A 1.3Tbs DDoS Hit GitHub, the Largest Yet Recorded
WIRED Threat Level
MARCH 1, 2018
On Wednesday, a 1.3Tbps DDoS attack pummeled GitHub for 15-20 minutes. Here's how it stayed online.
WIRED Threat Level
MARCH 1, 2018
On Wednesday, a 1.3Tbps DDoS attack pummeled GitHub for 15-20 minutes. Here's how it stayed online.
Collaboration 2.0
MARCH 18, 2018
The word 'Digital' is a dangerously generic buzzword that few understand or agree on.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Data Breach Today
MARCH 6, 2018
Groundbreaking Prosecution Targeted Attackers Who Demanded Bitcoin Payoffs In a groundbreaking prosecution, two individuals in Ukraine have been sentenced for running extortion campaigns that disrupted international victims' websites with massive DDoS attacks unless they paid bitcoin ransoms of up to $10,000.
Imperial Violet
MARCH 9, 2018
I'll generally ignore the internet froth in a given week as much as possible, but when Her Majesty's Government starts repeating misunderstandings about TLS 1.3 it is necessary to write something, if only to have a pointer ready for when people start citing it as evidence. The first misunderstanding in the piece is the claim that it's possible for man-in-the-middle proxies to selectively proxy TLS 1.2 connections, but not TLS 1.3 connections because the latter encrypts certificates.
Advertiser: ZoomInfo
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Weissman's World
MARCH 5, 2018
There is very little doubt that infogov technology can do all sorts of amazing things: it can help us find information that otherwise would be lost to us, it can alert us to process inefficiencies that we otherwise would be unaware of, and it can speed communication between us as never before. The problem, though, […]. The post InfoGov Expectations Can Be Problematic appeared first on Holly Group.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
WIRED Threat Level
MARCH 21, 2018
Despite the repeated privacy lapses, Facebook offers a fairly robust set of tools to control who knows what about you.
The Guardian Data Protection
MARCH 25, 2018
Leaving the social network after Cambridge Analytica scandal, users discover extent of data held As users continue to delete their Facebook accounts in the wake of the Cambridge Analytica scandal , a number are discovering that the social network holds far more data about them than they expected, including complete logs of incoming and outgoing calls and SMS messages.
Data Breach Today
MARCH 7, 2018
Payment Card Data Stolen by Malware-Wielding Attackers, Franchisee Warns Anyone who dined out at one of 166 Applebee's restaurants in 15 states may have had their payment card details compromised by point-of-sale malware infections that began in November 2017, RMH Franchise Holdings warns.
Imperial Violet
MARCH 26, 2018
Introduction. Predictions of, and calls for, the end of passwords have been ringing through the press for many years now. The first instance of this that Google can find is from Bill Gates in 2004 , although I suspect it wasn’t the first. None the less, the experience of most people is that passwords remain a central, albeit frustrating, feature of their online lives.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Bill Schmarzo - Dell EMC
MARCH 29, 2018
The year was 1994 and I had the fortunate opportunity to stumble upon a company – Cygnus Support – that was “selling free software.” I remember telling my mom that I was Vice President of Sales & Marketing of a company that was selling free software. After a very long pause, she replied, “Is your resume up to date?”. Cygnus Support sold support contracts and custom consulting projects for GNU development tools (gcc, g++, gdb) to companies looking to accelerate their time-to-market in the emb
AIIM
MARCH 5, 2018
“Digital Transformation is a game changer,” and “leaders embrace digital transformation”—but is it really a game changer and have we actually embraced it? We’ve all heard plenty of talk about digital transformation. And there is no shortage of articles and research that attempt to define it: From a CIO Magazine : "Digital Transformation is the application of digital capabilities to processes, products, and assets to improve efficiency, enhance customer value, manage risk and uncover new monetiza
WIRED Threat Level
MARCH 19, 2018
In undercover videos filmed by Britain’s Channel 4 news, Cambridge Analytica executives appear to offer up various unsavory tactics to influence campaigns.
The Guardian Data Protection
MARCH 20, 2018
The Cambridge Analytica revelations may be the final nudge we need to turn away from the social network. And it’s only the tip of the iceberg when it comes to big tech harvesting private information Sorry to break it to you, but you are probably a “dumb f**k”. This is according to statements by a young Mark Zuckerberg anyway. Back in 2004, when a 19-year-old Zuckerberg had just started building Facebook, he sent his Harvard friends a series of instant messages in which he marvelled at the fact t
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Data Breach Today
MARCH 26, 2018
Users Surprised By Metadata Collection, But Facebook Says It Always Asked Facebook is facing a new controversy after some users say they've found records of phone calls and text messages in their personal files, but claim they never granted the social networking site permission to collect the data.
TAB OnRecord
MARCH 8, 2018
Part 1 of this post showed you how color-coding works and whom it benefits. We also made the business case for color-coding by demonstrating how it leads to more efficient records retrieval, retention and disposition; improved decision-making; less operational down time; fewer lost opportunities; and minimized risk of legal sanctions. In this blog, we focus on how color-coding improves your records privacy and information security, as well as your space management.
