Fri.Jun 14, 2019

article thumbnail

Instagram Shows Kids' Contact Details in Plain Sight

Data Breach Today

Sharing Email Address, Phone Numbers May Be Risky, Experts Say Tens of thousands of minors on Instagram expose their email addresses and phone numbers, which child-safety and privacy experts say is worrisome. The kids have turned their profiles from personal ones to business ones, which Instagram mandates must have contact details. But is that appropriate for a child?

Privacy 268
article thumbnail

Digital Transformation Examples: Three Industries Dominating Digital Transformation

erwin

Digital transformation examples can be found almost anywhere, in almost any industry. Its past successes – and future potential – are well documented, chronicled in the billion-dollar valuations of the frontrunners in the practice. Amazon began as a disruptor to brick-and-mortar bookstores, eventually becoming one of the most obvious digital transformation examples as it went on to revolutionize online shopping.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 Highlights: Infosecurity Europe 2019 Keynotes

Data Breach Today

Maersk on NotPetya Cleanup, Troy Hunt on Kid-Perpetrated Data Breaches, and More Data breaches, incident response and complying with the burgeoning number of regulations that have an information security impact were among the top themes at this year's Infosecurity Europe conference in London. Here are 10 of the top takeaways from the conference's keynote sessions.

Cleanup 215
article thumbnail

Better Cybersecurity Research Requires More Data Sharing

Dark Reading

Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to information on breaches, attacks, and incidents.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Analysis: The Cybersecurity Risks Major Corporations Face

Data Breach Today

The latest edition of the ISMG Security Report features a deep dive into an analysis of the cybersecurity risks that publicly traded companies face. Plus: Was the band Radiohead hacked? And what's unusual about the proposed Premera Blue Cross breach lawsuit settlement?

Risk 174

More Trending

article thumbnail

Assange Extradition Hearing Won't Occur Until February

Data Breach Today

U.S. Wants WikiLeaks Founder Extradited for Espionage Trial A British judge has determined that an extradition hearing for WikiLeaks founder Julian Assange won't be held until next February. The U.S. is asking for the extradition so Assange can face espionage charges.

168
168
article thumbnail

Millions of Linux Servers Under Worm Attack Via Exim Flaw

Threatpost

Attackers are exploiting a Linux Exim critical flaw to execute remote commands, download crypto miners and sniff out other vulnerable servers.

article thumbnail

Alerts: Some BD Infusion Pumps Vulnerable to Remote Attacks

Data Breach Today

Flaws Are a Reminder of Common Legacy Medical Device Security Risks Medical device vendor Becton Dickinson and U.S. federal regulators have issued security alerts about vulnerabilities that potentially put certain infusion pump products from the manufacturer at risk for remote hacker attacks.

article thumbnail

The Highly Dangerous 'Triton' Hackers Have Probed the US Grid

WIRED Threat Level

The same hackers behind a potentially lethal 2017 oil refinery cyberattack are now sniffing at US electrical utility targets.

Security 104
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How Organizations Can Reduce Their Data Risk Footprint

Data Breach Today

Ilker Taskaya of Delphix on Reducing Risk in Non-Production Environments Data in non-production environments represents a significant percentage of total enterprise data volume. Non-production environments also carry more risk than production environments because there are more direct users, says Ilker Taskaya of Delphix, who discusses how organizations can reduce that risk.

Risk 142
article thumbnail

Financial Fraud Drives Multi-Factor Authentication Market

Rippleshot

Fighting the rise of payment fraud and cyber attacks has also fueled the growth of the fraud prevention, detection and risk mitigation markets. Among those trends is the multi-factor authentication market that continues to see new investments as financial fraud rises. A new report from Adroit Market Research indicates that by 2025, the multi-factor market will be worth roughly $20.41 billion — a growth of roughly 24% over the next six years.

article thumbnail

Xenotime threat actor now is targeting Electric Utilities in US and APAC

Security Affairs

Experts at Dragos firm reported that Xenotime threat actor behind the 2017 Trisis/Triton malware attack is targeting electric utilities in the US and APAC. Xenotime threat actor is considered responsible for the 2017 Trisis/ Triton malware attack that hit oil and gas organizations. In December 2017, the Triton malware (aka Trisis) was discovered by researchers at FireEye, it was specifically designed to target industrial control systems (ICS) system.

article thumbnail

Cellebrite Now Says It Can Unlock Any iPhone for Cops

WIRED Threat Level

In a strangely public product announcement, the phone-cracking firm revealed a powerful new device.

IT 109
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Mozilla addressed flaws in Thunderbird that allow code execution

Security Affairs

Mozilla released security updates for the Thunderbird email client that address vulnerabilities that could allow code execution on impacted systems. . Mozilla released security updates for the Thunderbird email client that address vulnerabilities that could be exploited by attackers to execute arbitrary code on impacted systems. . Mozilla released Thunderbird version 60.7.1 that addresses three High severity vulnerabilities and one Low risk issue. .

