Sat.Jun 16, 2018 - Fri.Jun 22, 2018

article thumbnail

Tesla Accuses Insider of Stealing Gigabytes of Data

Data Breach Today

Former Employee Accused of Hacking Software as Tesla Warns of 'Sabotage' Electric car manufacturer Tesla has sued a former employee for sabotage, alleging that he "unlawfully hacked the company's confidential and trade secret information and transferred that information to third parties" while leaving a trail designed to implicate other employees.

article thumbnail

Protecting Sensitive Company Data: How to Educate Employees

AIIM

The threat of a hack is greater than it ever has been before with technology now reaching all parts of the world and granting access to the internet uniformly. The effects of such hacks has been seen in the news lately as well as major corporations like Sony, Yahoo and Equifax experience the terrible consequences of cyber breaches. With the problem growing, and the attacks getting more sophisticated, there has never been a better time to learn how to defend your business’s data and protect your

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Agencies Step Up to Data Security Challenge

Thales Cloud Protection & Licensing

Data-level security is not just another mandate. It’s a necessity. That was a recurring theme during a roundtable discussion held in advance of the Data Security Summit at Spire in Washington, D.C. The theme of the summit, sponsored by Thales eSecurity, was “IT Modernization: The New Cyber Agenda.”. The roundtable, including more than a dozen IT and cyber leaders from government and industry, explored the business drivers, challenges and evolving strategies around cybersecurity in government.

article thumbnail

Google to Fix Location Data Leak in Google Home, Chromecast

Krebs on Security

Google in the coming weeks is expected to fix a location privacy leak in two of its most popular consumer products. New research shows that Web sites can run a simple script in the background that collects precise location data on people who have a Google Home or Chromecast device installed anywhere on their local network. Craig Young , a researcher with security firm Tripwire , said he discovered an authentication weakness that leaks incredibly accurate location information about users of both

IoT 179
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Massive CIA Hacking Tool Leak: Ex-Agency Employee Charged

Data Breach Today

Lead Suspect Joshua A. Schulte Already Detained on Child Pornography Charges The U.S. Department of Justice has charged a former CIA officer, 29-year-old Joshua A. Schulte, with providing 8,000 documents that describe the agency's offensive malware tools and practices to WikiLeaks, which published them in 2017 as the "Vault 7" archive.

Archiving 188

More Trending

article thumbnail

Perspective Check: Context is Everything in InfoGov

Weissman's World

If you’ve ever used Google to help you find a new infogov technology solution, then you know how every one you find, from every vendor you look at, seems like the answer to all your problems. Here’s how to figure out which one(s) work best in your context! The post Perspective Check: Context is Everything in InfoGov appeared first on Holly Group.

article thumbnail

AT&T, Sprint, Verizon to Stop Sharing Customer Location Data With Third Parties

Krebs on Security

In the wake of a scandal involving third-party companies leaking or selling precise, real-time location data on virtually all Americans who own a mobile phone, AT&T , Sprint and Verizon now say they are terminating location data sharing agreements with third parties. At issue are companies known in the wireless industry as “location aggregators,” entities that manage requests for real-time customer location data for a variety of purposes, such as roadside assistance and emergenc

Privacy 160
article thumbnail

Data Governance Best Practices in the GDPR Era

Data Breach Today

Matt Lock of Varonis on the Need to Have a Baseline for Data Access Behavior GDPR requires organizations to "have a governance model in terms of access and control and accountability," says Matt Lock of Varonis, who describes essential steps.

GDPR 179
article thumbnail

Will cryptocurrency mining soon saturate AWS, Microsoft Azure and Google Cloud?

The Last Watchdog

Don’t look now but cryptojacking may be about to metastasize into the scourge of cloud services. Cryptojacking, as defined by the Federal Trade Commission , is the use of JavaScript code to capture cryptocurrencies in users’ browsers without asking permission. There’s a temptation to dismiss it as a mere nuisance; companies deep into ‘digital transformation,’ in particular, might be lulled into this sort of apathy.

Mining 126
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

[Guest Post] Infosecurity:?3 Industry Trends to Follow

AIIM

In light of recent events, we can all agree that information security has been criminally overlooked on some major fronts across most industries. Absolutely mind-boggling attacks on major corporations like Sony, Yahoo and Equifax have consecrated InfoSec in the most frightening way possible. It is entirely possible that InfoSec had been given the resources it needed in those conditional circumstances but, given the unmitigated damage and lack of response, it is beyond fair to say that InfoSec ma

article thumbnail

Supreme Court: Police Need Warrant for Mobile Location Data

Krebs on Security

The U.S. Supreme Court today ruled that the government needs to obtain a court-ordered warrant to gather location data on mobile device users. The decision is a major development for privacy rights, but experts say it may have limited bearing on the selling of real-time customer location data by the wireless carriers to third-party companies. Image: Wikipedia.

article thumbnail

Phishing Defense: Block OAuth Token Attacks

Data Breach Today

But OAuth Attack Defense Remains Tricky, Warns FireEye's Douglas Bienstock Just one click: That's all it takes for a victim to inadvertently grant attackers access to their email account via a third-party application. Here's how to spot signs of OAuth-related hacking and how to defend against it.

