Sat.Aug 14, 2021 - Fri.Aug 20, 2021

article thumbnail

What Are the Cyber Security Challenges of Hybrid Working?

IT Governance

When it comes to the ideal post-pandemic work environment, employers and employees and have very different ideas. According to a Microsoft study , 73% of workers want to keep the flexible work arrangements created in response to COVID-19, and 67% want a return to in-person collaboration.

Security 132
article thumbnail

Hard Drive Health & Data Security

Record Nations

Hard drive health and data security are very closely connected. A failing hard drive can pose a number of security risks to any business. It’s important to recognize the signs of a failing drive, as well as what can be done to make sure that the data within remains accessible. We spoke to the founder […]. The post Hard Drive Health & Data Security appeared first on Record Nations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Ready Are You for a Ransomware Attack?

Threatpost

Oliver Tavakoli, CTO at Vectra, lays out the different layers of ransomware defense all companies should implement.

article thumbnail

Wanted: Disgruntled Employees to Deploy Ransomware

Krebs on Security

Criminal hackers will try almost anything to get inside a profitable enterprise and secure a million-dollar payday from a ransomware infection. Apparently now that includes emailing employees directly and asking them to unleash the malware inside their employer’s network in exchange for a percentage of any ransom amount paid by the victim company.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Does Abandoning Embassy in Kabul Pose Cybersecurity Risks?

Data Breach Today

Security Experts Size Up Impact of US Rush to Leave Afghanistan It's unlikely that the U.S. abandoning its embassy and other facilities in Afghanistan poses cyber risks, thanks to the emergency planning that was already in place, some security experts say.

Risk 357

More Trending

article thumbnail

How to Eliminate Paper Processes

AIIM

Despite the proven operational improvements to be gain by going paperless, paper is still prevalent in too many core business processes today including loan applications, insurance claims, and customer onboarding. After last year's mad dash to accommodate distributed workers and work places, the reticence to digitize paper processes is decreasing. 70% of AIIM survey respondents indicate that they plan to expand their efforts to encourage and support more digitally-born documents this year.

Paper 213
article thumbnail

T-Mobile Investigating Claims of Massive Data Breach

Krebs on Security

Communications giant T-Mobile said today it is investigating the extent of a breach that hackers claim has exposed sensitive personal data on 100 million T-Mobile USA customers, in many cases including the name, Social Security number, address, date of birth, phone number, security PINs and details that uniquely identify each customer’s mobile device.

article thumbnail

Houdini Malware Used in New Way

Data Breach Today

Cato Networks: Malware Now Used to Spoof Devices Researchers at SASE platform provider Cato Networks say they have discovered a novel use of the Houdini malware for spoofing of devices.

352
352
article thumbnail

MY TAKE: What NortonLifeLock’s $8 billion buyout of Avast portends for consumer security

The Last Watchdog

So NortonLifeLock has acquired Avast for more than $8 billion. This deal reads like to the epilogue to a book titled The First 20 Years of the Supremely Lucrative Antivirus Market. Way back in 1990, Symantec acquired Norton Utilities and made Norton the heart of its antivirus subscription offering. Related: The coming of ubiquitous passwordless access.

Security 224
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How Well Does Your Information Strategy Align with Your Business Goals?

AIIM

In both our personal and professional lives, the amount of information we deal with on a daily basis is growing exponentially. At the same time, the variety of this information is evolving -- audio files, video files, and more. The cummulative effect? Information Chaos ! For many organizations, information is largely viewed as an achilles heel that must be tamed and controlled.

article thumbnail

T-Mobile: Breach Exposed SSN/DOB of 40M+ People

Krebs on Security

T-Mobile is warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. The acknowledgment came less than 48 hours after millions of the stolen T-Mobile customer records went up for sale in the cybercrime underground.

Passwords 310
article thumbnail

T-Mobile USA Investigates Possible Data Breach

Data Breach Today

Group Claims GGSN Misconfiguration Led to 100 Million User Accounts T-Mobile USA says it is investigating a claim that as many as 100 million accounts may have been compromised in a data breach. The person who claims responsibility for the alleged breach says T-Mobile misconfigured a Gateway GPRS Support Node.

article thumbnail

Apple’s NeuralHash Algorithm Has Been Reverse-Engineered

Schneier on Security

Apple’s NeuralHash algorithm — the one it’s using for client-side scanning on the iPhone — has been reverse-engineered. Turns out it was already in iOS 14.3, and someone noticed : Early tests show that it can tolerate image resizing and compression, but not cropping or rotations. We also have the first collision : two images that hash to the same value.

IT 145
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

1.9 million+ records from the FBI’s terrorist watchlist available online

Security Affairs

A security researcher discovered that a secret FBI’s terrorist watchlist was accidentally exposed on the internet for three weeks between July 19 and August 9, 2021. A security researcher Bob Diachenko discovered a secret terrorist watchlist with 1.9 million records that were exposed on the internet for three weeks between July 19 and August 9, 2021.

article thumbnail

Deep-Cryptanalysis - Fashion or Revolution?

