Sat.Jan 20, 2018 - Fri.Jan 26, 2018

article thumbnail

Ransomware Outlook: 542 Crypto-Lockers and Counting

Data Breach Today

Crypto-Lockers Remain Serious Threat Despite Recent Attack Volume Decline After spiking in 2017, the volume of attacks involving ransomware has since declined, but the malware still remains a potent threat. For attackers, ransomware barriers to entry are lower than ever, thanks to highly automated ransomware-as-a-service offerings.

article thumbnail

New Malware Hijacks Cryptocurrency Mining

Schneier on Security

This is a clever attack. After gaining control of the coin-mining software, the malware replaces the wallet address the computer owner uses to collect newly minted currency with an address controlled by the attacker. From then on, the attacker receives all coins generated, and owners are none the wiser unless they take time to manually inspect their software configuration.

Mining 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Challenges Created by an Ad Hoc Approach to Information Capture

AIIM

Scanning and information capture lead a curious double life. On one hand, it seems like we’ve been doing scanning and capture forever, at least within larger companies. Scanning and capture are stable, mature technologies with a well-documented ROI. On the other hand, they are still somewhat new when it comes to adoption by many smaller and mid sized organizations.

article thumbnail

The role of blockchain in helping organizations meet GDPR compliance

Information Management Resources

Many have begun to consider whether the technology could be used to improve customer data management processes, as they relate to the upcoming EU mandate.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Allscripts Ransomware Attack a Reminder of Cloud Risks

Data Breach Today

Points to Need for Clients to Have Business Continuity Plan A ransomware attack on electronic health records vendor Allscripts late last week is a reminder of the potential disruption to patient care delivery healthcare entities can face if a cloud-services provider suffers a cyberattack. It also points to the need for business continuity planning.

Cloud 167

More Trending

article thumbnail

4 Special Requirements Social Media and Collaboration Create for GDPR Compliance

AIIM

A new set of European rules and standards related to privacy and data protection (the General Data Protection Regulation , or GDPR ) has set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers. The regulation is designed to harmonize privacy across the EU, codify more rigorous privacy rights; strike a balance between privacy and security and create an explicit obligation for both data contr

GDPR 93
article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

This morning we announced, in tandem with our partner 451 Research, the Global Edition of the 2018 Thales Data Threat Report. It’s abundantly clear that medium to larger enterprises (the focus of the report and underlying survey) are finding it harder than ever to protect their sensitive data. The twin drivers of the problem are increased threats and the drive to digitally transform how organizations deliver value and revenue.

article thumbnail

Intel: Stop Installing Patches Due To Reboot Problems

Data Breach Today

Struggles With Firmware Fixes For Meltdown and Spectre The usual advice for major security flaws is to patch as quickly as possible. Now Intel is calling for a full stop due to imperfect patches for a trio of chip security vulnerabilities known as Meltdown and Spectre.

Security 162
article thumbnail

Want to Avoid Malware on Your Android Phone? Try the F-Droid App Store

WIRED Threat Level

Opinion: Researchers from Yale Privacy Lab argue that the scourge of trackers in Android apps means users should stop using the Google Play store.

Privacy 110
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Organisations need to prepare for “cyber shocks”

IT Governance

Most organisations are aware of the catastrophic damage that extreme cyber attacks can cause, but few have put in place appropriate measures to defend and respond to such incidents, according to a new report from PwC. Strengthening digital society against cyber shocks , which analyses key findings from the 2018 Global State of Information Security ® Survey (GSISS), focuses on the effects of massive incidents such as NotPetya and WannaCry.

article thumbnail

5 Steps to Better Security in Hybrid Clouds

Dark Reading

Following these tips can improve your security visibility and standardize management across hybrid environments.

Cloud 103
article thumbnail

Aetna Signs $1.15 Million Settlement With NY for Breaches

Data Breach Today

Action Comes After $17.2 Million Lawsuit Settlement After settling a breach lawsuit for $17.2 million, Aetna has signed another large settlement related to privacy breaches involving mailings to its health plan members. The latest settlement with the New York state attorney general's office involves two mailings last year.

Privacy 150
article thumbnail

Meltdown and Spectre Patches From Intel and Others Have a Rough Start

WIRED Threat Level

In the haste to address the Meltdown and Spectre vulnerabilities that shook the computer industry, several clumsy patch attempts have had to be pulled.

Security 103
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cyber attacks are now one of the biggest threats to global society

IT Governance

A recent article about the World Economic Forum’s Global Risks Report 2018 said that “the top five risks to global stability over the next five years are natural disasters, extreme weather, cyberattacks, data fraud, and failure to address climate change”. The past few years have seen an increase in cyber attacks and their associated damages. The report’s findings suggest that this acceleration is unlikely to slow.

