Sat.Dec 29, 2018 - Fri.Jan 04, 2019

article thumbnail

Tor Is Easier Than Ever. Time to Give It a Try

WIRED Threat Level

Been curious about Tor but worried it's too complicated to use? Good news: The anonymity service is more accessible than ever.

IT 109
article thumbnail

Apple Phone Phishing Scams Getting Better

Krebs on Security

A new phone-based phishing scam that spoofs Apple Inc. is likely to fool quite a few people. It starts with an automated call that display’s Apple’s logo, address and real phone number, warning about a data breach at the company. The scary part is that if the recipient is an iPhone user who then requests a call back from Apple’s legitimate customer support Web page, the fake call gets indexed in the iPhone’s “recent calls” list as a previous call from the legi

Phishing 278
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 4 stages of cyber resilience

IT Governance

Until recently, organisations often spent almost all of their information security budget on prevention, effectively taking an all-or-nothing approach to the threat of data breaches. They either repelled the attack or faced the consequences head-on. However, with data breaches becoming more common and varied, organisations have realised that it’s impossible to eradicate every risk.

article thumbnail

Hackers Leak Hundreds of German Politicians' Personal Data

Data Breach Today

Chancellor Angela Merkel Among the Victims of Massive Hack Attack and Data Leak Hundreds of members of the German parliament, Chancellor Angela Merkel as well as numerous local celebrities have had their personal details and communications stolen and leaked online as part of what authorities are calling an attack on the country's democracy and institutions.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Perspective Check – Anticipation 2019

Weissman's World

It’s 2019, and Steve Weissman anticipates and addresses a number of key themes for the new year: 0:44 – Metadata and database fields: ‘labels’ as the keys to … everything! 1:38 – AI and machine learning: not the same things, no matter what the marketing says 3:24 – RPA: simply workflow by another name? 4:08 […]. The post Perspective Check – Anticipation 2019 appeared first on Holly Group.

Metadata 166

More Trending

article thumbnail

Connecting the dots between security intentions and actions -- Infographic

AIIM

On average, organizations believe the volume of information will grow from X to 4.2X. This explosive growth translates into a rising ride of chaos. 75% of organizations see information chaos as a major problem for their organization. As a result, there is a core instability in information management practices in most organizations. 92% of organizations believe that something needs to change and that they must modernize their information management strategy.

article thumbnail

Stop the Presses: Don't Rush Tribune Ransomware Attribution

Data Breach Today

Nation States and Cybercrime Gangs Keep Blurring; Tools Alone Don't Equal Actors Don't rush to blame the printing outage at newspapers owned by Tribune Publishing on anything more than an organization failing to block a malware outbreak. And even if it does prove to be a Ryuk ransomware attack, there's no proof yet that any particular nation state is behind the campaign, experts warn.

article thumbnail

6 tools to help you prevent and respond to data breaches

IT Governance

There are few things organisations fear more than data breaches. They cause immediate delays, are expensive and could lead to long-term reputational damage. The stakes were raised with the enforcement of the EU GDPR (General Data Protection Regulation) in May 2018. It demands adequate security measures and has been widely publicised, as it has the potential to levy large fines against non-compliant organisations.

article thumbnail

Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack

Krebs on Security

Cloud hosting provider Dataresolution.net is struggling to bring its systems back online after suffering a ransomware infestation on Christmas Eve, KrebsOnSecurity has learned. The company says its systems were hit by the Ryuk ransomware, the same malware strain that crippled printing and delivery operations for multiple major U.S. newspapers over the weekend.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CNIL Publishes Guidance on Data Sharing with Business Partners or Data Brokers

Hunton Privacy

On December 28, 2018, the French Data Protection Authority (the “CNIL”) published guidance regarding the conditions to be met by organizations in order to lawfully share personal data with business partners or other third parties, such as data brokers. The guidance focused, in particular, on such a scenario in the context of the EU General Data Protection Regulation (“GDPR”).

article thumbnail

Suspected Ransomware Outbreak Disrupts US Newspapers

Data Breach Today

Tribune Media Suspects Ryuk Ransomware Hit Publishing and Production Systems Production of newspapers owned by Chicago-based Tribune Publishing have been disrupted after malware began infecting the company's publishing and printing systems. Tribune newspapers report that they appear to have been hit by crypto-locking Ryuk ransomware.

article thumbnail

Start 2019 on the Right Foot With These Tips

AIIM

In today's digital world, the chance of information-related security breaches is high. Is your company's data security plan up to date and bullet proof? Don't leave your information assets at risk. It's time to take action! I invite you to join us for a free webinar on Wednesday, January 16th @ 2pm EST. AIIM Chief Evangelist, John Mancini, is sharing top tips to help your organization: Understand the unique challenges posed by “unstructured” information and content.

article thumbnail

wget utility potential leaked password via extended filesystem attributes

Security Affairs

Developers that include the GNU’s wget utility in their applications have to use the new version that was released on Boxing Day. GNU Wget is a free software package for retrieving files using HTTP, HTTPS, FTP and FTPS the most widely-used Internet protocols. It is a non-interactive commandline tool, so it may easily be called from scripts, cron jobs, terminals without X-Windows support, etc.

