March, 2018

article thumbnail

Ukraine Sentences Two Citizens for DDoS Extortion Campaigns

Data Breach Today

Groundbreaking Prosecution Targeted Attackers Who Demanded Bitcoin Payoffs In a groundbreaking prosecution, two individuals in Ukraine have been sentenced for running extortion campaigns that disrupted international victims' websites with massive DDoS attacks unless they paid bitcoin ransoms of up to $10,000.

192
192
article thumbnail

TLS 1.3 and Proxies

Imperial Violet

I'll generally ignore the internet froth in a given week as much as possible, but when Her Majesty's Government starts repeating misunderstandings about TLS 1.3 it is necessary to write something, if only to have a pointer ready for when people start citing it as evidence. The first misunderstanding in the piece is the claim that it's possible for man-in-the-middle proxies to selectively proxy TLS 1.2 connections, but not TLS 1.3 connections because the latter encrypts certificates.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Color-coded filing systems: Reduce downtime and increase ROI – Part 2

TAB OnRecord

Part 1 of this post showed you how color-coding works and whom it benefits. We also made the business case for color-coding by demonstrating how it leads to more efficient records retrieval, retention and disposition; improved decision-making; less operational down time; fewer lost opportunities; and minimized risk of legal sanctions. In this blog, we focus on how color-coding improves your records privacy and information security, as well as your space management.

article thumbnail

AggregateIQ: the obscure Canadian tech firm and the Brexit data riddle

The Guardian Data Protection

Documents released last week shed more light on the puzzle of the company’s links to Cambridge Analytica ‘Find Christopher Wylie.” That instruction – 13 months ago – came from the very first ex-Cambridge Analytica employee I met. He was unequivocal. Wylie would have answers to the two questions that were troubling me most. He could tell me about Facebook.

Marketing 111
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

A Digital Transformation Lesson: Open Source Business Models

Bill Schmarzo - Dell EMC

The year was 1994 and I had the fortunate opportunity to stumble upon a company – Cygnus Support – that was “selling free software.” I remember telling my mom that I was Vice President of Sales & Marketing of a company that was selling free software. After a very long pause, she replied, “Is your resume up to date?”. Cygnus Support sold support contracts and custom consulting projects for GNU development tools (gcc, g++, gdb) to companies looking to accelerate their time-to-market in the emb

More Trending

article thumbnail

166 Applebee's Restaurants Hit With Payment Card Malware

Data Breach Today

Payment Card Data Stolen by Malware-Wielding Attackers, Franchisee Warns Anyone who dined out at one of 166 Applebee's restaurants in 15 states may have had their payment card details compromised by point-of-sale malware infections that began in November 2017, RMH Franchise Holdings warns.

Sales 189
article thumbnail

5 ways to detect a phishing email

IT Governance

Phishing has been used as a way for criminal hackers to gain sensitive information since the mid-1990s. It uses deceptive emails and websites to trick victims into clicking malicious links, downloading attachments or sending sensitive information. Phishing emails can impersonate well-known brands or even people you know, such as colleagues. The goal is to trick the recipient into believing that the message is important and convince them to click a malicious link/attachment or provide sensitive d

Phishing 111
article thumbnail

How modern RIM professionals are staying relevant – Part 2

TAB OnRecord

In a three-part blog post we are outlining the ways that modern RIM professionals are increasing the value they provide to the organization. In part one of our blost post we discussed how records managers are extending their reach beyond the filing and storage rooms. This allows them to apply their expertise in information architecture, [.] Read More.

article thumbnail

The Brexit whistleblower: ‘Did Vote Leave use me? Was I naive'

The Guardian Data Protection

Shahmir Sanni, a volunteer for Vote Leave, the official pro-Brexit EU referendum campaign, explains how a data company linked to Cambridge Analytica played a crucial role in the result, and voices his concerns that electoral spending rules were manipulated… and evidence apparently destroyed • Brexit insider claims Vote Leave team may have breached spending limits When I first met Shahmir Sanni last August, he was nervy, anxious, uncertain.

IT 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Data Analytics and Human Heuristics: How to Avoid Making Poor Decisions

Bill Schmarzo - Dell EMC

The “hot hand,” a metaphor applied frequently to the game of basketball, is the idea that a basketball shooter, after making several consecutive shots, will experience a higher than normal success rate on his or her ensuing shots. I discussed the “hot hand” concept, and its flaw, at a TDWI (The Data Warehouse Institute) conference many years ago. Figure 1: “The Hot Hand in Basketball” by Thomas Gilovich, Robert Vallone and Amos Tversky.

Analytics 111
article thumbnail

Taking down Gooligan: part 1 — overview

Elie

This series of posts recounts how, in November 2016, we hunted for and took down Gooligan, the infamous Android OAuth stealing botnet. What makes Gooligan special is its weaponization of OAuth tokens, something that was never observed in mainstream crimeware before. At its peak, Gooligan had hijacked over 1M OAuth tokens in an attempt to perform fraudulent Play store installs and reviews.

Libraries 107
article thumbnail

Facebook Faces New Uproar: Call and SMS Metadata

Data Breach Today

Users Surprised By Metadata Collection, But Facebook Says It Always Asked Facebook is facing a new controversy after some users say they've found records of phone calls and text messages in their personal files, but claim they never granted the social networking site permission to collect the data.

Metadata 186
article thumbnail

Hacker Adrian Lamo Has Died at 37

WIRED Threat Level

The Colombian-American hacker became famous in the early 2000s for breaking into the systems at organizations like *The New York Times*, and later for his role in Chelsea Manning's arrest.