Risk 83
article thumbnail

AI and analytics has the power to change upstream oil and gas

OpenText Information Management

The upstream oil and gas industries have traditionally been slow to adopt new technologies. Anything new has to be proven in the field before most companies will adopt it. The development of Artificial Intelligence (AI) and advanced analytics should be different. For oil and gas, this combination offers the ability to continuously increase operational performance … The post AI and analytics has the power to change upstream oil and gas appeared first on OpenText Blogs.

article thumbnail

Online Advertising: Hackers' Little Helper

Data Breach Today

Network of Fake Ad Agencies Distributed 1 Billion Bad Ads, Researchers Find The web may be largely funded thanks to online advertising, but the threat posted by malicious advertisements continues to escalate. Indeed, the latest malvertising scheme, uncovered by security firm Confiant, served 1 billion malicious advertisements.

Security 150
article thumbnail

Tinder's Lack of Encryption Lets Strangers Spy on Your Swipes

WIRED Threat Level

Thanks to Tinder's patchwork use of HTTPS, researchers found they could reconstruct someone's entire experience in the app.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Movement on Section 702 of the Foreign Intelligence Surveillance Act (FISA)

Data Matters

Following months of intense debate, an attempted filibuster, and close votes in both the House and Senate, Congress last week finally extended Section 702 of the Foreign Intelligence Surveillance Act (FISA). First enacted in 2008, Section 702 is a surveillance law that permits the targeting of foreign individuals overseas. The authority has engendered international attention and criticism from civil libertarians and was due to sunset on January 19, 2018.

Privacy 68
article thumbnail

Top four reasons to start AB testing today

OpenText Information Management

In recent years, the pressure applied to marketers has grown significantly. Year over year, goals are handed down and marketers are expected to do more with less. This trend often leaves marketers scrambling to find new ways to meet these goals. What’s more, in today’s digital ecosystem, with an abundance of options, visitors have come … The post Top four reasons to start AB testing today appeared first on OpenText Blogs.

article thumbnail

Equifax Breach Victims: UK Count Goes Up

Data Breach Today

15 Million UK Residents' Records Exposed, 860,000 Consumers At Risk Data broker Equifax has released a revised count of U.K. victims of its massive 2017 data breach, now saying 860,000 residents had their personal details exposed. The data broker is offering its own fraud-monitoring services to breach victims, provided they share their personal details.

article thumbnail

The Doomsday Clock Ticks Closer to Midnight Over Nuclear War Fears

WIRED Threat Level

As the so-called Doomsday Clock ticks even closer to midnight, a reminder of just how easy it is to slip into nuclear war.

IT 108
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

As technology develops, so must journalists’ codes of ethics | Paul Chadwick

The Guardian Data Protection

AI is sure to bring many benefits but concerns over its ability to make decisions mean human journalists’ input remains vital Journalism is largely collaboration: reporters with sources, writers and editors, lawyers advising publishers, producers with distributors, and audiences feeding back their knowledge. Rapid development of artificial intelligence means journalists are likely to collaborate more and more with machines that think.

article thumbnail

Regulatory Matters: EU regulatory change is coming fast in Life Sciences

OpenText Information Management

The Life Sciences sector is used to constant regulatory change. However, the next few years are about to see major new legislation in the EU that could result in major disruption to Life Sciences, Pharmaceutical and Healthcare companies – wherever they are. As I mentioned in my previous blog, I’m going to concentrate on two … The post Regulatory Matters: EU regulatory change is coming fast in Life Sciences appeared first on OpenText Blogs.

article thumbnail

Expect More Cybersecurity 'Meltdowns'

Data Breach Today

After Meltdown and Spectre, Researchers Will Pummel Microprocessors for Flaws Technology giants are still struggling to identify what's at risk from the Spectre and Meltdown flaws in modern CPUs, never mind getting working security updates into users' hands. In the meantime, expect a rush by researchers to find more flaws in microprocessor code.

article thumbnail

Your Sloppy Bitcoin Drug Deals Will Haunt You For Years

WIRED Threat Level

Scouring the blockchain, researchers found years-old evidence tying Silk Road transaction to users' public accounts.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Can I really rely on my entire workforce to support a recovery?

IT Governance

This is a guest article written by Robert A. Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. The author’s views are entirely his own and may not reflect the views of IT Governance. In the northern hemisphere, we have entered the flu season, and people are starting to become sick.

Risk 75
article thumbnail

The Next Generation of Records Management

Gimmal

Over the past couple of years, we have seen organizations make a fundamental shift towards storing and managing their records in the cloud. As the internet continues to become the primary platform for conducting business, with collaborative tools and instant accessibility, the cloud makes increasingly more sense as the default location for data and records.

article thumbnail

Blockchain in Healthcare: The Potential and Limitations

Data Breach Today

Blockchain holds potential for supporting secure health data exchange, but it has limitations that organizations need to keep in mind, says Intel's David Houlding in this in-depth interview on the technology.