Sat.Jan 20, 2018 - Fri.Jan 26, 2018

article thumbnail

Allscripts Ransomware Attack a Reminder of Cloud Risks

Data Breach Today

Points to Need for Clients to Have Business Continuity Plan A ransomware attack on electronic health records vendor Allscripts late last week is a reminder of the potential disruption to patient care delivery healthcare entities can face if a cloud-services provider suffers a cyberattack. It also points to the need for business continuity planning.

Cloud 168
article thumbnail

New Malware Hijacks Cryptocurrency Mining

Schneier on Security

This is a clever attack. After gaining control of the coin-mining software, the malware replaces the wallet address the computer owner uses to collect newly minted currency with an address controlled by the attacker. From then on, the attacker receives all coins generated, and owners are none the wiser unless they take time to manually inspect their software configuration.

Mining 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Challenges Created by an Ad Hoc Approach to Information Capture

AIIM

Scanning and information capture lead a curious double life. On one hand, it seems like we’ve been doing scanning and capture forever, at least within larger companies. Scanning and capture are stable, mature technologies with a well-documented ROI. On the other hand, they are still somewhat new when it comes to adoption by many smaller and mid sized organizations.

article thumbnail

The role of blockchain in helping organizations meet GDPR compliance

Information Management Resources

Many have begun to consider whether the technology could be used to improve customer data management processes, as they relate to the upcoming EU mandate.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Ransomware Outlook: 542 Crypto-Lockers and Counting

Data Breach Today

Crypto-Lockers Remain Serious Threat Despite Recent Attack Volume Decline After spiking in 2017, the volume of attacks involving ransomware has since declined, but the malware still remains a potent threat. For attackers, ransomware barriers to entry are lower than ever, thanks to highly automated ransomware-as-a-service offerings.

More Trending

article thumbnail

4 Special Requirements Social Media and Collaboration Create for GDPR Compliance

AIIM

A new set of European rules and standards related to privacy and data protection (the General Data Protection Regulation , or GDPR ) has set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers. The regulation is designed to harmonize privacy across the EU, codify more rigorous privacy rights; strike a balance between privacy and security and create an explicit obligation for both data contr

GDPR 92
article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

This morning we announced, in tandem with our partner 451 Research, the Global Edition of the 2018 Thales Data Threat Report. It’s abundantly clear that medium to larger enterprises (the focus of the report and underlying survey) are finding it harder than ever to protect their sensitive data. The twin drivers of the problem are increased threats and the drive to digitally transform how organizations deliver value and revenue.

article thumbnail

Intel: Stop Installing Patches Due To Reboot Problems

Data Breach Today

Struggles With Firmware Fixes For Meltdown and Spectre The usual advice for major security flaws is to patch as quickly as possible. Now Intel is calling for a full stop due to imperfect patches for a trio of chip security vulnerabilities known as Meltdown and Spectre.

Security 162
article thumbnail

Organisations need to prepare for “cyber shocks”

IT Governance

Most organisations are aware of the catastrophic damage that extreme cyber attacks can cause, but few have put in place appropriate measures to defend and respond to such incidents, according to a new report from PwC. Strengthening digital society against cyber shocks , which analyses key findings from the 2018 Global State of Information Security ® Survey (GSISS), focuses on the effects of massive incidents such as NotPetya and WannaCry.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Want to Avoid Malware on Your Android Phone? Try the F-Droid App Store

WIRED Threat Level

Opinion: Researchers from Yale Privacy Lab argue that the scourge of trackers in Android apps means users should stop using the Google Play store.

Privacy 109
article thumbnail

5 Steps to Better Security in Hybrid Clouds

Dark Reading

Following these tips can improve your security visibility and standardize management across hybrid environments.

Cloud 103
article thumbnail

Online Advertising: Hackers' Little Helper

Data Breach Today

Network of Fake Ad Agencies Distributed 1 Billion Bad Ads, Researchers Find The web may be largely funded thanks to online advertising, but the threat posted by malicious advertisements continues to escalate. Indeed, the latest malvertising scheme, uncovered by security firm Confiant, served 1 billion malicious advertisements.

Security 151
article thumbnail

Cyber attacks are now one of the biggest threats to global society

IT Governance

A recent article about the World Economic Forum’s Global Risks Report 2018 said that “the top five risks to global stability over the next five years are natural disasters, extreme weather, cyberattacks, data fraud, and failure to address climate change”. The past few years have seen an increase in cyber attacks and their associated damages. The report’s findings suggest that this acceleration is unlikely to slow.

Risk 83
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Meltdown and Spectre Patches From Intel and Others Have a Rough Start

WIRED Threat Level

In the haste to address the Meltdown and Spectre vulnerabilities that shook the computer industry, several clumsy patch attempts have had to be pulled.