Bill Schmarzo - Dell EMC
MARCH 19, 2018
The “hot hand,” a metaphor applied frequently to the game of basketball, is the idea that a basketball shooter, after making several consecutive shots, will experience a higher than normal success rate on his or her ensuing shots. I discussed the “hot hand” concept, and its flaw, at a TDWI (The Data Warehouse Institute) conference many years ago. Figure 1: “The Hot Hand in Basketball” by Thomas Gilovich, Robert Vallone and Amos Tversky.
IT Governance
MARCH 16, 2018
Phishing has been used as a way for criminal hackers to gain sensitive information since the mid-1990s. It uses deceptive emails and websites to trick victims into clicking malicious links, downloading attachments or sending sensitive information. Phishing emails can impersonate well-known brands or even people you know, such as colleagues. The goal is to trick the recipient into believing that the message is important and convince them to click a malicious link/attachment or provide sensitive d
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
WIRED Threat Level
MARCH 13, 2018
After a series of scandals related to misinformation, YouTube CEO Susan Wojcicki announced the company would begin directing users to sources like Wikipedia.
The Guardian Data Protection
MARCH 20, 2018
Sandy Parakilas says numerous companies deployed these techniques – likely affecting hundreds of millions of users – and that Facebook looked the other way Hundreds of millions of Facebook users are likely to have had their private information harvested by companies that exploited the same terms as the firm that collected data and passed it on to Cambridge Analytica, according to a new whistleblower.
Data Breach Today
MARCH 1, 2018
Digital Certificate Revocation Blame Game: Trustico Swaps Blows With DigiCert Digital certificate vendor Trustico is sparring with DigiCert, which recently took over Symantec's digital certificate business, following a serious security incident. The private keys for at least 23,000 Trustico digital certificates have been compromised, prompting a scramble to protect affected websites.
AIIM
MARCH 22, 2018
I was reflecting a bit on some of the themes raised by Ginni Rometty, CEO of IBM, during her opening keynote at Think 2018 and their alignment with some of the concepts we at AIIM have been raising over the past year under the banner of Intelligent Information Management. I suppose it may seem a bit cheeky as the “Chief Evangelist of AIIM” to be commenting upon the comments of the “Chief Executive” of IBM, so for those who want to hear her thoughts without the benefit of my interpretation, the r
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Bill Schmarzo - Dell EMC
MARCH 5, 2018
It’s simple. The conversation is simple because the objective is simple: How do I become more effective at leveraging (big) data and analytics (artificial intelligence) to power my business? Success with artificial intelligence doesn’t begin with technology, but rather the business, and more specifically the people and processes running the business.
Troy Hunt
MARCH 29, 2018
The penny first dropped for me just over 7 years ago to the day: The only secure password is the one you can't remember. In an era well before the birth of Have I Been Pwned (HIBP), I was doing a bunch of password analysis on data breaches and wouldn't you know it - people are terrible at creating passwords! Of course, we all know that but it's interesting to look back on that post all these years later and realise that unfortunately, nothing has really changed.
WIRED Threat Level
MARCH 8, 2018
Dutch police detail for the first time how they secretly hijacked Hansa, Europe's most popular dark web market.
The Guardian Data Protection
MARCH 29, 2018
Defence ministry praised SCL for training it gave to psychological warfare group, papers show SCL, Cambridge Analytica’s parent company, had access to secret UK information and was singled out for praise by the UK Ministry of Defence for the training it provided to a psychological operations warfare group, according to documents released by MPs. An endorsement from an official at the 15 UK Psychological Operations Group dated January 2012 concluded that they would “have no hesitation in inviting
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Data Breach Today
MARCH 20, 2018
Hacker May Have Also Obtained Other Customer Data in Breach, Orbitz Warns Expedia's Orbitz travel fare search engine says it may have suffered a breach that resulted in 880,000 payment cards being compromised, along with other customer data, over a two-year period. Orbitz says the apparent breach involved a legacy system no longer connected to its site.
Thales Cloud Protection & Licensing
MARCH 22, 2018
This blog was originally published on Business Reporter. To view the article, please click here. To see where the future of payments lies, we should look to its past. The concept of payment, at its most fundamental, is simply about people agreeing to exchange goods or services. A fair trade of one thing for another. Go back a few thousand years and the invention of money meant that food could be effectively turned into metal and stored for as long as needed, before being turned back into food ag
Elie
MARCH 10, 2018
This series of posts recounts how, in November 2016, we hunted for and took down Gooligan, the infamous Android OAuth stealing botnet. What makes Gooligan special is its weaponization of OAuth tokens, something that was never observed in mainstream crimeware before. At its peak, Gooligan had hijacked over 1M OAuth tokens in an attempt to perform fraudulent Play store installs and reviews.
Let's personalize your content