Linux Malware Targets VoIP Networks to Steal Metadata

Data Breach Today

CDRThief' Malware Appears Designed for Espionage or Fraud A recently uncovered Linux malware variant dubbed "CDRThief" is targeting VoIP networks to steal phone metadata, such as caller IP addresses, ESET reports.

Very Meta … Unlocking Data’s Potential with Metadata Management Solutions

erwin

While there has been a lot of talk about big data over the years, the real hero in unlocking the value of enterprise data is metadata , or the data about the data. And to truly understand it , you need to be able to create and sustain an enterprise-wide view of and easy access to underlying metadata. Metadata Is the Heart of Data Intelligence. Harvesting data – Automate the collection of metadata from various data management silos and consolidate it into a single source.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Identifying People by Metadata

Schneier on Security

Interesting research: " You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information ," by Beatrice Perez, Mirco Musolesi, and Gianluca Stringhini. Yet, surprisingly, metadata are often still categorized as non-sensitive.

How Metadata Makes Data Meaningful

erwin

Metadata is an important part of data governance, and as a result, most nascent data governance programs are rife with project plans for assessing and documenting metadata. But are these rampant and often uncontrolled projects to collect metadata properly motivated?

Unsecured Database Leaves 8.4TB of Email Metadata Exposed

Data Breach Today

Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4TB of email metadata. While it's not clear if anyone accessed the data, an attacker could have seen all email being sent or received by a specific person

Unsecured Database Leaves 8.4 TB of Email Metadata Exposed

Data Breach Today

TB of email metadata. Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4 While it's not clear if anyone accessed the data, an attacker could have seen all email being sent or received by a specific person

How Metadata Makes Data Meaningful

erwin

Metadata is an important part of data governance, and as a result, most nascent data governance programs are rife with project plans for assessing and documenting metadata. But are these rampant and often uncontrolled projects to collect metadata properly motivated?

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

CDRThief specifically targets internal MySQL databases running in the devices to steal call metadata, including IP addresses of the callers, phone numbers, start time and duration of the call, call route, and call type.

Evaluating the NSA's Telephony Metadata Program

Schneier on Security

Interesting analysis: " Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended? " Abstract: The telephony metadata program which was authorized under Section 215 of the PATRIOT Act, remains one of the most controversial programs launched by the U.S. academicpapers fisa metadata nationalsecuritypolicy nsa phones terrorism

Metadata Management, Data Governance and Automation

erwin

And this time, you guessed it – we’re focusing on data automation and how it could impact metadata management and data governance. The post Metadata Management, Data Governance and Automation appeared first on erwin, Inc. Can the 80/20 Rule Be Reversed? erwin released its State of Data Governance Report in February 2018, just a few months before the General Data Protection Regulation (GDPR) took effect.

Newly Declassified Study Demonstrates Uselessness of NSA's Phone Metadata Program

Schneier on Security

The New York Times is reporting on the NSA's phone metadata program, which the NSA shut down last year: A National Security Agency system that analyzed logs of Americans' domestic phone calls and text messages cost $100 million from 2015 to 2019, but yielded only a single significant investigation, according to a newly declassified study. intelligence metadata nationalsecuritypolicy nsa phones

Crooks hide e-skimmer code in favicon EXIF Metadata

Security Affairs

Malwarebytes experts observed crooks hiding a software skimmer in the EXIF metadata of an image that was surreptitiously loaded by compromised online stores. While investigating a Magecart attack, experts found an e-skimmer code hidden in the EXIF metadata of an image file and surreptitiously loaded by compromised online stores. The attackers loaded the e-skimmer from the ‘Copyright’ field in the metadata of this image.

Revenge of the Metadata Nerds

AIIM

A variety of Nick Burns characters have also long lectured on the importance of metadata. Metadata is another area in which we’ve all had unrealistic expectations that users would help us with this key task. I’m John Mancini, and I have neglected my metadata responsibilities.

Data Governance and Metadata Management: You Can’t Have One Without the Other

erwin

When an organization’s data governance and metadata management programs work in harmony, then everything is easier. Creating and sustaining an enterprise-wide view of and easy access to underlying metadata is also a tall order. Metadata Management Takes Time. What Is Metadata?

