Wed.Nov 14, 2018

article thumbnail

Calif. Man Pleads Guilty in Fatal Swatting Case, Faces 20+ Years in Prison

Krebs on Security

A California man who pleaded guilty Tuesday to causing dozens of swatting attacks — including a deadly incident in Kansas last year — now faces 20 or more years in prison. Tyler Raj Barriss, in an undated selfie. Tyler Barriss , 25, went by the nickname SWAuTistic on Twitter, and reveled in perpetrating “swatting” attacks. These dangerous hoaxes involve making false claims to emergency responders about phony hostage situations or bomb threats, with the intention of prompt

article thumbnail

Nordstrom Blames Breach of Employee Data on Contractor

Data Breach Today

Breach Exposed Social Security Numbers, Birthdates, Salaries, Bank Account Data The department store chain Nordstrom says it doesn't believe that employees' personal and financial data, which was exposed in an October data breach due to a contractor's error, has been misused. The retailer says the breach exposed no customer data.

Retail 186
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Patch Tuesday, November 2018 Edition

Krebs on Security

Microsoft on Tuesday released 16 software updates to fix more than 60 security holes in various flavors of Windows and other Microsoft products. Adobe also has security patches available for Flash Player , Acrobat and Reader users. As per usual, most of the critical flaws — those that can be exploited by malware or miscreants without any help from users — reside in Microsoft’s Web browsers Edge and Internet Explorer.

article thumbnail

Using Unsupervised Machine Learning: The Challenges

Data Breach Today

While unsupervised machine learning techniques get away from the data labeling and classification that most supervised systems require, they are dependent on the quality and variety of the data provided, says Gartner's Jonathan Care.

135
135
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The GDPR: Everything you need to know about data controllers and data processors

IT Governance

Data controllers and data processors are an integral part of the GDPR. This article explains what those roles involve and helps you understand if you are a controller, processor or both. The terms ‘data controller’ and ‘data processor’ have been around for years, but it’s only since the EU GDPR (General Data Protection Regulation) took effect that they’ve been scrutinised.

GDPR 107

More Trending

article thumbnail

The Emergence of the Elusive Digital Unicorn — How Digital Disruption is breeding new roles within the project and business landscape, are you ready for it?

AIIM

Disruptive Technologies are changing existing landscapes. Technology has had a profound impact on the business world. Simply walk into any business, no matter the size, and you will see the prolific adoption of technology. Digital project boards, virtual teams scattered across the globe; are all indicators of business reliance on this “fourth industrial revolution.

article thumbnail

Shopping safely over Black Friday and Cyber Monday

IT Governance

Black Friday and Cyber Monday are almost upon us, kickstarting what retailers hope will be a successful trading period. However, the flurry of purchases and the data that represents means cyber criminals will also be looking to cash in. Although the UK was slow to adopt Black Friday (which falls on 23 November this year) and Cyber Monday (26 November), the country is now fully on board with the fantastic savings and unbeatable offers it promises.

Retail 94
article thumbnail

The Emergence of the Elusive Digital Unicorn — How Digital Disruption is breeding new roles within the project and business landscape, are you ready for it?

AIIM

Disruptive Technologies are changing existing landscapes. Technology has had a profound impact on the business world. Simply walk into any business, no matter the size, and you will see the prolific adoption of technology. Digital project boards, virtual teams scattered across the globe; are all indicators of business reliance on this “fourth industrial revolution.

article thumbnail

Understanding Evil Twin AP Attacks and How to Prevent Them

Dark Reading

The attack surface remains largely unprotected from Wi-Fi threats that can result in stolen credentials and sensitive information as well as backdoor/malware payload drops.

92
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

According to statistica the number of Internet of Things (IoT) devices connected will rise to 23 billion this year. From industrial machinery and intelligent transportation to health monitoring and emergency notification systems, a broad range of IoT devices are already being deployed by enterprises. And each of these devices requires network connectivity so it can collect and transfer data.

IoT 85
article thumbnail

Cyber espionage group used CVE-2018-8589 Windows Zero-Day in Middle East Attacks

Security Affairs

Kaspersky revealed that the CVE-2018-8589 Windows 0-day fixed by Microsoft Nov. 2018 Patch Tuesday has been exploited by at least one APT group in attacks in the Middle East. Kaspersky Lab experts revealed that the CVE-2018-8589 Windows zero-day vulnerability addressed by Microsoft November 2018 Patch Tuesday has been exploited by an APT group in targeted attacks against entities in the Middle East.

article thumbnail

CIPL Publishes Legal Note on the ePrivacy Regulation and the EU Charter of Fundamental Rights

Hunton Privacy

On November 12, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published a legal note on the ePrivacy Regulation and the EU Charter of Fundamental Rights. It was written for CIPL by Dr. Maja Brkan, assistant professor of EU law at Maastricht University, David Dumont, Counsel at Hunton Andrews Kurth, and Dr. Hielke Hijmans, CIPL’s Senior Policy Advisor. .

article thumbnail

Pwn2Own Tokyo 2018 – iPhone X exploits paid over $100,000

Security Affairs

The Zero Day Initiative’s Pwn2Own Tokyo 2018 is a success, participants earned over $300,000 for disclosing flaws affecting iPhone X, Xiaomi Mi 6 and Samsung Galaxy S9 smartphones. During the first day of the Pwn2Own Tokyo 2018 contest, participants hacked Apple iPhone X, Samsung Galaxy S9 and Xiaomi Mi 6 devices earning more than $225,000. The novelty for this Pwn2Own edition was the creation of a specific session for IoT devices.

