Sat.Nov 18, 2017 - Fri.Nov 24, 2017

article thumbnail

Uber Concealed Breach of 57 Million Accounts For A Year

Data Breach Today

Firm Paid Hackers $100,000, But Was It Bug Bounty Reward or Extortion Payoff? Uber paid hackers $100,000 to keep quiet about a 2016 breach that exposed 57 million accounts belonging to customers and drivers, Bloomberg reports. But was the payment a bug bounty, as Uber has suggested, or really an extortion payoff and hush money?

IT 198
article thumbnail

Intel Management Engine Flaws Leave Millions of PCs Exposed

WIRED Threat Level

Security experts have warned of Intel's Management Engine for years. A new set of confirmed vulnerabilities that impact PCs, servers, and IoT devices shows they may have been right.

IoT 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data breach hits Department of Social Services credit card system

The Guardian Data Protection

Exclusive: Data includes employees’ names, user names, work phone numbers, work emails and system passwords The Department of Social Services has written to 8,500 current and former employees warning them their personal data held by a contractor has been breached. In letters sent in early November the department alerted the employees to “a data compromise relating to staff profiles within the department’s credit card management system prior to 2016”.

article thumbnail

‘Tis the season for proliferating payment options…and risk

Thales Cloud Protection & Licensing

It’s hard to believe that the holiday season is already upon us with both the biggest online and offline shopping events just around the corner. The one-two punch of Black Friday and Cyber Monday are the highest volume shopping days of the year and finding the best deals can be a hobby in itself. In 2016, 108.5 million Americans shopped online over the long weekend.

Risk 90
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Millions of Computers Affected By Intel Firmware Flaws

Data Breach Today

Numerous Manufacturers Must Prep and Distribute Customized Patches Security experts are readying for more details from chipmaker Intel about two classes of vulnerabilities in its chips that could put organizations' most trusted data at risk. Millions of computers are affected, and computer manufacturers must prep and distribute customized patches.

More Trending

article thumbnail

Reader favorites November 2017: Our most popular RIM resources

TAB OnRecord

This month's roundup of popular resources covers document imaging, RIM outsourcing, and shared drive management. Guide: A best practice template for your imaging project This planning template provides a framework to help you create your own document imaging plan. Packed with tips and guidance on how to complete each section, the template helps ensure that… Read More.

article thumbnail

Lords push for new regulations to protect children online

The Guardian Data Protection

Cross-party support for amendment looks likely to lead to defeat for the government, which favours a code of practice Technology firms could be subjected to tough new regulations to protect the privacy and mental health of children as a result of a cross-party campaign that is likely to inflict a defeat on the government within weeks. An amendment from the crossbencher and film director Beeban Kidron to a bill going through the House of Lords has won the support of senior Tories, Labour and the

article thumbnail

Windows 10 Security Feature Broken, CERT/CC Warns

Data Breach Today

Entropy Alert: Non-Random ASLR Leaves Systems Open To Buffer Overflow Attacks Recent versions of Windows have a security problem: They're not random enough, CERT/CC warns. The problem centers on certain uses of ASLR, which is designed to block return-oriented programming techniques and code reuse attacks.

Security 164
article thumbnail

'Vapor Wake' Explosive-Sniffing Dogs Help Protect the Thanksgiving Day Parade

WIRED Threat Level

This year, a team of Labrador retrievers trained to sniff out body-worn explosives will help lock down NYC's Macy's Thanksgiving Day Parade.

Security 111
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The anatomy of effective information security management

IT Governance

With the ever-increasing risks faced by every UK organisation from cyber crime, there is significantly increased pressure on every information security manager to deliver effective security. This manager and their team are expected to plan, implement and monitor suitable measures to protect confidential assets and to mitigate losses in the event of a security breach.

article thumbnail

People and products: Venu Kalla on OpenText Active Intelligence

OpenText Information Management

Venugopal Kalla, better known to his colleagues and friends as Venu, is a Principal Engineer at OpenText. He’s been part of Team OpenText for ten years now, and today enjoys mentoring and supporting several teams and working on OpenText™ Active Intelligence. In this Q&A, Venu reveals more about the work he does: OT: What is … The post People and products: Venu Kalla on OpenText Active Intelligence appeared first on OpenText Blogs.

82
article thumbnail

Kaspersky Blames NSA Analyst For U.S. Intel Leak

Data Breach Today

Anti-virus Vendor Says It Collected, Then Deleted Four Classified Documents Kaspersky Lab says it "inadvertently" scooped up classified U.S. documents and code from an NSA analyst's home computer, but suggests it wasn't the conduit by which the material ended up in Russian hands. It claims that the computer was riddled with malware.

IT 145
article thumbnail

What Amazon Echo and Google Home Do With Your Voice Data—And How to Delete It

WIRED Threat Level

Like the idea of Amazon Echo and Google Home, but feel uneasy about all that recording? Here's what they listen to—and how to delete it.

IT 111
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What is the ISO 27000 series of standards?

IT Governance

The ISO/IEC 27000 family of information security standards, also known as the ISO 27000 series, is developed and published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) to provide a globally recognised framework for best-practice information security management. These security standards help organisations keep their information assets secure, such as their financial information, employee details and intellectual property.

article thumbnail

I'm Testifying in Front of Congress in Washington DC about Data Breaches - What Should I Say?

