Sat.Dec 16, 2017 - Fri.Dec 22, 2017

article thumbnail

Lazarus Hackers Phish For Bitcoins, Researchers Warn

Data Breach Today

Bitcoin Exchange Job Lure Traces to Hackers Tied to North Korea Bitcoin-seeking phishing attacks have been trying to socially engineer would-be cryptocurrency exchange executives, warn researchers at Secureworks. The attacks use Word documents with malicious macros and control code previously seen in attacks launched by the Lazarus Group, which has been tied to North Korea.

Phishing 162
article thumbnail

Predictions 2018: 5 trends driving the IoT and IIoT

Information Management Resources

Adoption of the Internet of things and the Industrial Internet of Things show no signs of slowing down. If anything, adoption and implementations will only increase.

IoT 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Best Christmas Ads on Social Media of All Time; Get Festive!

Data Matters

It’s the holiday season once again and brands are launching their campaigns for the occasion. Here are some of the best Christmas ads and campaigns on social media that you can take inspiration from for your own promotions. Best Christmas ads on Twitter: Marks & Spencer “Two Fairies” Magic was the theme of British clothing […]. The post The Best Christmas Ads on Social Media of All Time; Get Festive!

Marketing 100
article thumbnail

31 Letters to Santa from ECM Users

AIIM

We Want Simplicity, Commitment, Strategy, and Solutions. This time of year, if you start a Google search with the words “funny letters,” Google will immediately complete the phrase with “funny letters to Santa.”. So for those of you who are hanging in there and thinking about content management in the shrinking shopping days before the holidays, here is your reward – a few nuggets that pop up in the “funny letters to Santa” search stream.

ECM 83
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Teen Hacker Avoids Jail Over On-Demand DDoS Attacks

Data Breach Today

Student Disrupted Amazon, NatWest, Netflix for vDOS 'Stresser' Service Users A British teenager has avoided jail time after pleading guilty to thousands of DDoS disruptions against Amazon, Netflix, NatWest Bank and others. Separately, a U.S. man has pleaded guilty to launching DDoS attacks on behalf of Lizard Squad and PoodleCorp, among other offenses.

140
140

More Trending

article thumbnail

Northern District of California Enjoins LinkedIn from Preventing Scraping of Public User Profiles

Data Matters

In a decision that may have profound implications for social media companies, the big data industry and website terms of use everywhere, Judge Edward Chen of the Northern District of California granted hiQ Labs’ motion for preliminary injunction on August 14, 2017, enjoining LinkedIn from “preventing hiQ’s access, copying, or use of public profiles on LinkedIn’s website.” hiQ Labs, Inc. v.

article thumbnail

In 'Star Wars: The Last Jedi', the Resistance Keeps Making the Same Tactical Mistake

WIRED Threat Level

The urge to fight one decisive battle has undone countless real-world rebellions—and those in the Star Wars universe as well.

Security 109
article thumbnail

HHS Attempts to Clear Up HIPAA Confusion on PHI Release

Data Breach Today

Online Resources Clarify When Patient Info Can Be Shared With Families, Caregivers Federal regulators have set up online resources to help healthcare providers as well as consumers navigate circumstances under which HIPAA permits a covered entity to disclose mental health or substance abuse information to a patient's family members and caregivers.

113
113
article thumbnail

Top 8 Cybersecurity Skills IT Pros Need in 2018

Dark Reading

Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.

IT 103
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Top 10 IBM Big Data & Analytics Hub podcasts of 2017

IBM Big Data Hub

It can be difficult to keep up with all the best podcast episodes during the year. That's why we've compiled the Top 10 podcasts of the year from the IBM Big Data & Analytics Hub Insights Podcast feed right here.

article thumbnail

Snowden-Backed App 'Haven' Turns Your Phone Into a Home Security System

WIRED Threat Level

The NSA leaker's latest project aims to secure your computer—and you—from not just digital but physical attacks.

Security 112
article thumbnail

Kaspersky Lab Sues US Government Over Ban

Data Breach Today

Federal Software Ban Violates Due Process, Anti-Virus Firm Alleges Kaspersky Lab has sued the U.S. Department of Homeland Security for issuing an order that bans the Moscow-based anti-virus firm's software from being used on federal systems, saying DHS violated the company's right to respond to the allegations against it.

article thumbnail

Securing the future of payments – what does 2018 have in store?

Thales Cloud Protection & Licensing

Thanks to heightened consumer confidence, a rise in proximity payments adoption and ongoing developments in biometrics, the payments industry continued to undergo digital transformation throughout 2017. We’re now seeing big data play an increasing role in how retail sales and payments are being tailored to individual consumer’s preferences, and providers are adopting and integrating smarter, more efficient ways of completing the path-to-purchase.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Fixing Data Breaches Part 3: The Ease of Disclosure

Troy Hunt

This week, I've been writing up my 5-part guide on "Fixing Data Breaches" On Monday I talked about the value of education ; let's try and stop the breach from happening in the first place. Then yesterday it was all about reducing the impact of a breach , namely by collecting a lot less data in the first place then recognising that it belongs to the person who provided it and treating with the appropriate respect.