Risk 81
article thumbnail

Ransomware: A Persistent Scourge Requiring Corporate Action Now

Threatpost

ASCO is the latest headline-making organization to be hit by ransomware, prompting many companies to consider what to do to minimize their risk.

article thumbnail

Dissecting NanoCore Crimeware Attack Chain

Security Affairs

The Cybaze-Yoroi ZLab analyzed a new sample of Nanocore Remote Administrator Tools (RAT) using a Delphi wrapper to protect its code. Introduction. Historically, cyber-criminals adopted one or more layers of encryption and obfuscation to lower their footprint and avoid detection. The usage of cryptors and packers has become a commodity in the contemporary malware landscape, providing the so-called “FUD” (Fully UnDetectable) capabilities to malicious code and allowing the outsourcing of the payloa

article thumbnail

Triton Attackers Seen Scanning US Power Grid Networks

Dark Reading

The development follows speculation and concern among security experts that the attack group would expand its scope to the power grid.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Video Surveillance by Computer

Schneier on Security

The ACLU's Jay Stanley has just published a fantastic report: " The Dawn of Robot Surveillance " (blog post here ) Basically, it lays out a future of ubiquitous video cameras watched by increasingly sophisticated video analytics software, and discusses the potential harms to society. I'm not going to excerpt a piece, because you really need to read the whole thing.

article thumbnail

Thank you, Caldwell County

The Texas Record

Caldwell County Courthouse. This week my colleague Andrew Glass and I headed out to Lockhart, TX and taught a 2-day class for employees of several Caldwell County offices. We enjoyed being able to provide face-to-face instruction and consulting for the attendees, and based on their competitive round of Jeopardy at the end of day 2, we think they enjoyed our company as well. :).

IT 72
article thumbnail

Weekly Update 143

Troy Hunt

Well this was a big one. The simple stuff first - I'm back in Norway running workshops and getting ready for my absolute favourite event of the year, NDC Oslo. I'm also talking about Scott's Hack Yourself First UK Tour where he'll be hitting up Manchester, London and Glasgow with public workshops. Tickets are still available at those and it'll be your last chance for a long time to do that event in the UK.

Sales 72
article thumbnail

How Ireland became Europe’s data protection watchdog

IT Governance

When the GDPR (General Data Protection Regulation) took effect a year ago, it promised to overhaul the EU’s data protection landscape. Things have moved a little slower than expected for most member states, but that’s not been the case in Ireland. The country’s DPC (Data Protection Commission) flew out of the tracks, dealing with more than 1,000 GDPR queries and logging 60 data breaches in the first three weeks of the Regulation’s enforcement.

GDPR 71
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

French authorities released the PyLocky decryptor for versions 1 and 2

Security Affairs

Good news for the victims of the pyLocky Ransomware versions 1 and 2, French authorities have released the pyLocky decryptor to decrypt the files for free. French authorities have released a decryptor for pyLocky Ransomware versions 1 and 2. The decryptor allows victims to decrypt their files for free. It was developed in collaboration between French law enforcement, the French Homeland Security Information Technology, and Systems Service, along with independent and volunteer researchers. “

article thumbnail

Amazon Alexa Secretly Records Children, Lawsuits Allege

Threatpost

Two lawsuits are seeking class-action status, alleging that Amazon records children and stores their voiceprints indefinitely.

Cloud 81
article thumbnail

Yubico is replacing for free YubiKey FIPS devices due to security weakness

Security Affairs

Yubico is replacing YubiKey FIPS security keys due to a serious flaw that makes cryptographic operations easier to crack under specific conditions. Yubico is replacing YubiKey FIPS security keys due to a serious issue that flaw that makes it easier to crack RSA keys and ECDSA signatures generated on these devices. The security advisory published by the company states that the issue impacts YubiKey series devices running versions 4.4.2 and 4.4.4 of the firmware.

article thumbnail

Hackers Favor Weekdays for Attacks, Share Resources Often

Threatpost

Traffic analysis sheds light on weekday habits of attackers such as the most likely day for attacks and how malicious infrastructure is shared.

71
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Race fans change the tires on Simon Pagenaud’s IndyCar with this augmented reality experience

DXC Technology

What is an IndyCar pit stop really like? Mayhem? Organized chaos? Or maybe the moment just hums along like a well-oiled machine? This weekend, DXC offered DXC Technology 600 guests at Texas Motor Speedway a chance to find out by recreating an actual IndyCar pit stop training experience through augmented reality technology and Microsoft’s HoloLens […].

article thumbnail

ThreatList: Ransomware Trojans Picking Up Steam in 2019

Threatpost

Attackers continue to push the boundaries with modular trojans and ransomware attacks, a new report found.

article thumbnail

Belgian DPA Launches Public Consultation on Direct Marketing

Hunton Privacy

On June 12, 2019, the Belgian Data Protection Authority (the “Belgian DPA”) launched a public consultation on direct marketing with a view to updating its Recommendation No. 02/2013 of January 30, 2013 on direct marketing (the “Direct Marketing Recommendation” – in French and in Dutch ). The planned Direct Marketing Recommendation update aims at supporting professionals through useful and practical information.