Sat.Mar 24, 2018 - Fri.Mar 30, 2018

article thumbnail

Facebook Faces New Uproar: Call and SMS Metadata

Data Breach Today

Users Surprised By Metadata Collection, But Facebook Says It Always Asked Facebook is facing a new controversy after some users say they've found records of phone calls and text messages in their personal files, but claim they never granted the social networking site permission to collect the data.

Metadata 186
article thumbnail

Security Keys

Imperial Violet

Introduction. Predictions of, and calls for, the end of passwords have been ringing through the press for many years now. The first instance of this that Google can find is from Bill Gates in 2004 , although I suspect it wasn’t the first. None the less, the experience of most people is that passwords remain a central, albeit frustrating, feature of their online lives.

Security 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Digital Transformation Lesson: Open Source Business Models

Bill Schmarzo - Dell EMC

The year was 1994 and I had the fortunate opportunity to stumble upon a company – Cygnus Support – that was “selling free software.” I remember telling my mom that I was Vice President of Sales & Marketing of a company that was selling free software. After a very long pause, she replied, “Is your resume up to date?”. Cygnus Support sold support contracts and custom consulting projects for GNU development tools (gcc, g++, gdb) to companies looking to accelerate their time-to-market in the emb

article thumbnail

Inside Fort Gordon: Where Next-Gen Cyber Troops Are Trained

WIRED Threat Level

What's happening at the US Army's new cyber branch headquarters marks a change for Fort Gordon. Hell, it might be changing warfare itself—all through a computer screen.

IT 111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Misconfigured Server Exposes Patient Data

Data Breach Today

Security Researcher Discovers Apparent Breach at Medical Practice A medical practice's misconfigured database server that allegedly exposed information about thousands of patients plus staff serves as another reminder about the importance of safeguarding sensitive data from exposure on the internet.

Security 179

More Trending

article thumbnail

Is 2018 the Tipping Point in Digital Transformation?

Bill Schmarzo - Dell EMC

“Survival, in the cool economics of biology, means simply the persistence of one’s own genes in the generations to follow.” — Lewis Thomas. A recent article in The Economist titled “ The Year of the Incumbent ” postulates that 2018 is the year that the incumbents “get back into the game” by stealing the momentum from technology startups to reclaim their spots atop the market valuation charts.

article thumbnail

The Facebook Privacy Setting That Doesn’t Do Anything at All

WIRED Threat Level

For years, Facebook has left a privacy setting on its site that addresses a problem that no longer exists.

Privacy 111
article thumbnail

3 Steps to Asset Management and Software Auditing

Data Breach Today

Protecting Critical Endpoints Is Paramount for Your Business With the explosion of laptops, IoT, tablets, smartphones and other smart technologies, endpoints are the single largest group of devices inside your network today. Managing all of your assets and their software requires three foundational steps.

IoT 165
article thumbnail

The Brexit whistleblower: ‘Did Vote Leave use me? Was I naive'

The Guardian Data Protection

Shahmir Sanni, a volunteer for Vote Leave, the official pro-Brexit EU referendum campaign, explains how a data company linked to Cambridge Analytica played a crucial role in the result, and voices his concerns that electoral spending rules were manipulated… and evidence apparently destroyed • Brexit insider claims Vote Leave team may have breached spending limits When I first met Shahmir Sanni last August, he was nervy, anxious, uncertain.

IT 112
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Have I Been Pwned is Now Partnering With 1Password

Troy Hunt

The penny first dropped for me just over 7 years ago to the day: The only secure password is the one you can't remember. In an era well before the birth of Have I Been Pwned (HIBP), I was doing a bunch of password analysis on data breaches and wouldn't you know it - people are terrible at creating passwords! Of course, we all know that but it's interesting to look back on that post all these years later and realise that unfortunately, nothing has really changed.

Passwords 104
article thumbnail

Monero Privacy Protections Aren’t as Strong as They Seem

WIRED Threat Level

Researchers point out serious gaps in the privacy promises of stealth cryptocoin Monero.