Phishing 178
article thumbnail

Real-life examples of social engineering ? part 2

IT Governance

Last month, I published an article looking at two examples of the use of social engineering in everyday life. I’d like to continue the theme of that article by talking about three other social engineering attacks that caused great damage. Diamonds, diamonds, DIAMONDS. If you’re planning on stealing USD$27.9 million worth of diamonds, then all you need is some chocolate and a smile.

Phishing 110
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Carpenter v. United States Decision Strengthens Digital Privacy

WIRED Threat Level

Thanks to Carpenter v. United States, the government will now generally need a warrant to obtain your cell site location information.

Privacy 104
article thumbnail

'Pay Up or Get WannaCry Hit' Extortion Email Spreading

Dark Reading

Sophos warns of a 'protection racket' scam email that threatens to infect victims with the ransomware variant if they don't pay the attackers.

article thumbnail

$4.3 Million HIPAA Penalty for 3 Breaches

Data Breach Today

MD Anderson Cancer Center Cited for Unencrypted Devices A lack of device encryption will cost a Texas-based cancer treatment center $4.3 million in civil monetary penalties from the Department of Health and Human Services.

article thumbnail

How to respond to a data subject access request

IT Governance

A key change to data subjects’ rights under the EU General Data Protection Regulation (GDPR) is the right to ask organisations what data they hold about the data subject. Although this was possible under the Data Protection Act 1998, organisations now have only 30 days to respond, and cannot charge an admin fee for doing so. What is a data subject access request (DSAR)?

Access 91
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

China Escalates Hacks Against the US as Trade Tensions Rise

WIRED Threat Level

A hacking truce between China and the US doesn't address government espionage operations, a workaround both countries exploit.

article thumbnail

Reader Favorites June 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover: ways to optimize the management of physical records, what to consider when auditing incoming files, and how to get the most out of cloud storage. Six ways to optimize your physical records collection This resource offers six tips to improve the way you organize, access, store and share [.] Read More. The post Reader Favorites June 2018: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Hackers Hit Satellite Operators and Telecoms, Symantec Says

Data Breach Today

Thrip Group's Latest Attacks Trace to China, Maybe Beyond Symantec says it has uncovered a cyber espionage campaign that targets telecommunications operators in Southeast Asia - as well as a defense contractor and satellite communications operator - and warns that the hacking group, dubbed Thrip, may be laying the groundwork for more destructive attacks.

article thumbnail

Cyber attacks hit a fifth of schools and colleges

IT Governance

One in five schools and colleges have fallen victim to cyber crime, according to research from the specialist insurer Ecclesiastical, yet the majority (74%) of educational establishments claim to be “fully prepared” to deal with such attacks. . This discrepancy between perceived preparedness and reality is particularly alarming when you consider the sensitivity of the data held within the schools relating to pupils, parents and staff that could be compromised thanks to the careless actions of u

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Millions of Google, Roku, and Sonos Devices Are Vulnerable to a Web Attack

WIRED Threat Level

Using a technique called DNS rebinding, one amateur hacker found vulnerabilities in devices from Google, Roku, Sonos, and more.

Security 101
article thumbnail

Sidley Partner William Long Recognized by Best Lawyers 2019

Data Matters

Sidley Partner William RM Long has been recognized by Best Lawyers 2019 for Privacy & Data Protection Law in London. William is global co-leader of Sidley’s Privacy and Cybersecurity practice and also leads the EU data protection practice at Sidley. Recognition by Best Lawyers is based entirely on peer review. Best Lawyers ’ methodology is designed to capture, as accurately as possible, the consensus opinion of leading lawyers about the professional abilities of their colleagues within

Privacy 68
article thumbnail

Employees Suspended for Alleged Record Snooping

Data Breach Today

Tragic Case Spotlights Challenges in Detecting Insider Incidents A health system's decision to reportedly suspend about a dozen employees for apparently snooping at health records related to the tragic death of a co-worker spotlights the many challenges involved with preventing and detecting insider breaches.

150
150
article thumbnail

4 steps for running a machine learning pilot project

IBM Big Data Hub

Running a machine learning pilot project is a great early step on the road to full adoption. To get started, you’ll need to build a cross-functional team of business analysts, engineers, data scientists and key stakeholders. From there, the process looks a lot like the scientific method taught in school.

77
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Apple's Latest iOS 12 Feature Will Save Lives by Pushing Your Location to 911

WIRED Threat Level

Forget memoji. Apple's push to transmit instant, accurate locations during emergency calls will have a profound effect for first responders.

article thumbnail

GDPR Hates Santa

Hanzo Learning Center

Twitter can be a goldmine of fun stuff slanted a little bit off-center. It's always extra fulfilling when the twitterverse takes a break from the Kardashians to give us a good dose of compliance humor.

GDPR 75
article thumbnail

Analysis: Health Data Breach Tally Trends

Data Breach Today

Hacks, Unauthorized Access/Disclosure and Theft Incidents Top the List About three dozen major health data breaches have been added to the federal tally in recent weeks, including a mix of hacking and unauthorized access/disclosure incidents. Here's an analysis of the latest statistics and the reasons behind the trends.