Security 106
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How modern RIM professionals are staying relevant – Part 1

TAB OnRecord

Many RIM professionals that we speak with struggle to obtain budget and attention within the organization. Why? One of the reasons is that RIM has traditionally been seen as a cost center: an expense to be minimized, rather than a value-add or investment. When this mindset prevails among top executives, RIM professionals can struggle to [.] Read More.

article thumbnail

Facebook: is it time we all deleted our accounts?

The Guardian Data Protection

The Cambridge Analytica revelations may be the final nudge we need to turn away from the social network. And it’s only the tip of the iceberg when it comes to big tech harvesting private information Sorry to break it to you, but you are probably a “dumb f**k”. This is according to statements by a young Mark Zuckerberg anyway. Back in 2004, when a 19-year-old Zuckerberg had just started building Facebook, he sent his Harvard friends a series of instant messages in which he marvelled at the fact t

IT 112
article thumbnail

Is 2018 the Tipping Point in Digital Transformation?

Bill Schmarzo - Dell EMC

“Survival, in the cool economics of biology, means simply the persistence of one’s own genes in the generations to follow.” — Lewis Thomas. A recent article in The Economist titled “ The Year of the Incumbent ” postulates that 2018 is the year that the incumbents “get back into the game” by stealing the momentum from technology startups to reclaim their spots atop the market valuation charts.

article thumbnail

The cost of a cyber attack

IT Governance

With the risk of a cyber attack now being classed as the top threat to organisations , it’s vital to have the right cyber security measures in place to protect your organisation from an attack. It’s not just an organisation’s reputation that can be damaged by a data breach – the financial costs can often have a more severe effect. Lloyd’s of London has estimated the global cost of a serious cyber attack to be more than $120 billion (£92 billion).

Risk 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Leak of 23,000 Private Keys Triggers Security Scramble

Data Breach Today

Digital Certificate Revocation Blame Game: Trustico Swaps Blows With DigiCert Digital certificate vendor Trustico is sparring with DigiCert, which recently took over Symantec's digital certificate business, following a serious security incident. The private keys for at least 23,000 Trustico digital certificates have been compromised, prompting a scramble to protect affected websites.

Security 183
article thumbnail

Inside Fort Gordon: Where Next-Gen Cyber Troops Are Trained

WIRED Threat Level

What's happening at the US Army's new cyber branch headquarters marks a change for Fort Gordon. Hell, it might be changing warfare itself—all through a computer screen.

IT 108
article thumbnail

Celebrating Db2’s 25 years of awesome

IBM Big Data Hub

March 16, 2018 is the 25th anniversary of the Db2 relational database product on Linux UNIX and Windows. Over the past 25 years, this team has built the Db2 brand for the distributed product, complementing IBM’s Db2 mainframe offering and creating a market force.

Marketing 100
article thumbnail

'Utterly horrifying': ex-Facebook insider says covert data harvesting was routine

The Guardian Data Protection

Sandy Parakilas says numerous companies deployed these techniques – likely affecting hundreds of millions of users – and that Facebook looked the other way Hundreds of millions of Facebook users are likely to have had their private information harvested by companies that exploited the same terms as the firm that collected data and passed it on to Cambridge Analytica, according to a new whistleblower.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Is All Encryption Equal?

Thales Cloud Protection & Licensing

Data encryption has been around almost since the age of computers. In truth, anyone with minimal experience can write a simple script that uses default services built into virtually every OS to encrypt data. In Linux, for instance, it takes four openSSL commands to generate an encryption key and encrypt data. However, simply encrypting data is not a sufficient control when storing data in the cloud.

article thumbnail

Taking down Gooligan: part 1 — overview

Elie

This series of posts recounts how, in November 2016, we hunted for and took down Gooligan, the infamous Android OAuth stealing botnet. What makes Gooligan special is its weaponization of OAuth tokens, something that was never observed in mainstream crimeware before. At its peak, Gooligan had hijacked over 1M OAuth tokens in an attempt to perform fraudulent Play store installs and reviews.

article thumbnail

Expedia's Orbitz Suspects 880,000 Payment Cards Stolen

Data Breach Today

Hacker May Have Also Obtained Other Customer Data in Breach, Orbitz Warns Expedia's Orbitz travel fare search engine says it may have suffered a breach that resulted in 880,000 payment cards being compromised, along with other customer data, over a two-year period. Orbitz says the apparent breach involved a legacy system no longer connected to its site.

IT 182
article thumbnail

YouTube Will Link Directly to Wikipedia to Fight Conspiracy Theories

WIRED Threat Level

After a series of scandals related to misinformation, YouTube CEO Susan Wojcicki announced the company would begin directing users to sources like Wikipedia.

Security 110
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

List of data breaches and cyber attacks in March 2018

IT Governance

Healthcare breaches are common in our monthly lists – but the number of incidents this month is insane. Take a look at the list, and you’ll quickly notice that the majority of them are healthcare related. There’s a mixture of incidents in there, from a rogue employee to someone accidentally sending information to the wrong fax number. Yes, I said fax….

article thumbnail

No one can pretend Facebook is just harmless fun anymore | Ellie Mae O’Hagan

The Guardian Data Protection

From its stance on extremist content, to its vast caches of user data, Facebook is a corporation whose power must, finally, be reined in The revelation that Cambridge Analytica exploited the data of 50 million Facebook profiles to target American voters is indeed frightening. But Cambridge Analytica shouldn’t act as a diversion from the real bad guy in this story: Facebook.

article thumbnail

Why Enterprises Should Control Their Encryption Keys

Thales Cloud Protection & Licensing

Cloud providers have done a good job of integrating default encryption services within their core infrastructure. However, as discussed in previous blogs , the encryption service is only as secure as the keys that are used to encrypt the data. Enterprises cannot ignore the responsibility of implementing a strong key assurance service that ensures they maintain control of their own risks.