Fri.Jan 03, 2025

article thumbnail

Dental Practice Pays State in Alleged Data Breach 'Cover Up'

Data Breach Today

Indiana Attorney General Fines Westend Dental $350K in 2020 Ransomware Hack An Indiana dental practice agreed to pay the state $350,000 and implement a long list of data security improvements following an alleged 2020 ransomware breach "cover up" that came to light when state regulators investigated a patient complaint about unfulfilled requests for dental X-rays.

article thumbnail

Facebook and Instagram Ads Push Gun Silencers Disguised as Car Parts

WIRED Threat Level

A network of Facebook pages has been advertising fuel filters that are actually meant to be used as silencers, which are heavily regulated by US law. Even US military officials are concerned.

Military 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple's AI Photo Analyzer Faces Privacy Backlash

Data Breach Today

iPhone Maker Introduced Feature Without Explicit Consent Apple's artificial intelligence-led photo analyzer is raising privacy concerns months after the company appears to have enabled the feature by default. It uses a combination of on-device machine learning and encrypted cloud-based processing.

Privacy 163
article thumbnail

How to clear your iPhone cache for a fresh (and faster) start in 2025

Collaboration 2.0

Cache and cookies can clog your browser and slow down your iPhone, but there's a simple way to bring your device back up to speed and give it a performance boost for the new year. Here's how.

IT 130
article thumbnail

Activating Intent Data for Sales and Marketing

Sales and marketing leaders have reached a tipping point when it comes to using intent data — and they’re not looking back. More than half of all B2B marketers are already using intent data to increase sales, and Gartner predicts this figure will grow to 70 percent. The reason is clear: intent can provide you with massive amounts of data that reveal sales opportunities earlier than ever before.

article thumbnail

36 Chrome Extensions Compromised in Supply Chain Attack

Data Breach Today

Developers Listed as Public Contact Points Targeted in Phishing Campaign A supply chain attack that subverted legitimate Google Chrome browser extensions to inject data-stealing malware is more widespread than security researchers first suspected. So far researchers have identified 36 subverted extensions collectively used by 2.6 million people.

Phishing 163

More Trending

article thumbnail

US CISA Issues Final Cyber Rules for Restricted Bulk Data

Data Breach Today

Cyber Defense Agency Aims to Bolster Protections Against Chinese Intrusion The Cybersecurity and Infrastructure Security Agency is issuing final rules to safeguard U.S. sensitive data from potential Chinese intrusions, requiring Americans involved in restricted transactions with Chinese entities to adopt stringent cybersecurity measures.

article thumbnail

Californians Say X Blocked Them From Viewing Amber Alert About Missing 14 Year-Old

WIRED Threat Level

Many people reported they hit a screen preventing them from seeing the alert unless they signed in.

Security 107
article thumbnail

Microsoft, Ping, Okta Dominate Access Management Gartner MQ

Data Breach Today

Access Management Leaders Remain Unchanged as Customer Identity Cases Proliferate Advances in customer identity around better user experience, strong authentication, and centralized identity processes have driven rapid growth in the access management market. The space by grew 17.6% to $5.85 billion in 2023 as organizations increasing look to replace homegrown CIAM solutions.

Access 130
article thumbnail

LDAPNightmare, a PoC exploit targets Windows LDAP flaw CVE-2024-49113

Security Affairs

Experts warn of a new PoC exploit, LDAPNightmare, that targets a Windows LDAP flaw (CVE-2024-49113), causing crashes & reboots. The vulnerability CVE-2024-49113 (CVSS score of 7.5), namedLDAPNightmare, is a Windows Lightweight Directory Access Protocol (LDAP) Denial of Service flaw that was discovered by the researcher Yuki Chen. An attacker can exploit the now-patched vulnerability to trigger a denial of service condition.

IT 119
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Japanese Businesses Hit By a Surge In DDoS Attacks

Data Breach Today

DDoS Attacks Primarily Target Logistics, Government and Financial Entities A spate of distributed denial-of-service attacks during the end-of-year holiday season disrupted operations at multiple Japanese organizations, including the country's largest airline, wireless carrier and prominent banks. The effect of the attacks has been temporary.

article thumbnail

Could AI make you a billionaire in 2025?

Collaboration 2.0

Sam Altman recently said we could soon see a one-person billion-dollar company. I did some research, and what I found might surprise you.

102
102
article thumbnail

US CFPB Needs to Look Beyond Zelle to Curb Scams

Data Breach Today

Ken Palla on Lessons From U.K and Australia to Reduce Fraud and Scams The U.S. Consumer Financial Protection Bureau's decision to file a lawsuit against Zelle is too late and too narrow to reduce scams, said Ken Palla, retired director with MUFG Bank. CFPB last month sued the operator of Zelle, as well as three banks for failing to protect consumers from fraud.

130
130
article thumbnail

Siri's secret recordings lead to a $95 million settlement. Could you get a share?

Collaboration 2.0

The class action privacy suit contends that Siri recorded and shared Apple users' conversations. Apple isn't the only tech giant in the crosshairs of such legal action.