article thumbnail

Facebook use of third-party apps 'violates data protection principles'

The Guardian Data Protection

German watchdog accuses site of merging data from WhatsApp and Instagram into users’ Facebook accounts without consent Germany’s competition authority has accused Facebook of abusing its dominant market position to improperly amass third-party data on its users. A statement released on Tuesday criticised the world’s largest social media site for collecting data via Facebook-owned services, such as WhatsApp or Instagram, and then absorbing it into users’ Facebook accounts.

article thumbnail

Bankrupt Cancer Clinic Chain's Insurer to Cover Breach Fine

Data Breach Today

21st Century Oncology Faces More Than $29 Million in Penalties in Two Settlements In an usual move, federal regulators have made arrangements to have a cyber insurer cover a $2.3 million HIPAA penalty on behalf of a bankrupt cancer care clinic chain, 21st Century Oncology, which also signed false claims settlements totaling $26 million.

Insurance 100
article thumbnail

Don't Gift an Internet-Connected Toy This Holiday

WIRED Threat Level

They can be hacked. They're a privacy nightmare. This year, it's not too late to keep the IoT toys away from the tree.

IoT 106
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The damaging after-effects of a data breach

IT Governance

With the number of data breaches increasing every year, they are now a huge issue for organisations. 46% of all UK businesses identified at least one cyber breach in the past 12 months and it’s been predicted that a quarter of the world’s population will have been affected by a data breach by 2020. It should be obvious that it’s a priority for companies to learn how to keep data secure.

article thumbnail

France orders WhatsApp to stop sharing user data with Facebook without consent

The Guardian Data Protection

Messaging app has one month to comply or it will face sanctions for sharing user phone numbers and usage data for ‘business intelligence’ purposes WhatsApp has been ordered to stop sharing user data with parent company Facebook or face sanctions. The French data protection agency, Commission Nationale de l’Informatique et des Libertés (CNIL), said on Monday that WhatsApp did not have a legal basis to share user data under French law for “business intelligence” purposes.

GDPR 86
article thumbnail

Forensic research awards highlight the difficulty of digital privacy

OpenText Information Management

At OpenText, we talk often about digital transformation. Technology makes businesses more competitive, opens access to information and provides new opportunities for everyone. Unfortunately, it also creates new vehicles for hackers, scammers and criminals. To effectively stop hackers, prosecute criminals and uncover wrongdoing – investigators must understand what happens on digital devices and networks via … The post Forensic research awards highlight the difficulty of digital privacy appe

article thumbnail

Influencers assess 2017 and make predictions for 2018

IBM Big Data Hub

As the year winds down, questions tend to arise about what the big trends of the past year have been and what the year to come may hold.

96
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Hold North Korea Accountable for WannaCry—and the NSA, Too

WIRED Threat Level

As the US government points the finger at North Korea for the WannaCry ransomware epidemic, it also needs to acknowledge the role of its leaked hacking tools.

article thumbnail

[Video] Offsite Document Storage Facilities

Record Nations

Video Transcription Offsite Storage: Starting Off the Process More businesses are shifting towards paperless management, but between retention laws and the reality that there are some files businesses need to keep but rarely reference, it’s often cheaper to keep these records as hard-copies instead of spending the money to scan them instead. On average, storing […].

81
article thumbnail

Spreading OpenText cheer: Germany

OpenText Information Management

The holidays are fast approaching and our colleagues are starting to get festive in their offices around the world! In this post, OpenText employee, Nadja Trützschler, shares her favourite customs and traditions that take place in Oldenburg during the holidays. What’s it like in Germany over the holiday season? Drizzle, rain, fog, and gray skies … The post Spreading OpenText cheer: Germany appeared first on OpenText Blogs.

IT 80
article thumbnail

Interactive: What Does It Really Mean?

The Texas Record

Merriam-Webster ’s online dictionary defines “interactive” as, “involving the actions or input of a user.” When you stop to think about it, that’s not very clear. So, is eLearning with nothing but a next button interactive? The learner clicks something. Is a choose your own adventure book interactive? The reader picks which page to turn to. Let’s dive into this.

IT 75
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Established and emerging technologies to watch out for in 2018

Thales Cloud Protection & Licensing

As 2017 draws to a close, the trends and innovations that will shape the technology industry over the coming weeks, months and years were brought into sharper focus over the course of the last twelve months. Cloud computing has gone mainstream for many enterprises, and the Internet of Things (IoT) is changing how both industrial and consumer-oriented companies do business.

article thumbnail

Researchers Made Google's Image Recognition AI Mistake a Rifle For a Helicopter

WIRED Threat Level

To safeguard AI, we’re going to need to solve the problem of ‘adversarial examples.’.

Security 108
article thumbnail

OpenText Business Network – top ten supply chain predictions for 2018

OpenText Information Management

As 2017 sails into the sunset it’s that time of year when analysts around the world release their predictions for the following year. I thought it would be interesting to pull together a set of supply chain related predictions from the OpenText™ Business Network product marketing team. Trying to predict what will happen in 2018 is … The post OpenText Business Network – top ten supply chain predictions for 2018 appeared first on OpenText Blogs.