Sat.Mar 24, 2018 - Fri.Mar 30, 2018

article thumbnail

Facebook Faces New Uproar: Call and SMS Metadata

Data Breach Today

Users Surprised By Metadata Collection, But Facebook Says It Always Asked Facebook is facing a new controversy after some users say they've found records of phone calls and text messages in their personal files, but claim they never granted the social networking site permission to collect the data.

Metadata 186
article thumbnail

How modern RIM professionals are staying relevant – Part 2

TAB OnRecord

In a three-part blog post we are outlining the ways that modern RIM professionals are increasing the value they provide to the organization. In part one of our blost post we discussed how records managers are extending their reach beyond the filing and storage rooms. This allows them to apply their expertise in information architecture, [.] Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Digital Transformation Lesson: Open Source Business Models

Bill Schmarzo - Dell EMC

The year was 1994 and I had the fortunate opportunity to stumble upon a company – Cygnus Support – that was “selling free software.” I remember telling my mom that I was Vice President of Sales & Marketing of a company that was selling free software. After a very long pause, she replied, “Is your resume up to date?”. Cygnus Support sold support contracts and custom consulting projects for GNU development tools (gcc, g++, gdb) to companies looking to accelerate their time-to-market in the emb

article thumbnail

The Brexit whistleblower: ‘Did Vote Leave use me? Was I naive'

The Guardian Data Protection

Shahmir Sanni, a volunteer for Vote Leave, the official pro-Brexit EU referendum campaign, explains how a data company linked to Cambridge Analytica played a crucial role in the result, and voices his concerns that electoral spending rules were manipulated… and evidence apparently destroyed • Brexit insider claims Vote Leave team may have breached spending limits When I first met Shahmir Sanni last August, he was nervy, anxious, uncertain.

IT 111
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Misconfigured Server Exposes Patient Data

Data Breach Today

Security Researcher Discovers Apparent Breach at Medical Practice A medical practice's misconfigured database server that allegedly exposed information about thousands of patients plus staff serves as another reminder about the importance of safeguarding sensitive data from exposure on the internet.

Security 179

More Trending

article thumbnail

Is 2018 the Tipping Point in Digital Transformation?

Bill Schmarzo - Dell EMC

“Survival, in the cool economics of biology, means simply the persistence of one’s own genes in the generations to follow.” — Lewis Thomas. A recent article in The Economist titled “ The Year of the Incumbent ” postulates that 2018 is the year that the incumbents “get back into the game” by stealing the momentum from technology startups to reclaim their spots atop the market valuation charts.

article thumbnail

Inside Fort Gordon: Where Next-Gen Cyber Troops Are Trained

WIRED Threat Level

What's happening at the US Army's new cyber branch headquarters marks a change for Fort Gordon. Hell, it might be changing warfare itself—all through a computer screen.

IT 108
article thumbnail

4 Tips for Implementing a Mature Endpoint Security Strategy

Data Breach Today

Insights on Vulnerability Management and Incident Response An effective endpoint security strategy can be as layered as you want it to be. But you'll have a strong foundation if you build off of these four key steps.

Security 162
article thumbnail

Facebook logged SMS texts and phone calls without explicitly notifying users

The Guardian Data Protection

Users complain of phone and text data collected by the company despite never having agreed to practice Facebook began logging the text messages and phone calls of its users before it explicitly notified them of its practice, contradicting the company’s earlier claims that “uploading this information has always been opt-in only”. In at least one previous version of the Messenger app, Facebook only told users that the setting would enable them to “send and receive SMS in Messenger”, and presented

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Lions and Tigers and Facebook – Oh My!

AIIM

Yep, that is what I am hearing these days, reminiscent of the scene from the Wizard of Oz when they are entering the forest, knowing that there are animals and possible danger hiding in the shadows. Yet they choose to enter anyway. Now we have Facebook, and news that information was collected and used by Cambridge Analytica. So how does this happen?

article thumbnail

List of data breaches and cyber attacks in March 2018

IT Governance

Healthcare breaches are common in our monthly lists – but the number of incidents this month is insane. Take a look at the list, and you’ll quickly notice that the majority of them are healthcare related. There’s a mixture of incidents in there, from a rogue employee to someone accidentally sending information to the wrong fax number. Yes, I said fax….

article thumbnail

Atlanta After Ransomware Attack: Please Restart Your PC

Data Breach Today

5 Days After Outbreak, Email Works, But Don't Try Paying Parking Tickets Online Five days after a ransomware outbreak crypto-locked city systems, Atlanta has advised its 8,000 employees that they can once again boot their PCs and printers. But information security experts warn that the city's infrastructure still appears to have easily exploitable misconfigurations.

article thumbnail

Apple launches iOS 11.3 with raft of privacy features

The Guardian Data Protection

Sensing opportunity – and GDPR – the Silicon Valley company launches major data protection push across devices Apple is launching a major privacy push, with software updates across all its devices to introduce new data privacy information immediately, with an updated website offering new privacy management tools to follow in May. Thursday’s updates (macOS 10.13.4, iOS11.3 and tvOS 11.3) are prompted by the enormous new European data protection regulation GDPR, and have been in the works since at

Privacy 102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Why Enterprises Should Control Their Encryption Keys

Thales Cloud Protection & Licensing

Cloud providers have done a good job of integrating default encryption services within their core infrastructure. However, as discussed in previous blogs , the encryption service is only as secure as the keys that are used to encrypt the data. Enterprises cannot ignore the responsibility of implementing a strong key assurance service that ensures they maintain control of their own risks.