Elie

This keynote discusses whether applying deep-learning to cryptanalysis will revolutionize the field or if it will go out of fashion in a few years due to the lack of breakthroughs.

IT 118
article thumbnail

Insurer Tokio Marine Hit by Ransomware

Data Breach Today

Firm Says Singapore Unit Was Targeted Tokio Marine, a Japan-based property and casualty insurer, says its Tokio Marine Insurance Singapore unit was hit by a ransomware attack this week.

Insurance 345
article thumbnail

T-Mobile Data Breach

Schneier on Security

It’s a big one : As first reported by Motherboard on Sunday, someone on the dark web claims to have obtained the data of 100 million from T-Mobile’s servers and is selling a portion of it on an underground forum for 6 bitcoin, about $280,000. The trove includes not only names, phone numbers, and physical addresses but also more sensitive data like social security numbers , driver’s license information, and IMEI numbers , unique identifiers tied to each mobile device.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hamburg’s data protection agency (DPA) states that using Zoom violates GDPR

Security Affairs

The German state’s data protection agency (DPA) warns that the use of the videoconferencing platform Zoom violates the European Union’s GDPR. The German state’s data protection agency (DPA) warns that the Senate Chancellory’s use of the popular videoconferencing tool violates the European Union’s General Data Protection Regulation (GDPR).

GDPR 142
article thumbnail

Deep-Cryptanalysis - Fashion or Revolution?

Elie

This keynote discusses whether applying deep-learning to cryptanalysis will revolutionize the field or if it will go out of fashion in a few years due to the lack of breakthroughs.

IT 118
article thumbnail

T-Mobile: Attackers Stole 8.6 Million Customers' Details

Data Breach Today

40 Million Credit Applications Also Stolen; Social Security Numbers Exposed T-Mobile USA has confirmed that its systems were breached and that details for 7.8 million current T-Mobile postpaid customers and 850,000 prepaid customers as well as records for 40 million individuals who applied for credit were stolen.

Security 332
article thumbnail

More on Apple’s iPhone Backdoor

Schneier on Security

In this post, I’ll collect links on Apple’s iPhone backdoor for scanning CSAM images. Previous links are here and here. Apple says that hash collisions in its CSAM detection system were expected, and not a concern. I’m not convinced that this secondary system was originally part of the design, since it wasn’t discussed in the original specification.

IT 141
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Adobe addresses two critical vulnerabilities in Photoshop

Security Affairs

Adobe has addressed two critical security vulnerabilities affecting its Photoshop image manipulation software. Ad obe released security updates to address two critical security vulnerabilities, tracked as CVE-2021-36065 and CVE-2021-36066, affecting the popular image manipulation software Photoshop. The flaws affect versions of the software for both Windows and macOS, their exploitation could lead to?

Security 126
article thumbnail

Phishing Costs Nearly Quadrupled Over 6 Years

Threatpost

Lost productivity & mopping up after the costly attacks that follow phishing – BEC & ransomware in particular – eat up most costs, not payouts to crooks.

Phishing 130
article thumbnail

Memorial Health System in Ohio Latest Entity Hit With Attack

Data Breach Today

Hospitals Diverting ER Patients to Other Area Facilities Memorial Health System in Ohio is the latest healthcare entity hit with an apparent ransomware incident that is disrupting patient care services.

article thumbnail

Tetris: Chinese Espionage Tool

Schneier on Security

I’m starting to see writings about a Chinese espionage tool that exploits website vulnerabilities to try and identify Chinese dissidents.

134
134
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

T-Mobile confirms data breach that exposed customer personal info

Security Affairs

T-Mobile confirms a breach after threat actors claimed to have obtained records of 100 million of its customers and offered them for sale. T-Mobile has confirmed a data breach that exposed personal information from over 100 million of its US customers. Yesterday the company announced it launched an investigation into a possible data breach after a threat actor published a post on a forum claiming to be selling the personal data of its customers.

article thumbnail

Bug in Millions of Flawed IoT Devices Lets Attackers Eavesdrop

Threatpost

A remote attacker could exploit a critical vulnerability to eavesdrop on live audio & video or take control. The bug is in ThroughTek’s Kalay network, used in 83m devices.

IoT 123
article thumbnail

T-Mobile Probes Attack, Confirms Systems Were Breached

Data Breach Today

Attackers Claim They Stole 36 Million Unique Customer Records T-Mobile USA has confirmed that attackers accessed its computer systems, but the mobile communications provider is still investigating whether customers' personal data was exposed. Cybercrime experts say the attackers apparently involved have been tied to previous telecommunications-targeting crime since at least 2018.