Security 104
article thumbnail

AI and analytics has the power to change upstream oil and gas

OpenText Information Management

The upstream oil and gas industries have traditionally been slow to adopt new technologies. Anything new has to be proven in the field before most companies will adopt it. The development of Artificial Intelligence (AI) and advanced analytics should be different. For oil and gas, this combination offers the ability to continuously increase operational performance … The post AI and analytics has the power to change upstream oil and gas appeared first on OpenText Blogs.

article thumbnail

Equifax Breach Victims: UK Count Goes Up

Data Breach Today

15 Million UK Residents' Records Exposed, 860,000 Consumers At Risk Data broker Equifax has released a revised count of U.K. victims of its massive 2017 data breach, now saying 860,000 residents had their personal details exposed. The data broker is offering its own fraud-monitoring services to breach victims, provided they share their personal details.

article thumbnail

Movement on Section 702 of the Foreign Intelligence Surveillance Act (FISA)

Data Matters

Following months of intense debate, an attempted filibuster, and close votes in both the House and Senate, Congress last week finally extended Section 702 of the Foreign Intelligence Surveillance Act (FISA). First enacted in 2008, Section 702 is a surveillance law that permits the targeting of foreign individuals overseas. The authority has engendered international attention and criticism from civil libertarians and was due to sunset on January 19, 2018.

Privacy 68
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Tinder's Lack of Encryption Lets Strangers Spy on Your Swipes

WIRED Threat Level

Thanks to Tinder's patchwork use of HTTPS, researchers found they could reconstruct someone's entire experience in the app.

article thumbnail

Top four reasons to start AB testing today

OpenText Information Management

In recent years, the pressure applied to marketers has grown significantly. Year over year, goals are handed down and marketers are expected to do more with less. This trend often leaves marketers scrambling to find new ways to meet these goals. What’s more, in today’s digital ecosystem, with an abundance of options, visitors have come … The post Top four reasons to start AB testing today appeared first on OpenText Blogs.

article thumbnail

Aetna Signs $1.15 Million Settlement With NY for Breaches

Data Breach Today

Action Comes After $17.2 Million Lawsuit Settlement After settling a breach lawsuit for $17.2 million, Aetna has signed another large settlement related to privacy breaches involving mailings to its health plan members. The latest settlement with the New York state attorney general's office involves two mailings last year.

Privacy 150
article thumbnail

Can I really rely on my entire workforce to support a recovery?

IT Governance

This is a guest article written by Robert A. Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. The author’s views are entirely his own and may not reflect the views of IT Governance. In the northern hemisphere, we have entered the flu season, and people are starting to become sick.

Risk 75
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Doomsday Clock Ticks Closer to Midnight Over Nuclear War Fears

WIRED Threat Level

As the so-called Doomsday Clock ticks even closer to midnight, a reminder of just how easy it is to slip into nuclear war.

IT 110
article thumbnail

Regulatory Matters: EU regulatory change is coming fast in Life Sciences

OpenText Information Management

The Life Sciences sector is used to constant regulatory change. However, the next few years are about to see major new legislation in the EU that could result in major disruption to Life Sciences, Pharmaceutical and Healthcare companies – wherever they are. As I mentioned in my previous blog, I’m going to concentrate on two … The post Regulatory Matters: EU regulatory change is coming fast in Life Sciences appeared first on OpenText Blogs.

article thumbnail

Expect More Cybersecurity 'Meltdowns'

Data Breach Today

After Meltdown and Spectre, Researchers Will Pummel Microprocessors for Flaws Technology giants are still struggling to identify what's at risk from the Spectre and Meltdown flaws in modern CPUs, never mind getting working security updates into users' hands. In the meantime, expect a rush by researchers to find more flaws in microprocessor code.

article thumbnail

The Next Generation of Records Management

Gimmal

Over the past couple of years, we have seen organizations make a fundamental shift towards storing and managing their records in the cloud. As the internet continues to become the primary platform for conducting business, with collaborative tools and instant accessibility, the cloud makes increasingly more sense as the default location for data and records.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Your Sloppy Bitcoin Drug Deals Will Haunt You For Years

WIRED Threat Level

Scouring the blockchain, researchers found years-old evidence tying Silk Road transaction to users' public accounts.

article thumbnail

DDoS Attacks Become More Complex and Costly

Dark Reading

Major DDoS attacks cost some organizations more than $100,000 in 2017, according to a new NETSCOUT Arbor report.

94
article thumbnail

Blockchain in Healthcare: The Potential and Limitations

Data Breach Today

Blockchain holds potential for supporting secure health data exchange, but it has limitations that organizations need to keep in mind, says Intel's David Houlding in this in-depth interview on the technology.