Sat.Mar 17, 2018 - Fri.Mar 23, 2018

article thumbnail

Expedia's Orbitz Suspects 880,000 Payment Cards Stolen

Data Breach Today

Hacker May Have Also Obtained Other Customer Data in Breach, Orbitz Warns Expedia's Orbitz travel fare search engine says it may have suffered a breach that resulted in 880,000 payment cards being compromised, along with other customer data, over a two-year period. Orbitz says the apparent breach involved a legacy system no longer connected to its site.

IT 182
article thumbnail

Facebook: is it time we all deleted our accounts?

The Guardian Data Protection

The Cambridge Analytica revelations may be the final nudge we need to turn away from the social network. And it’s only the tip of the iceberg when it comes to big tech harvesting private information Sorry to break it to you, but you are probably a “dumb f**k”. This is according to statements by a young Mark Zuckerberg anyway. Back in 2004, when a 19-year-old Zuckerberg had just started building Facebook, he sent his Harvard friends a series of instant messages in which he marvelled at the fact t

IT 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Analytics and Human Heuristics: How to Avoid Making Poor Decisions

Bill Schmarzo - Dell EMC

The “hot hand,” a metaphor applied frequently to the game of basketball, is the idea that a basketball shooter, after making several consecutive shots, will experience a higher than normal success rate on his or her ensuing shots. I discussed the “hot hand” concept, and its flaw, at a TDWI (The Data Warehouse Institute) conference many years ago. Figure 1: “The Hot Hand in Basketball” by Thomas Gilovich, Robert Vallone and Amos Tversky.

Analytics 111
article thumbnail

Whatever the future of payments, you can trust in a lack of trust

Thales Cloud Protection & Licensing

This blog was originally published on Business Reporter. To view the article, please click here. To see where the future of payments lies, we should look to its past. The concept of payment, at its most fundamental, is simply about people agreeing to exchange goods or services. A fair trade of one thing for another. Go back a few thousand years and the invention of money meant that food could be effectively turned into metal and stored for as long as needed, before being turned back into food ag

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Facebook and Cambridge Analytica: Data Scandal Intensifies

Data Breach Today

US, UK and Canada Have Begun Probing Data Leak and Privacy Repercussions Regulators, attorneys general and lawmakers in the U.S., U.K. and Canada are attempting to unravel the events that led to the personal information for upwards of 60 million Facebook users leaking to a London-based voter-profiling firm.

Privacy 178

More Trending

article thumbnail

How modern RIM professionals are staying relevant – Part 1

TAB OnRecord

Many RIM professionals that we speak with struggle to obtain budget and attention within the organization. Why? One of the reasons is that RIM has traditionally been seen as a cost center: an expense to be minimized, rather than a value-add or investment. When this mindset prevails among top executives, RIM professionals can struggle to [.] Read More.

article thumbnail

Cambridge Analytica Execs Caught Discussing Extortion and Fake News

WIRED Threat Level

In undercover videos filmed by Britain’s Channel 4 news, Cambridge Analytica executives appear to offer up various unsavory tactics to influence campaigns.

Security 110
article thumbnail

Facebook Attempts to Explain Data Leak, Denies 'Breach'

Data Breach Today

Political Data-Mining Firm Reportedly Obtained 50 Million Users' Private Details Facebook is under fire after reports suggested data-mining firm Cambridge Analytica obtained private information for 50 million Facebook users. The social network contends that it didn't suffer a "breach," as the information was legally obtained but subsequently misused.

Mining 172
article thumbnail

UK officials seek warrant to enter Cambridge Analytica HQ

The Guardian Data Protection

Information commissioner demands access to data and orders Facebook to halt audit The information commissioner is seeking an urgent court warrant to enter the London headquarters of the elections consultancy Cambridge Analytica after the firm was caught in an undercover sting boasting about entrapping politicians , using honey traps and running fake news campaigns.

Analytics 111
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Success Criteria for Managing Permanent Electronic Records

National Archives Records Express

I am pleased to announce the publication of the Criteria for Successfully Managing Permanent Electronic Records. The guidance supports the Managing Government Records Directive (M-12-18), which states “By December 31, 2019, all permanent electronic records in Federal agencies will be managed electronically to the fullest extent possible for eventual transfer and accessioning by NARA in an electronic format.”.

article thumbnail

Facebook Privacy Settings: A Complete Guide to Making Your Account More Secure

WIRED Threat Level

Despite the repeated privacy lapses, Facebook offers a fairly robust set of tools to control who knows what about you.

Privacy 111
article thumbnail

The Financial Fallout From Data Breaches

Data Breach Today

Banner Health Follows Nuance, Merck in Reporting Details About the Impact Recent financial reports from three healthcare sector organizations that suffered cyberattacks demonstrate how costly data breaches can be for not-for-profit healthcare providers and for-profit companies alike.

article thumbnail

No one can pretend Facebook is just harmless fun anymore | Ellie Mae O’Hagan

The Guardian Data Protection

From its stance on extremist content, to its vast caches of user data, Facebook is a corporation whose power must, finally, be reined in The revelation that Cambridge Analytica exploited the data of 50 million Facebook profiles to target American voters is indeed frightening. But Cambridge Analytica shouldn’t act as a diversion from the real bad guy in this story: Facebook.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Web Conference Report: “Deploying Containers in the Age of GDPR”

Thales Cloud Protection & Licensing

I was fortunate to be one of the presenters at SecureWorld’s recent web conference on “ Deploying Containers in the Age of GDPR.” I suggest you check it out. Here is a taste of what we discussed. A real-time poll of webinar participants asked how ready they think their organizations are for the GDPR deadline of May 25, 2018. It indicated 40% “are doing everything they know about and should be pretty much there.