Troy Hunt

There's a title I never expected to write! But it's exactly what it sounds like and on Thursday next week, I'll be up in front of US congress on the other side of the world testifying about the impact of data breaches. It's an amazing opportunity to influence decision makers at the highest levels of government and frankly, I don't want to stuff it up which is why I'm asking the question - what should I say?

article thumbnail

$1 Billion Lawsuit Focuses on EHR Data Integrity Concerns

Data Breach Today

Suit Against eClinicalWorks Alleges Millions Potentially Harmed by Use of Software Some legal experts say a nearly $1 billion class action lawsuit filed against electronic health records vendor eClinicalWorks could be the first of many cases scrutinizing the data integrity issues of EHR vendors. Others, however, contend that those filing such lawsuits will face many hurdles.

140
140
article thumbnail

Stopping Robocalls Will Soon Be Easier Than Ever

WIRED Threat Level

US consumers suffer 80 million robocalls a day. But a new crackdown—along with some clever apps—could help put a lid on your biggest mobile nuisance.

Security 104
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Websites Use Session-Replay Scripts to Eavesdrop on Every Keystroke and Mouse Movement

Schneier on Security

The security researchers at Princeton are posting. You may know that most websites have third-party analytics scripts that record which pages you visit and the searches you make. But lately, more and more sites use "session replay" scripts. These scripts record your keystrokes, mouse movements, and scrolling behavior, along with the entire contents of the pages you visit, and send them to third-party servers.

article thumbnail

Oversight, insight and execution: Is your data governance strategy working?

IBM Big Data Hub

Allocating IT budget is a tricky business. Companies need to make choices and manage investment tradeoffs. However, recent Aberdeen research suggests that foundational activities to protect, oversee and manage the data environment through a unified approach to data governance can produce enticing results.

article thumbnail

Fraudster Tied to 'The Dark Overlord' Jailed for 3 Years

Data Breach Today

UK Man Blackmailed Law Firm, Allegedly Hacked Pippa Middleton's iCloud Account A British man who was initially arrested on suspicion of hacking English socialite Pippa Middleton's iCloud account has been sentenced to serve a three-year prison sentence after he pleaded guilty to unrelated fraud and blackmail crimes. But he may also have ties to The Dark Overlord extortion gang.

140
140
article thumbnail

Uber Hid 57-Million User Data Breach For Over a Year

WIRED Threat Level

The ridesharing service's latest scandal combines routine security negligence with an "appalling" coverup.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales Cloud Protection & Licensing

Security: moving up the executive stack. The last few years will be remembered for frequent, large and damaging data breaches. They’ve impacted big business and small, private and public organisations, in Australia and around the world. When it comes to data security, hackers don’t discriminate. This has made senior executives everywhere sit up and take notice, with companies concerned about being compromised and becoming tomorrow’s news headline.

article thumbnail

Ten things impacting the world: IQ of 1,000

OpenText Information Management

The notion of a super-intelligent being has been the source of both speculation and entertainment for many years. We have conceptualized modern-day super intellects through characters like the genetically blessed Sherlock Holmes, the chemically altered Lucy, and the AI-enhanced Iron Man (a.k.a. Tony Stark). While we may not have reached these fictional levels of intelligence, … The post Ten things impacting the world: IQ of 1,000 appeared first on OpenText Blogs.

article thumbnail

Driving Privacy Regulators Crazy: UK Probes Uber Breach

Data Breach Today

'Deliberately Concealing Breaches' Escalates Fines, Privacy Watchdog Warns Britain's data privacy watchdog has launched a probe of the massive 2016 data breach suffered by Uber. More than 12 months after the breach, the ride-hailing service is scrambling to notify 57 million individuals across multiple countries that their personal details were exposed.

Privacy 138
article thumbnail

Artificial Intelligence Can Hunt Down Missile Sites in China Hundreds of Times Faster Than Humans

WIRED Threat Level

Teaching deep learning algorithms to find surface-to-air missile sites and much more in satellite images.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

University fundraising under scrutiny after data breach allegations

The Guardian Data Protection

Information Commissioner to look at evidence of wealth screening of former students before approaches made for donations University fundraising is to be examined by the Information Commissioner after allegations emerged that the personal data of some alumni was being misused. Elizabeth Denham has committed to look at evidence which allegedly shows UK universities belonging to the Russell Group sent former students’ data to firms for wealth screening before approaching them for donations.

article thumbnail

TerraLink: Building a corporate knowledge bank powered by OpenText eDOCS

OpenText Information Management

TerraLink is a leading IT systems integrator, helping organizations leverage technology to manage and secure their enterprise content. It comes as no surprise that TerraLink required an industry leading solution to capture, store, retrieve and share all types of content, while scaling with the growth of their business. Enter OpenText™ eDOCS. “I knew it was the right … The post TerraLink: Building a corporate knowledge bank powered by OpenText eDOCS appeared first on OpenText Blogs.

IT 70
article thumbnail

Feds Indict Iranian Over 'Game of Thrones' Hacks

Data Breach Today

Iranian National Charged With Extortion, Leaking Unreleased Episodes U.S. prosecutors have unsealed an indictment against an Iranian man charged with trying to extort entertainment company HBO for $6 million in bitcoins. The case marks a rare public naming of someone accused of cyber extortion, which poses an increasing risk for all organizations.

Risk 138