Sat.Aug 04, 2018 - Fri.Aug 10, 2018

article thumbnail

Machine Learning Can Identify the Authors of Anonymous Code

WIRED Threat Level

Researchers have repeatedly shown that writing samples, even those in artificial languages, contain a unique fingerprint that's hard to hide.

article thumbnail

DevSecOps: The Keys to Success

Data Breach Today

Experts Offer Insights on Addressing the Challenges Although there's widespread agreement that addressing security early in the software development cycle is an essential component to any breach prevention strategy, implementing DevSecOps can prove challenging.

Security 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DeepLocker – AI-powered malware are already among us

Security Affairs

Security researchers at IBM Research developed a “highly targeted and evasive” AI-powered malware dubbed DeepLocker and will present today. What about Artificial Intelligence (AI) applied in malware development? Threat actors can use AI-powered malware to create powerful malicious codes that can evade sophisticated defenses. Security researchers at IBM Research developed a “highly targeted and evasive” attack tool powered by AI,” dubbed DeepLocker that is able to co

article thumbnail

Florida Man Arrested in SIM Swap Conspiracy

Krebs on Security

Police in Florida have arrested a 25-year-old man accused of being part of a multi-state cyber fraud ring that hijacked mobile phone numbers in online attacks that siphoned hundreds of thousands of dollars worth of bitcoin and other cryptocurrencies from victims. On July 18, 2018, Pasco County authorities arrested Ricky Joseph Handschumacher , an employee of the city of Port Richey, Fla, charging him with grand theft and money laundering.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Do you have a data breach response plan?

IT Governance

The EU GDPR (General Data Protection Regulation) requires organisations to respond to serious data breaches within 72 hours of detection. This places a significant burden on organisations: taking the appropriate measures to comply with the law while simultaneously dealing with the collateral impact of a breach is not a picnic! The Ponemon Institute Cost of a Data Breach Study 2018 indicates that one in four organisations will suffer a data breach in the next two years.

More Trending

article thumbnail

GDPR After the Deadline — Part 3 of 3 — How do IIM technologies fit into the GDPR puzzle?

AIIM

The GDPR’s May 25, 2018 deadline set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers. We just published a new market research report on GDPR. The purpose of this survey of 262 executives was to quantify – as close to the May 25th deadline as possible – the following three key issues related to GDPR: How do organizations view the emerging challenges tied to information privacy and securi

GDPR 83
article thumbnail

Measuring the Rationality of Security Decisions

Schneier on Security

Interesting research: " Dancing Pigs or Externalities? Measuring the Rationality of. Security Decisions ": Abstract: Accurately modeling human decision-making in security is critical to thinking about when, why, and how to recommend that users adopt certain secure behaviors. In this work, we conduct behavioral economics experiments to model the rationality of end-user security decision-making in a realistic online experimental system simulating a bank account.

article thumbnail

Do you know the difference between cyber security and information security?

IT Governance

You often see people use the terms ‘ cyber security ’ and ‘ information security ’ interchangeably. That’s because, in their most basic forms, they refer to the same thing: the integrity and confidentiality of information. But there’s a crucial difference, which can be explained simply. Information security. Information is at the heart of any organisation, whether it’s business records, personal data or intellectual property.

article thumbnail

Atlanta's Reported Ransomware Bill: Up to $17 Million

Data Breach Today

City Didn't Pay Ransom, But Spends for Cleanup, New Devices, Better Security The cost of the city of Atlanta's mitigation and subsequent IT overhaul following a massive SamSam ransomware infection in March could reach $17 million, of which $6 million has already been budgeted for new devices, security enhancements as well as upgrades, according to news reports.

Cleanup 182
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

3 ways prescriptive analytics helps deliver better financial services

IBM Big Data Hub

As any financial services executive knows, improving business results with precise, timely decisions is much harder than it looks.

article thumbnail

Millions of Android Devices Are Vulnerable Out of the Box

WIRED Threat Level

Android smartphones from Asus, LG, Essential, and ZTE are the focus of a new analysis about risks from firmware bugs introduced by manufacturers and carriers.

article thumbnail

How to become a certified DPO

IT Governance

The EU GDPR (General Data Protection Regulation) requires certain organisations to appoint a DPO (data protection officer) to help them comply with the Regulation. However, a shortage of DPOs means many organisations are appointing staff to act as DPOs without the proper level of expertise, experience or qualifications. The GDPR stipulates that DPOs should have appropriate experience and qualifications to fulfil the role.

GDPR 74
article thumbnail

The Art of the Steal: FIN7's Highly Effective Phishing

Data Breach Today

Cybercrime Gang Phoned Victims to Increase Phishing Attack Success Rates The FIN7 cybercrime gang regularly phoned victims, posing as buyers, to trick victims into opening phishing emails and attachments with malware, federal prosecutors allege. The group's success - 15 million stolen payment cards and counting - is one measure of how difficult these types of attacks are to block.

Phishing 172
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Spot the Bot: Researchers Open-Source Tools to Hunt Twitter Bots

Dark Reading

Duo security researchers compiled a massive dataset of public Twitter profiles and built a tool to scour profiles and detect the fakes.

article thumbnail

When It Comes to a Data Breach, How Do You Want to Be Notified?

