Hackers Eye Financial Sector

Dark Reading

Financial services firms saw upticks in credential leaks and credit card compromise as cybercriminals go where the money is.

article thumbnail

Facebook funds research on the impact of social media on elections

Security Affairs

Facebook is going to fund academic research on the impact of social media on elections, aimed at preventing manipulation of these platforms. Facebook is committed to preventing manipulation of elections through social media by funding research on the impact of social media on elections. Facebook announced the involvement of 60 researchers from 30 academic institutions across 11 countries that were selected by the Social Science Research Council and the independent group Social Science One.

Privacy 72
article thumbnail

Asking rape victims to hand over mobile phones is a further trial | Suzanne Moore

The Guardian Data Protection

Putting women who have been sexually assaulted through another kind of scrutiny is hard to stomach when rape continues to carry few consequences for the rapist Rape is a crime of opportunism. The chances of a man being prosecuted and found guilty of rape are low. Despite more women speaking out, despite the #MeToo movement and chat about consent, the grim reality is that the justice system is failing women.

Access 72
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

United Airlines covers up seat cameras to respond to privacy concerns

Security Affairs

United Airlines opted to cover every camera in entertainment systems embedded within the back of plane seats in response to privacy concerns. Flying on United Airlines planes it is possible to find cameras included in screen and entertainment products used by the airline and mounted in the back of the seats. “A viral photo showing a camera in a Singapore Airlines in-flight TV display recently caused an uproar online.” reported BuzzFeed. “The image was retweeted hundreds of t

Privacy 71
article thumbnail

The two most common questions companies ask about AI

DXC Technology

Artificial Intelligence (AI) and Machine Learning (ML) are rapidly evolving to help companies with both digital transformation and innovation. There has been a lot of hype and discussion about these topics but, in a very short time, the conversation has moved from “AI is cool” to “AI can drive specific business outcomes”. The technology has continually […].

article thumbnail

ElectrumDoSMiner botnet reached 152,000 hosts

Security Affairs

Researchers at Malwarebytes are monitoring the evolution of the ElectrumDoSMiner DDoS botnet that reached 152,000 infected hosts. MalwareBytes researchers are closely monitoring attacks against users of the popular Electrum Bitcoin wallet, in particular, the evolution of the Electrum DDoS botnet. In mid-April, experts at MalwareBytes published a report warning of cyber attacks against users of the popular Electrum Bitcoin wallet.

IT 70
article thumbnail

Malware Infests Popular Pirate Streaming Hardware

Threatpost

Hardware that supports pirated video streaming content comes packed with malware.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Report: Nearly half of U.S.-based Employees Unfamiliar with California Consumer Privacy Act (CCPA)

KnowBe4

With the impacts and repercussions of the looming California Consumer Privacy Act (CCPA) on the minds of many privacy professionals, new research from MediaPRO shows more work is needed to train U.S. employees of this first-of-its-kind privacy regulation. MediaPRO’s 2019 Eye on Privacy Report reveals 46% of U.S. employees have never heard of the CCPA , which sets specific requirements for the management of consumer data for companies handling the personal data of California residents.

Privacy 65
article thumbnail

7 Types of Experiences Every Security Pro Should Have

Dark Reading

As the saying goes, experience is the best teacher. It'll also make you a better and more well-rounded security pro.

article thumbnail

COBOL – The World Tour Continues

Micro Focus

This isn’t the first time we’ve reported on #DevDay – and we make no apology there. When it comes to technical insight and customer feedback, it is a favorite soundtrack for the global COBOL community. So what might happen at a fresh venue? We got to find out when the tour crew arrived in Minneapolis. View Article.

IT 54