Sat.Jan 27, 2018 - Fri.Feb 02, 2018

article thumbnail

First ATM 'Jackpotting' Attacks Hit US

Data Breach Today

Cash-Out Malware Called 'Ploutus' Migrates North From Mexico U.S. Secret Service alert: For the first time, malware-using fraudsters have been draining U.S. ATMs of their cash via what's known as a jackpotting or cash-out attack. Two older models of ATMs made by Diebold Nixdorf appear to have been targeted.

259
259
article thumbnail

Securing Data in the Digital Transformation Era

Thales Cloud Protection & Licensing

Data breaches are the new normal. According to our 2018 Global Data Threat Report , 67% of enterprises have been breached, with that percentage rate growing every year. Regardless of the security measures and efforts put in place, organizations need to act as if a successful cyberattack is not a question of “if” but “when.”. As organizations continue to embrace digital transformation, greater amounts of sensitive data is created, stored and transferred in digital form putting more data at risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Braindates: How We’re Kicking Peer-to-Peer Learning Up a Notch at #AIIM18

AIIM

Say you’re feeling a bit under the weather. Ache here, pain there, friends asking “Are you ok? You look.tired.” What’s the first thing you’ll do? Go to the doctor? Of course not. You Google your symptoms, so you can judge if 1) you can cure what ails you on your own, or 2) it’s worth the hassle of going in to see your doctor. If you do end up going, you’ll proudly share your diagnosis with her before she can even examine you, just to make sure she doesn’t waste your time.

article thumbnail

If Robert Mueller Is Fired, the Russia Probe Could Continue

WIRED Threat Level

The special counsel is under attack, but if Robert Mueller gets fired, the investigation into Trump’s Russia ties and obstruction of justice could keep going.

Security 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US Data Breaches Hit All-Time High

Data Breach Today

Millions of Payment Cards and Social Security Numbers Exposed The number of data breaches reported by U.S. organizations reached an all-time high last year. In 2017, organizations that described how bad their breach was - and one-third did not - collectively lost 14 million payment cards and 158 million Social Security numbers, according to the Identity Theft Resource Center.

More Trending

article thumbnail

Who's Watching Your Operations?

AIIM

You manage a large facility with multiple buildings across the campus. Each building while somewhat unique, is equipped with plumbing, electrical, security, HVAC, and other elements that must be monitored, maintained and repaired at some point. Ideally, you would have an army of staff available to monitor and check everything constantly to provide feedback and predict what will happen before catastrophe strikes, but you don’t.

article thumbnail

Strava Data Heat Maps Expose Military Base Locations Around the World

WIRED Threat Level

The US military is reexamining security policies after fitness tracker data shared on social media revealed bases and patrol routes.

Military 108
article thumbnail

Cybercrime as a Service: Tools + Knowledge = Profit

Data Breach Today

On cybercrime forums and darknet marketplaces, there's an abundant supply of cybercrime products and services and lots of demand, plus prices remain low, says Flashpoint's Liv Rowley. All that's needed to leverage the products and services to make a profit, she says, is a bit of knowledge.

182
182
article thumbnail

How ECM solutions are keeping pace with a new generation

OpenText Information Management

The way we work—the way we access, use, share and collaborate on business content—is undergoing a massive transformation. Workers today are more mobile. Projects demand greater collaboration, often across multiple sites and time zones. What’s more, the rise in consumer file sharing services has changed the way users interact with enterprise software, with vastly more … The post How ECM solutions are keeping pace with a new generation appeared first on OpenText Blogs.

ECM 92
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Worried about Strava? It’s not the only app mapping our every move | Keza MacDonald

The Guardian Data Protection

Giving away all manner of personal information is only a tap away on your phone settings, as the fitness tracking site’s blunder has shown It was a great PR move: in November fitness tracking company Strava launched an updated global heatmap that visualised all the location data that its users had been collectively broadcasting, revealing popular running spots around the world.

article thumbnail

The Devin Nunes Memo: Reading Between the Lines

WIRED Threat Level

The Devin Nunes memo that purports to show improper surveillance practices is out—and national security experts say it falls far short of the hype.

article thumbnail

Japanese Cryptocurrency Exchange Suffers $530 Million Theft

Data Breach Today

Coincheck Says It Was Hacked; Stolen XEM Transactions to be Blocked Coincheck, a Tokyo-based exchange, says it suffered a hack attack that led to the theft of $530 million worth of XEM cryptocurrency from its hot wallet. But the developers of XEM say they are tagging all accounts that receive the stolen funds to stop it from being converted to cash.

IT 176
article thumbnail

Connected Device Data Exchange – Who’s Minding the Store on Security?

OpenText Information Management

The OpenText™ Business Network blog post Top Ten Supply Chain Predictions for 2018, prediction #9 Augmented Reality Technology — talks about how the growing number of products embedded with sensors blurs the line between a physical object and its digital twin. It also indicates an increased focus on the security of information exchanged from these … The post Connected Device Data Exchange – Who’s Minding the Store on Security?