How Network Metadata Can Transform Compromise Assessment

Dark Reading

Listen more closely and your network's metadata will surrender insights the bad guys counted on keeping secret

Metadata Best Practices

IG Guru

Metadata is structured data about data, information that facilitates the management and use of other information. The function of metadata is to provide your users with a standardized means for access to digitized materials. However, it is not enough to use just any metadata standard. The post Metadata Best Practices appeared first on IG GURU. Archives IG News Information Governance Records Management Risk News Margot Note metadata

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

CDRThief specifically targets internal MySQL databases running in the devices to steal call metadata, including IP addresses of the callers, phone numbers, start time and duration of the call, call route, and call type.

Facebook Faces New Uproar: Call and SMS Metadata

Data Breach Today

Users Surprised By Metadata Collection, But Facebook Says It Always Asked Facebook is facing a new controversy after some users say they've found records of phone calls and text messages in their personal files, but claim they never granted the social networking site permission to collect the data

Four Use Cases Proving the Benefits of Metadata-Driven Automation

erwin

Organization’s cannot hope to make the most out of a data-driven strategy, without at least some degree of metadata-driven automation. By implementing metadata-driven automation, organizations across industry can unleash the talents of their highly skilled, well paid data pros to focus on finding the goods: actionable insights that will fuel the business. Metadata-Driven Automation in the BFSI Industry. Metadata-Driven Automation in the Pharmaceutical Industry.

Collection of Metadata -- as Done by the NSA -- Likely Unconstitutional, US Court Suggests

Dark Reading

A ruling in an appeal by four men convicted of material support for terrorism finds that the National Security Agency's metadata collection program not only violated the prevailing law at the time but was also likely unconstitutional

Metadata for Archival Collections: Challenges and Opportunities

IG Guru

Metadata is one of the significant costs of digitization. Although archival items can be digitized without cataloging, a digital collection cannot be created and delivered without metadata. Providing sufficient metadata promptly for the abundance of digital resources can create a bottleneck in a workflow. Creating and maintaining metadata about objects—and in particular digital information objects—is […].

erwin Recognized as a March 2020 Gartner Peer Insights Customers’ Choice for Metadata Management Solutions

erwin

We’re excited about our recognition as a March 2020 Gartner Peer Insights Customers’ Choice for Metadata Management Solutions. Metadata management is key to sustainable data governance and any other organizational effort that is data-driven.

Metadata Requirements for Permanent Electronic Records in the Cloud

National Archives Records Express

If you have Federal records in the cloud, additional metadata might need to be applied to maintain relational links between records stored in the cloud and in local storage. You should assess metadata requirements before records are transferred to or created in the cloud. Also, the contract between the agency and the cloud service provider should include minimum metadata requirements. General cloud cloud computing electronic records management metadata

Top 7 Data Governance and Metadata Management Blog Posts of 2019

erwin

To help you prepare for 2020, we’ve compiled some of the most popular data governance and metadata management blog posts from the erwin Experts from this year. The Best Data Governance and Metadata Management Blog Posts of 2019. erwin Expert Blog data governance metadata management

Metadata Requirements for Permanent Records on Shared Drives

National Archives Records Express

Measures must be put in place to ensure the records have the minimum metadata required in NARA Bulletin 2015-04: Metadata Guidance for the Transfer of Permanent Electronic Records. Metadata for records maintained in a shared drive must be managed and retrievable. General metadata shared drives

2019 Gartner Magic Quadrant for Metadata Management Solutions

erwin

erwin positioned as a Leader in Gartner’s “2019 Magic Quadrant for Metadata Management Solutions”. We were excited to announce earlier today that erwin was named as a Leader in the @Gartner _inc “2019 Magic Quadrant for Metadata Management Solutions.”. The report, by the world’s leading research and advisory company, provides a detailed overview of the metadata management market, including evaluations of 18 vendors based on completeness of vision and ability to execute.

Managing Metadata for Permanent Records: What if the metadata required for transferring permanent records are stored separately from the records themselves?