Thales Cloud Protection & Licensing

August is two-thirds of the way through year, and we have already seen a number of serious, far-reaching data breaches making headlines, some occurred in 2018, and some from 2017 that are now being disclosed. This underscores the harsh realities of the state of cybersecurity today. If you have looked at our recently released annual Data Threat Report: Retail Edition , you understand this is not just hyperbole.

article thumbnail

The cost of a payment card data breach

IT Governance

Most people generally understand what happens after a data breach: the crooks use or sell the information to make a quick profit, and organisations must spend money recovering from the incident and paying legal fees and penalties. But that’s only an overview. In this blog, we continue our discussion of the ongoing threat of debit and credit card fraud by looking at the financial effects of payment card breaches – from both cyber criminals’ and organisations’ perspectives.

article thumbnail

WhatsApp: Check Point's Flaw Findings Don't Merit Patches

Data Breach Today

Messages Can Be Manipulated, But Fixes Would Pose Privacy Risks, WhatsApp Says Check Point says it has found three ways to falsify messages in WhatsApp, which it claims could be employed by scammers and used to spread fake news. WhatsApp acknowledges the findings, but it will not engineer patches.

Privacy 157
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

CNIL Serves Formal Notice to Marketing Companies to Obtain User’s Consent for Processing Geolocation Data for Ad Targeting

Hunton Privacy

On July 19, 2018, the French Data Protection Authority (“CNIL”) announced that it served a formal notice to two advertising startups headquartered in France, FIDZUP and TEEMO. Both companies collect personal data from mobile phones via software development kit (“SDK”) tools integrated into the code of their partners’ mobile apps — even when the apps are not in use — and process the data to conduct marketing campaigns on mobile phones.

article thumbnail

A New Pacemaker Hack Puts Malware Directly On the Device

WIRED Threat Level

Researchers at the Black Hat security conference will demonstrate a new pacemaker-hacking technique that can add or withhold shocks at will.

article thumbnail

Butlin’s Hacked – 34,000 customers affected

IT Governance

Butlin’s has suffered a data breach that has affected up to 34,000 of its customers. A spokesperson confirmed that the compromise had taken place over the past 72 hours and was caused by a phishing email. In a notice posted on its website , Butlin’s managing director, Dermot King, said: “We would like to assure all our guests that your payment details are secure and have not been compromised.

article thumbnail

WannaCry Outbreak Hits Chipmaker, Could Cost $170 Million

Data Breach Today

Factories Crippled After WannaCry Variant Infects Unpatched Windows 7 Machines A WannaCry outbreak has hit unpatched Windows 7 systems at Taiwan Semiconductor Manufacturing Co., crippling its factories. The world's largest chipmaker, which traced the infection to a new software tool that it failed to scan for malware before installation, says the outbreak could cost it $170 million.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Preparing data management for blockchain and other advancements

IBM Big Data Hub

Advances such as blockchain technology are steadily gaining traction both in terms of investment and adoption. Well-informed IT professionals are starting to deploy these new technologies to establish a more connected, knowledgeable and secure business. Here are some ways blockchain technology and database advancements are working together to help facilitate some of those benefits.

article thumbnail

How To Protect Yourself From Hackers

Cyber Info Veritas

Would you like to know how to protect yourself from the ever-present threat of cybercrime perpetrated by black hat hackers? Yes, there are bad and good hackers. Their main aim is to exploit your “mistakes and vulnerabilities” to blackmail you into sending them money or they’ll leak your private data. If your data and online privacy are important to you, and it should be whether you use the internet for social media, shopping, making money online, or learning, read this article with keen interest

article thumbnail

The heat is on, is your school #BreachReady?

IT Governance

Welcome to the new education sector blog series. In our first blog ( sign up to the series here ) , we explore data breaches. We will consider why they happen, what you can do to reduce their likelihood and impact as well as which breaches need reporting to the supervisory authority and what information they will need from you. The human factor. Across all sectors and organisation sizes, simple mistakes such as emailing and posting or faxing information to the wrong people top the Information

article thumbnail

Big Data Analytics: Taking a Predictive Security Stance

Data Breach Today

Carbon Black's Matt Bennet Shares Insights on Making Big Data Meaningful Big data holds the key to moving from a preventive security stance to a more predictive stance, says Matthew Bennett of Carbon Black.

Big data 124
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Hacking the McDonald's Monopoly Sweepstakes

Schneier on Security

Long and interesting story -- now two decades old -- of massive fraud perpetrated against the McDonald's Monopoly sweepstakes. The central fraudster was the person in charge of securing the winning tickets.

article thumbnail

The Explosive-Carrying Drones in Venezuela Won’t Be the Last

WIRED Threat Level

There's still no good defense against drones attacks like the one that targeted Venezuelan president Nicolas Maduro Saturday.

article thumbnail

5 key benefits of an ISO 27001 gap analysis

IT Governance

Building an ISMS (information security management system) that that meets the requirements of ISO 27001 is a challenging project, and it is often difficult to know where to start. One way to simplify the process is to conduct an ISO 27001 gap analysis , a process in which your current state of compliance is measured against the Standard. Below we have outlined exactly how an ISO 27001 gap analysis can benefit your organisation. 1) You’ll gain a high-level overview of what needs to be done to ach