Passwords 101
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Installing OSSEC on Linux Distributions

PerezBox

The last few posts have been about deploying and configuring OSSEC as an important tool in your security suite. In this article I will provide you a script I wrote. Read More. The post Installing OSSEC on Linux Distributions appeared first on PerezBox.

article thumbnail

2018 Health Data Breach Tally: An Analysis

Data Breach Today

Hacking Incidents Still Dominate, But Fewer Huge Incidents Than in Years Past Major health data breaches added to the official federal tally in 2018 impacted more than twice as many individuals as the incidents added to the list 2017. But the 2018 victim total was far less than in 2016 and 2015, when the healthcare sector was hit with a string of huge cyberattacks.

article thumbnail

The Servant Leader, Team Doctor, Technically-Comfortable Agile Project Manager

AIIM

“Ideas are a commodity. Execution of them is not”- Michael Dell. In our series, we have been looking at this digital age and how technology is changing the roles and functions of traditional project positions and causing them to evolve into the positions that they were always supposed to be. Our second article focused on the role of the project sponsor.

article thumbnail

‘Roma225’ campaign targets companies in the Italian automotive sector

Security Affairs

‘Roma225’ campaign -The Cybaze-Yoroi ZLab researchers investigated a recent espionage malware implant weaponized to target companies in the Italian automotive sector. The malware was spread through well-written phishing email trying to impersonate a senior partner of one of the major Brazilian business law firms: “ Veirano Advogados ”. The malicious email intercepted during the CSDC operations contains a PowerPoint add-in document (“.ppa ” extension), armed with auto-open VBA macro c

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Redefining Critical Infrastructure for the Age of Disinformation

Dark Reading

In an era of tighter privacy laws, it's important to create an online environment that uses threat intelligence productively to defeat disinformation campaigns and bolster democracy.

Privacy 82
article thumbnail

Microsoft's Top 3 Cybersecurity Concerns for 2019

Data Breach Today

With an operating system that's used by 90 percent of Fortune 500 companies, Microsoft closely monitors cyberattack trends. Joram Borenstein, general manager of Microsoft's Cybersecurity Solutions Group, discusses his top three concerns for 2019.

article thumbnail

Dual Data Leaks of Blur, Town of Salem Impact Millions

Threatpost

Password-manager Blur and role-playing game Town of Salem both disclosed data breaches this week that impacted a combined 10 million.

article thumbnail

Facebook tracks non-users via Android Apps

Security Affairs

New thunderclouds on Facebook, the social network giant is accused of tracking non-users via Android apps. According to a report presented by Privacy International yesterday at 35C3 hacking conference held in Germany, the list of Android apps that send tracking and personal information back to Facebook includes dozens of apps including Kayak , Yelp, and Shazam , “Facebook routinely tracks users, non-users and logged-out users outside its platform through Facebook Business Tools.

Privacy 98
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Top 3 trends leading to multicloud adoption

IBM Big Data Hub

Martec's law states, “Technology changes exponentially; organizations change logarithmically.” Translation? Technology will accelerate faster than companies can adapt to increasing data growth and adopt new business models.

81
article thumbnail

HHS Publishes Guide to Cybersecurity Best Practices

Data Breach Today

Co-Developed with Healthcare Sector Coordinating Council, Designed for Organizations of All Sizes With the aim of helping healthcare entities of all sizes improve their cybersecurity, the Department of Health and Human Services has issued a four-volume publication of voluntary best practices. Experts weigh in on whether it will prove helpful, especially for smaller organizations.

article thumbnail

Managing Security in Today's Compliance and Regulatory Environment

Dark Reading

Instead of losing sight of the cybersecurity forest as we navigate the compliance trees, consolidate and simplify regulatory compliance efforts to keep your eyes on the security prize.

article thumbnail

EU launches bug bounty programs for 15 software

Security Affairs

The European Commission decided to launch its bug bounty initiative, the Free and Open Source Software Audit (FOSSA) project. Bug bounty programs are very important for the security of software and hardware, major tech firms launched their own programs to discover flaws before hackers. The European Commission recognized the importance of bug bounty programs and decided to launch its bug bounty initiative, the Free and Open Source Software Audit (FOSSA) project.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

China's APT10

Schneier on Security

Wired has an excellent article on China's APT10 hacking group. Specifically, on how they hacked managed service providers in order to get to their customers' networks. I am reminded of the NSA's " I Hunt Sysadmins " presentation, published by the Intercept.

79
article thumbnail

Why Mastercard Launched a 'Fusion Center' for Security

Data Breach Today

Mastercard has launched a "fusion center" designed to increase its speed of response and coordination among departments in the event of a cyberattack, says CSO Ron Green, who explains the initiative.

Security 180
article thumbnail

Marriott Sheds New Light on Massive Breach

Dark Reading

New information on the Starwood breach shows that the overall breach was somewhat smaller than originally announced, but the news for passport holders is worse.

83