National Archives Records Express

To follow our last post on Metadata Requirements for Permanent Records on Shared Drives , today we are discussing how to manage metadata for permanent records stored separately from the records. Required metadata, as specified in NARA Bulletin 2015-04 , must have the same retention and disposition as the records they describe whether maintained in a separate system, records management application, or case management system. General metadata shared drives transfer guidance

Shanghai Jiao Tong University data leak – 8.4TB in email metadata exposed

Security Affairs

Security expert discovered an exposed database belonging to Shanghai Jiao Tong University containing 8.4TB in email metadata. The exposed database containing 8.4TB in email metadata was discovered on May 22, 2019, through a Shodan search. . This database contained metadata related to a huge amount of emails. It was eventually confirmed that this server and the email metadata was controlled by a large university located in China. ” wrote the expert on the rainbowtabl.

14 top metadata management platforms

Information Management Resources

Alation, ASG Technologies, Informatica and Smartlogic are among the top providers of metadata management tools, according to a new Magic Quadrant study from Gartner. Data management Data strategy Data types

Do I Need a Data Catalog?

erwin

Organizations with particularly deep data stores might need a data catalog with advanced capabilities, such as automated metadata harvesting to speed up the data preparation process. As a collective intelligent asset, a data catalog should include capabilities for collecting and continually enriching or curating the metadata associated with each data asset to make them easier to identify, evaluate and use properly. Three Types of Metadata in a Data Catalog. Business Metadata.

FAQ: Is Metadata a Part of an Electronic Record or Not?

The Texas Record

Recently, we have received many questions about metadata. Most of the inquiries about metadata revolve around two questions – What is metadata and why is it important. The purpose of this article is to discuss whether metadata is part of an electronic record and if so why.

ACT police admit they unlawfully accessed metadata more than 3,000 times

The Guardian Data Protection

Police seeking legal advice about two cases that resulted in information that ‘may have been used in a prosecution’ ACT Policing has admitted it unlawfully accessed citizens’ metadata a total of 3,365 times, not 116 as previously disclosed in an explosive commonwealth ombudsman’s report on Monday.

Training Snapshot: Metadata Searching from CloudNine

eDiscovery Daily

The post Training Snapshot: Metadata Searching from CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training

The importance of metadata in enterprise search and aggregation

Information Management Resources

While there are several approaches to metadata strategies, it is the impact on, and value for, searching and aggregating large document sets that is an essential consideration for today’s enterprises. Data types Data visualization Data mining

A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata

WIRED Threat Level

In one case, they stole the location and call record data of 20 specific individuals. Security Security / Cyberattacks and Hacks

CDRThief Malware Targets VoIP Gear in Carrier Networks

Threatpost

The Linux-targeted code can steal phone-call metadata, likely in spy campaigns or for use in VoIP fraud. Uncategorized call detail records carrier networks cdrs cdrthief China cyberespionage ESET Linknat malware metadata softswitches VoIP voip fraud VOS2009 VOS3000

Metadata Knowledge Graph: The Brain Powering Data Intelligence

Collibra

The post Metadata Knowledge Graph: The Brain Powering Data Intelligence appeared first on Collibra. There’s an old story about a group of people who have to guess what an object is just by touch. Each one makes a different guess, which leads to disagreement and distrust. It turns out everyone is wrong—the object is an elephant, but one was holding the trunk, one had a tusk, and so on. Nobody got it because no one had the full story. That’s how it is inside data-heavy organizations.

Metadata Knowledge Graph: The Brain Powering Data Intelligence

Collibra

The post Metadata Knowledge Graph: The Brain Powering Data Intelligence appeared first on Collibra There’s an old story about a group of people who have to guess what an object is just by touch. Each one makes a different guess, which leads to disagreement and distrust. It turns out everyone is wrong—the object is an elephant, but one was holding the trunk, one had a tusk, and so on. Nobody got it because no one had the full story. That’s how it is inside data-heavy organizations.

Australian federal police accessed journalists' metadata 58 times in a year

The Guardian Data Protection

MPs are examining impact of national security laws on freedom of the press The Australian federal police has revealed it accessed the metadata of journalists 58 times in the 2017-18 financial year. The admission came in a submission to the parliamentary joint committee on intelligence and security’s review of the mandatory data retention law, which has been in place since 2015.

It’s Time to End the NSA’s Metadata Collection Program

WIRED Threat Level

Opinion: Congress needs to pull the plug and end the authority for the CDR program. Security Opinion