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Reader favorites February 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover cost savings, risk management and RIM training. Learn how to reduce offsite box storage expenses, how to protect your most valuable documents, and how to deliver a world-class RIM training program. Tips for reducing your offsite storage costs Is too much of your RIM budget going to [.] Read More. The post Reader favorites February 2018: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

'Jackpotting' ATM Hack Comes to the United States

WIRED Threat Level

The "jackpotting" ATM attack drained tens of millions of dollars worldwide before landing in the United States.

Security 106
article thumbnail

Information Warfare: Gauging Trolls' Influence on Democracy

Data Breach Today

CIA Chief Warns Russia Is Seeking to Influence US Midterm Elections How effective are nation-backed trolls at influencing individuals via social media? An analysis of Russian trolls' accounts suggests they're designed for "causing havoc by pushing ideas, engaging other users or even taking both sides of controversial online discussions.

171
171
article thumbnail

Top 2018 tech trends for Government

OpenText Information Management

Digital transformation continues to progress in the government sector and this is unlikely to change in 2018. The underlying technologies are maturing and moving from implementation to optimization. That’s why my predictions for the tech trends of 2108 aren’t about revolutionary innovations. Instead, they cover areas where government agencies are likely to begin to realize … The post Top 2018 tech trends for Government appeared first on OpenText Blogs.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Learn how to build your ladder to AI with "Machine Learning Everywhere"

IBM Big Data Hub

Join us 27 February at 1 PM ET for "Machine Learning Everywhere: Build Your Ladder to AI." Visit the event landing page to learn more about the event and register for a calendar reminder: ibm.com/mleverywhere.

73
article thumbnail

Chrome Extension Malware Has Evolved

WIRED Threat Level

While helpful and creative, Chrome extensions have also become a new playground for hackers intent on stealing your data.

article thumbnail

What's Riding on 5G Security? The Internet of Everything

Data Breach Today

5G Brings Great Speed But Also Great Complexity The U.S. government's idea to take the reins of the development of 5G mobile networks has been met with cynicism and criticism. But there are goods reasons the government is worried: Standards haven't been set in stone yet, and 5G will present a bevy of new security challenges. Here are some of them.

Security 157
article thumbnail

Artificial Intelligence: a new frontier to customer experience

OpenText Information Management

Facing heightened competition and increasing demands from customers, many organisations are now leveraging Artificial Intelligence (AI) to stay ahead of the curve. While the use of AI has predominantly been applied in heavy industries and financial services, it is now increasingly applied across a gamut of customer-facing industries, including retail and healthcare.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Five reasons why business continuity management is essential to your organisation’s cyber security

IT Governance

Business continuity management is the most comprehensive approach to organisational resilience, and involves managing risks to critical business functions to ensure continuity of service in the event of a disruptive incident. Implementing a business continuity management system (BCMS) is imperative to developing cyber resilience in today’s cyber security environment.

GDPR 73
article thumbnail

Winter Olympic Cyberattacks Have Already Started—and May Not Be Over

WIRED Threat Level

Two state-sponsored hacking operations are plaguing Pyeongchang, with murky motivations and no clear endgame.

article thumbnail

Cryptocurrency Miners Crash Malware 'Top 10'

Data Breach Today

Beyond Stolen CPU Cycles, Miners Pose Enterprise Security Risks The booming interest and sometimes surging values of cryptocurrencies are drawing the interest of cybercriminals on a scale never seen before - including attacks aimed at trying to steal computing power to mine cryptocurrency.

Mining 154
article thumbnail

Matson Logistics transforms information exchange with OpenText B2B Managed Services

OpenText Information Management

When your core business is shipping and logistics, what do you do when you find yourself committing substantial resources to managing the complexities of EDI and B2B operations? For Matson Logistics, the solution was to turn to the B2B Integration experts at OpenText. Matson Logistics wanted to focus on their core competencies and move away … The post Matson Logistics transforms information exchange with OpenText B2B Managed Services appeared first on OpenText Blogs.

B2B 73
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Weekly discussion podcast: Critical Information Infrastructure, Part 1

IT Governance

This week’s extract is taken from Toomas Viira’s book Lessons Learned – Critical Information Infrastructure Protection , which is a vital source of information and thought-provoking insights into potential issues within critical information infrastructure (CII). Episode 1 – Introduction: “These systems must be very well protected against cyber-attacks.

article thumbnail

I'm Teaming Up with Scott Helme to Run "Hack Yourself First" Workshops in Europe

Troy Hunt

This is probably the most self-explanatory blog post title I've ever written! But be that as it may, it deserves some explanation as to how I've arrived at this point and like many great ideas, it began over some beers. I've just arrived home to the Gold Coast in Australia which I frequently describe to people as "the sunny part of the sunny country" I'm literally sitting on a beach writing this blog post and frankly, I'd like to spend more time here.

IT 68
article thumbnail

Feel the Heat: Strava 'Big Data' Maps Sensitive Locations

Data Breach Today

Internet of Things Privacy Fallout, Now in Heat Map Form Fitness app and website developer Strava has landed in hot water after publishing a global heat map that shows users' workout routes in aggregate. By doing so, the firm has inadvertently revealed military installation layouts and other sensitive information.

Big data 153