IoT 82
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Mozilla's 'Privacy Not Included' Gift Report Highlights Security Concerns

WIRED Threat Level

In its second annual “Privacy Not Included” guide, the nonprofit highlights internet-connected gifts that value your privacy—and the ones that may not.

Privacy 86
article thumbnail

Boffins discovered seven new Meltdown and Spectre attacks

Security Affairs

Researchers who devised the original Meltdown and Spectre attacks disclosed seven new variants that leverage on a technique known as transient execution. In January, white hackers from Google Project Zero disclosed the vulnerabilities that potentially impact all major CPUs, including the ones manufactured by AMD, ARM, and Intel. The expert devised two attacks dubbed Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 and CVE-2017-5715) , which could be conducted to sensitive data processed

Paper 81
article thumbnail

DARPA's Hail Mary Plan to Restart a Hacked US Electric Grid

WIRED Threat Level

On tiny Plum Island, DARPA stages a real-life blackout to put its grid recovery tools to the test.

IT 101
article thumbnail

More Spectre/Meltdown-Like Attacks

Schneier on Security

Back in January, we learned about a class of vulnerabilities against microprocessors that leverages various performance and efficiency shortcuts for attack. I wrote that the first two attacks would be just the start: It shouldn't be surprising that microprocessor designers have been building insecure hardware for 20 years. What's surprising is that it took 20 years to discover it.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Small-Time Cybercriminals Landing Steady Low Blows

Dark Reading

High-end crime groups are acquiring the sorts of sophisticated capabilities only nation-states once had, while low-tier criminals maintain a steady stream of malicious activity, from cryptomining to PoS malware.

67
article thumbnail

The Mueller Investigation May Be Safe Despite Matt Whitaker

WIRED Threat Level

Robert Mueller's work as special counsel may seem imperiled by the acting attorney general, but there's plenty of reason for optimism.

article thumbnail

Airlines Have a Big Problem with Bad Bots

Dark Reading

Bad bots account for 43.9% of all traffic on their websites, APIs, and mobile apps, according to a new analysis of 100 airlines.

78
article thumbnail

Making complex processes simple and efficient with OpenText OT2

OpenText Information Management

Professionals who have spent a career in the life sciences field can recognize immediately a new idea that will dramatically improve life as they know it for their customers and colleagues. That’s why the OpenText™ Documentum™ for Life Sciences team is so enthusiastic about OpenText™ Quality, which has its first release this month with availability … The post Making complex processes simple and efficient with OpenText OT2 appeared first on OpenText Blogs.

IT 59
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Black Hat: European Security Pros Wrestling With Potential Breaches, Privacy Issues

Dark Reading

Black Hat Europe attendee survey shows European cybersecurity leaders are uncertain of their ability to protect end user data - and are fearful of a near-term breach of critical infrastructure.

Privacy 62
article thumbnail

Overcoming the top obstacles to digital transformations

Information Management Resources

A growing number of organizations are increasing their investments in big data, ERP and IoT technologies, but are encountering obstacles to those efforts that do not involve technology readiness.

article thumbnail

Cryptojacking, Mobile Malware Growing Threats to the Enterprise

Dark Reading

At the same time, criminal organizations continue to look for new ways to attack their victims.

85
article thumbnail

Oracle and "Responsible Disclosure"

Schneier on Security

I've been writing about "responsible disclosure" for over a decade; here's an essay from 2007. Basically, it's a tacit agreement between researchers and software vendors. Researchers agree to withhold their work until software companies fix the vulnerabilities, and software vendors agree not to harass researchers and fix the vulnerabilities quickly.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Release 16 EP5 gives Magellan more text mining power and better user experience

OpenText Information Management

Analytics are no longer just a matter of “crunching the numbers” in a database or spreadsheet. In fact, by some estimates nearly 80% of all enterprise information is unstructured data, such as documents, web content, or social media. But ordinary analytics techniques have trouble extracting meaning from the complexity and nuances of human language. That’s … The post Release 16 EP5 gives Magellan more text mining power and better user experience appeared first on OpenText Blogs.

Mining 52
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I'm speaking at Kiwicon in Wellington, New Zealand on November 16, 2018. I'm appearing on IBM Resilient's End of Year Review webinar on "The Top Cyber Security Trends in 2018 and Predictions for the Year Ahead," December 6, 2018 at 12:00 PM EST. I'm giving a talk on " Securing a World of Physically Capable Computers " at MIT on December 6, 2018.

article thumbnail

To Click or Not to Click: The Answer Is Easy

Dark Reading

Mega hacks like the Facebook breach provide endless ammo for spearphishers. These six tips can help you stay safer.

67