Privacy 102
article thumbnail

Predicting the Future of Sales: How AI and Automation Will Revolutionize Strategies

In this exploration, we're diving into predictions about the future of sales. We're talking about a complete shake-up powered by automation and artificial intelligence (AI). These aren't just fancy tools — they're real game-changers. Automation and AI are here to redefine every interaction, making them smarter, faster, and more meaningful. From personalized customer journeys to streamlined sales processes, the goal is to make every moment count, enhancing both efficiency and connection.

article thumbnail

US Sanctions Beijing Company for Flax Typhoon Hacking

Data Breach Today

Integrity Technology Group Built Botnet for Chinese Hackers, US Treasury Says The Department of Treasury blacklisted Integrity Technology Group, declaring transactions with the company to be off-limits for U.S. financial institutions and persons. The effect will likely have more symbolic than actual disruptive effect.

130
130
article thumbnail

How IBM's blueprint for industry transformation leverages AI, 5G, and collaboration

Collaboration 2.0

In this exclusive talk with a senior IBM executive, learn about how AI, 5G, and groundbreaking partnerships are reshaping global industries.

102
102
article thumbnail

ShredOS

Schneier on Security

ShredOS is a stripped-down operating system designed to destroy data. GitHub page here.

92
article thumbnail

CES 2025: What to expect and how to watch

Collaboration 2.0

As the world's largest tech conference devoted to consumer electronics, CES showcases the most innovative technology from leading companies worldwide.

100
100
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Around 3.3 million POP3 and IMAP mail servers lack TLS encryption

Security Affairs

Over 3 million POP3 and IMAP mail servers lack TLS encryption, exposing them to network sniffing attacks. ShadowServer researchers reported that around 3.3 million POP3 and IMAP mail servers lack TLS encryption, exposing them to network sniffing attacks. POP3 (Post Office Protocol 3) and IMAP (Internet Message Access Protocol) are two protocols used to retrieve and manage emails from mail servers.

article thumbnail

How to program your iPhone's Action Button to summon ChatGPT's voice assistant

Collaboration 2.0

Unlike Siri, OpenAI Advanced Voice uses your phone's camera to understand your surroundings. If you have one of these iPhone models, here's how to get started.

99
article thumbnail

FireScam Android info-stealing malware supports spyware capabilities

Security Affairs

FireScam malware steals credentials and financial data by monitoring Android app notifications and sending data to a Firebase database. Cybersecurity firm Cyfirma warns of the FireScam Android info-stealing malware that supports spyware capabilities. The malicious code steals credentials and financial data by monitoring app notifications and sending the information to a Firebase database.

article thumbnail

7 rules to follow when setting up a home security camera - and where you should never install one

Collaboration 2.0

Whether you want to mount a new camera or move an existing one, follow these pointers to enhance performance and avoid problems.

article thumbnail

Enterprise ABM Marketing Tools: A Marketer's Guide

Savvy B2B marketers know that a great account-based marketing (ABM) strategy leads to higher ROI and sustainable growth. In this guide, we’ll cover: What makes for a successful ABM strategy? What are the key elements and capabilities of ABM that can make a real difference? How is AI changing workflows and driving functionality? This Martech Intelligence Report on Enterprise Account-Based Marketing examines the state of ABM in 2024 and what to consider when implementing ABM software.

article thumbnail

Richmond University Medical Center data breach impacted 674,033 individuals

Security Affairs

Richmond University Medical Center has confirmed that a ransomware attack in May 2023 affected 670,000 individuals. New York’s Richmond University Medical Center confirmed a May 2023 ransomware attack impacted 674,033 individuals. Richmond University Medical Center (RUMC) is a healthcare institution based in Staten Island, New York. It provides a wide range of medical services, including inpatient and outpatient care, emergency services, and specialty care in areas such as cardiology, onco

article thumbnail

Is your live TV streaming service still worth it? I reassessed the options for us both

Collaboration 2.0

Curd cutting was supposed to save us from the cable monopoly, but those monthly bills keep going up. Are you really getting your money's worth out of that $90-plus subscription?

IT 98
article thumbnail

Tech Stack Hurdles Threaten Enterprise AI Agent Rollouts, Survey Finds

Information Matters

Most large companies need significant infrastructure upgrades before they can effectively deploy artificial intelligence agents across their organizations, according to. The post Tech Stack Hurdles Threaten Enterprise AI Agent Rollouts, Survey Finds appeared first on Information Matters - AI-Driven Business Transformation.

article thumbnail

I test smart home devices for a living, and this is my favorite smart thermostat

Collaboration 2.0

The latest Google Nest Learning Thermostat is the perfect example of a gorgeous piece of tech that works and promises to remain relevant.

98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Friday Squid Blogging: Anniversary Post

Schneier on Security

I made my first squid post nineteen years ago this week. Between then and now, I posted something about squid every week (with maybe only a few exceptions). There is a lot out there about squid, even more if you count the other meanings of the word. Blog moderation policy.

78
article thumbnail

LG's new Gram Pro laptops compete with MacBook Air with thinner-than-ever designs

Collaboration 2.0

LG's 2025 Gram Pro laptops feature the company's first-ever Copilot+ PC, armed with the 'Lunar Lake' Intel Core Ultra processor.

91
article thumbnail

Apple will pay $95 Million to settle lawsuit over Siri’s alleged eavesdropping

Security Affairs

Apple has agreed to a $95 million settlement over a Siri eavesdropping lawsuit, denying any abuses. The settlement awaits judicial approval. Apple will pay $95 million to settle claims that its virtual assistant Siri was used to eavesdrop on users, though the company denies the allegations. The settlement proposed by the tech giant aims to resolve the lawsuit alleging that Siri recorded conversations without user intent for over a decade.

Privacy 112