article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about us. A lot, it turns out. It collects data from our posts, our likes, our photos , things we type and delete without posting, and things we do while not on Facebook and even when we're offline. It buys data about us from others. And it can infer even more: our sexual orientation, political beliefs, relationship status, drug use, and other personality traits -- even if we didn't

article thumbnail

Boeing Confirms 'Limited' Malware Outbreak

Data Breach Today

WannaCry Reportedly Identified by Boeing Executive as the Culprit Boeing says that a malware outbreak affected a small number of systems but did not disrupt production. An executive has reportedly identified the malware as being WannaCry ransomware and called for "all hands on deck" to respond to the incident.

article thumbnail

Facebook announces privacy tools to 'put people in more control' of data

The Guardian Data Protection

Corporation suggests changes are response to Cambridge Analytica scandal, with EU set to toughen data protection rules in May Facebook is launching a range of new tools in an effort to “put people in more control over their privacy” in the buildup to new EU regulations that tighten up data protection. The changes come after a troubling two weeks for the company, which is battling with the fallout of the Cambridge Analytica files.

Privacy 96
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Leveraging tokenization services from the major card brands

Thales Cloud Protection & Licensing

As the volume of both card-based payments and digital payments continue to grow significantly year-on-year, the importance of securing sensitive card data (and in particular the primary account number or PAN) has never been a more critical and challenging task. In the recent Thales eSecurity eBook, ‘ PCI Compliance and Data Protection for Dummies ’, we cover the main technologies that can be used, such as encryption and tokenization, to help with such efforts in protecting the payment prior to a

article thumbnail

Guccifer 2.0's Slip-Up Shows That Even Elite Hackers Make Mistakes

WIRED Threat Level

No matter how much mystique a hacker persona has, the individual or group behind it inevitably makes operations security errors sometimes.

article thumbnail

Under Armour Reports Massive Breach of MyFitnessPal App

Data Breach Today

150 Million Accounts Exposed; Could Phishing Campaign Be Coming? Under Armour says an unauthorized intruder gained access to information for the accounts of 150 million users of its MyFitnessPal mobile app and website. Learn why some fear the breach could lead to a massive phishing campaign.

Phishing 150
article thumbnail

GDPR: how can I email data securely to comply with the new regulations?

The Guardian Data Protection

Robert is often required to email sensitive data. Is there a secure way of doing so in view of the new data protection laws? As a freelance media professional, I am often asked by my various employers to send copies of my passport, completed visa forms and other sensitive data in the form of email attachments. I have recently questioned this and have not really got a satisfactory response.

GDPR 91
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

A Scammer Tried to Scare Me into Buying Their Security Services - Here's How It Went Down

Troy Hunt

Here's the tl;dr - someone named "Md. Shofiur R" found troyhunt.com on a "free online malware scanner" and tried to scare me into believing my site had security vulnerabilities then shake me down for a penetration test. It didn't work out so well for him, here's the blow-by-blow account of things then I'll add some more thoughts afterwards: Should I respond?

IT 79
article thumbnail

The GDPR: A guide for small businesses

IT Governance

Businesses are starting to panic as they try to comply with the General Data Protection Regulation (GDPR) before the May 2018 deadline. Many even believe that the GDPR won’t apply to them because they have fewer than 250 employees. Our small business guide to the GDPR should help clarify some of the key factors affecting SMEs. Does it apply to me? Any organisation, regardless of size, that regularly processes EU residents’ personal data must comply with the Regulation.

GDPR 77
article thumbnail

OCR Considering HIPAA Privacy Rule, Enforcement Changes

Data Breach Today

But Agency Will Seek Public Input First Federal regulators are considering potential changes to HIPAA privacy rule and enforcement regulations, but aim to first engage the healthcare sector and public for input, says the nation's top HIPAA enforcer. So, what changes are being considered?

Privacy 151
article thumbnail

Facebook to stop allowing data brokers such as Experian to target users

The Guardian Data Protection

Company to shut down Partner Categories feature to ‘improve people’s privacy’ but analysts question potential impact of change Facebook is shutting down a feature that allowed “data brokers” such as Experian and Oracle to use their own reams of consumer information to target social network users, the company has announced. The feature, known as “Partner Categories”, will be “winding down over the next six months”, Facebook announced in a terse blogpost.

Privacy 79
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Taking down Gooligan part 3 — monetization and clean-up

Elie

This post provides an in-depth analysis of Gooligan monetization schemas and recounts how Google took it down with the help of external partners. This post is the final post of the series dedicated to the hunt and take down of Gooligan that we did at Google in collaboration with Check Point in November 2016. The. first post. recounts the Gooligan origin story and offers an overview of how it works.

Access 72
article thumbnail

How penetration testing can help you comply with the GDPR

IT Governance

You might be a small organisation that’s seemingly below cyber criminals’ radar, but you are far from immune to data breaches. Small and medium-sized enterprises account for a large proportion of cyber attacks, victims of random and indiscriminate attacks that target vulnerabilities, rather than specific organisations. The Cyber Security Breaches Survey 2017 shows just how prevalent the issue is.

GDPR 75
article thumbnail

Spain Busts Alleged Kingpin Behind Prolific Malware

Data Breach Today

$1 Billion in Losses Tied to Gang Wielding Carbanak and Cobalt Malware The alleged leader of a cybercrime gang tied to more than $1 billion in losses has been arrested in Alicante, Spain. Authorities say "Denis K." is a Ukrainian national who led a gang that developed Carbanak and Cobalt malware to infect PCs as well as perpetrate ATM jackpotting attacks.

145
145