GDPR 83
article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This post provides an in-depth analysis of the inner workings of Gooligan, the infamous Android OAuth stealing botnet. This is the second post of a series dedicated to the hunt and takedown of Gooligan that we did at Google, in collaboration with Check Point, in November 2016. The. first post. recounts Gooligan’s origin story and provides an overview of how it works.

article thumbnail

Atlanta Ransomware Attack Freezes City Business

Data Breach Today

Damage Assessment Is Underway, But Backups Are in Place, Officials Say Ransomware has struck the city of Atlanta and frozen internal and customer-facing applications, hampering residents from paying bills or accessing court information. But the city says it has working backups and expects to pay employees on time.

article thumbnail

Cambridge Analytica and Facebook accused of misleading MPs over data breach

The Guardian Data Protection

Call for Facebook boss Mark Zuckerberg to testify before parliamentary committee The head of the parliamentary committee investigating fake news has accused Cambridge Analytica and Facebook of misleading MPs in testimony, after the Observer revealed details of a vast data breach affecting tens of millions of people. After a whistleblower detailed the harvesting of more than 50 million Facebook profiles for Cambridge Analytica, Damian Collins, the chair of the House of Commons culture, media and

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Artificial intelligence in cyber security

IT Governance

Cyber security has become a major priority for every organisation. The right controls and procedures must be put in place to detect potential attacks and protect against them. However, with the risk of a cyber attack increasing every year, how can you keep up with the ever-evolving threats? What is Artificial Intelligence? Artificial intelligence (AI) is the creation of intelligent machines that can learn from experience, allowing them to work and react as a human would.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This post provides an in-depth analysis of the inner workings of Gooligan, the infamous Android OAuth stealing botnet. This is the second post of a series dedicated to the hunt and takedown of Gooligan that we did at Google, in collaboration with Check Point, in November 2016. The. first post. recounts Gooligan’s origin story and provides an overview of how it works.

article thumbnail

Sizing Up Crypto Wallet Vulnerabilities

Data Breach Today

Al Pascual of Javelin Strategy and Research discusses a new report that shows that while crypto wallets may be considered to be at the sharp end of payments innovation, the security vulnerabilities they face are much the same as those that already exist in digital banking and payments.

Security 147
article thumbnail

The Cambridge Analytica saga is a scandal of Facebook’s own making | John Harris

The Guardian Data Protection

This mess was inevitable. Facebook has worked tirelessly to gather as much data on users as it could – and to profit from it Big corporate scandals tend not to come completely out of the blue. As with politicians, accident-prone companies rarely become that way by accident, and a spectacular crisis can often arrive at the end of a long spell of bad decisions and confidence curdling into hubris.

Mining 111
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

4 reasons why phishing is so successful

IT Governance

Phishing attacks are on the rise, evolving in variety and sophistication and threatening email security. An IRONSCALES report has revealed that 90–95% of all successful cyber attacks begin with a phishing email. Why is phishing so popular among fraudsters, and why are they so successful? 1. Users are the weak link in the chain. According to the report, phishers are adept at exploiting ignorance, negligence and human nature.

article thumbnail

Facebook's Privacy and Transparency Failings Are Still a Serious Problem

WIRED Threat Level

You give Facebook all of your data in exchange for using their service—an exchange that seems increasingly out of whack.

Privacy 103
article thumbnail

The Growing Threat from Multi-Vector DDoS Attacks

Data Breach Today

Multivector distributed denial-of-service attacks are having a bigger impact than simple volumetric attacks, says Brian McCann, president of Netscout's security business unit, who analyzes the latest trends in an in-depth interview.

Security 138
article thumbnail

The Facebook breach makes it clear: data must be regulated

The Guardian Data Protection

Companies use our personal information to enrich themselves. Regulation of this practice is long overdue The Observer reported on Saturday that Cambridge Analytica acquired 50 million Facebook profiles from a researcher in 2014. This appears to have been among the most consequential data breaches in history, with an impact that may rival the breach of financial records from Equifax.

IT 107
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Traditional records management isn’t working for government – or anybody else

OpenText Information Management

Government agencies at all levels are realizing traditional records management practices are insufficient and ineffective in a digital world. Why? Digital—and increasingly mobile—citizens are driving the digital transformation of government by demanding new levels of information-based interaction and service More information is being generated by more processes—and it’s often sitting isolated in siloes and repositories … The post Traditional records management isn’t working for government

article thumbnail

DOJ Indicts 9 Iranians For Brazen University Cyberattacks

WIRED Threat Level

A new indictment asserts a long string of attacks against hundreds of universities and private companies, in which Iran pilfered more than $3 billion worth of intellectual property.

article thumbnail

DHS: Some GE Imaging Devices Are Vulnerable

Data Breach Today

Alert: Hackers Can Potentially Exploit Hardcoded and Default Credentials A recent alert from the Department of Homeland Security warning of vulnerabilities in certain medical imaging products from GE Healthcare is a reminder to other medical device makers and healthcare entities about the risks posed by hardcoded and default credentials.

Risk 138