Privacy 111
article thumbnail

Atlanta After Ransomware Attack: Please Restart Your PC

Data Breach Today

5 Days After Outbreak, Email Works, But Don't Try Paying Parking Tickets Online Five days after a ransomware outbreak crypto-locked city systems, Atlanta has advised its 8,000 employees that they can once again boot their PCs and printers. But information security experts warn that the city's infrastructure still appears to have easily exploitable misconfigurations.

article thumbnail

Cambridge Analytica parent company had access to secret MoD information

The Guardian Data Protection

Defence ministry praised SCL for training it gave to psychological warfare group, papers show SCL, Cambridge Analytica’s parent company, had access to secret UK information and was singled out for praise by the UK Ministry of Defence for the training it provided to a psychological operations warfare group, according to documents released by MPs. An endorsement from an official at the 15 UK Psychological Operations Group dated January 2012 concluded that they would “have no hesitation in inviting

Access 109
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How modern RIM professionals are staying relevant – Part 2

TAB OnRecord

In a three-part blog post we are outlining the ways that modern RIM professionals are increasing the value they provide to the organization. In part one of our blost post we discussed how records managers are extending their reach beyond the filing and storage rooms. This allows them to apply their expertise in information architecture, [.] Read More.

article thumbnail

Guccifer 2.0's Slip-Up Shows That Even Elite Hackers Make Mistakes

WIRED Threat Level

No matter how much mystique a hacker persona has, the individual or group behind it inevitably makes operations security errors sometimes.

Security 110
article thumbnail

4 Tips for Implementing a Mature Endpoint Security Strategy

Data Breach Today

Insights on Vulnerability Management and Incident Response An effective endpoint security strategy can be as layered as you want it to be. But you'll have a strong foundation if you build off of these four key steps.

Security 162
article thumbnail

Facebook logged SMS texts and phone calls without explicitly notifying users

The Guardian Data Protection

Users complain of phone and text data collected by the company despite never having agreed to practice Facebook began logging the text messages and phone calls of its users before it explicitly notified them of its practice, contradicting the company’s earlier claims that “uploading this information has always been opt-in only”. In at least one previous version of the Messenger app, Facebook only told users that the setting would enable them to “send and receive SMS in Messenger”, and presented

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about us. A lot, it turns out. It collects data from our posts, our likes, our photos , things we type and delete without posting, and things we do while not on Facebook and even when we're offline. It buys data about us from others. And it can infer even more: our sexual orientation, political beliefs, relationship status, drug use, and other personality traits -- even if we didn't

article thumbnail

The SamSam Ransomware That Hit Atlanta Will Strike Again

WIRED Threat Level

Atlanta isn't the SamSam ransomware strain's first victim—and it won't be the last.

article thumbnail

Boeing Confirms 'Limited' Malware Outbreak

Data Breach Today

WannaCry Reportedly Identified by Boeing Executive as the Culprit Boeing says that a malware outbreak affected a small number of systems but did not disrupt production. An executive has reportedly identified the malware as being WannaCry ransomware and called for "all hands on deck" to respond to the incident.

article thumbnail

Apple launches iOS 11.3 with raft of privacy features

The Guardian Data Protection

Sensing opportunity – and GDPR – the Silicon Valley company launches major data protection push across devices Apple is launching a major privacy push, with software updates across all its devices to introduce new data privacy information immediately, with an updated website offering new privacy management tools to follow in May. Thursday’s updates (macOS 10.13.4, iOS11.3 and tvOS 11.3) are prompted by the enormous new European data protection regulation GDPR, and have been in the works since at

Privacy 107
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Guest Post - Data Privacy and Open Data: Secondary Uses under GDPR

AIIM

This is the ninth post in a series on privacy by Andrew Pery. You might also be interested in: Three Critical Steps for GDPR Compliance. Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law. Privacy by Design: The Intersection of Law and Technology.

GDPR 94
article thumbnail

MuslimCrypt Steganography App Helps Jihadists Send Secret Messages

WIRED Threat Level

The unfortunately named MuslimCrypt uses steganography to pass discreet messages through images online.

Security 107
article thumbnail

OCR Considering HIPAA Privacy Rule, Enforcement Changes

Data Breach Today

But Agency Will Seek Public Input First Federal regulators are considering potential changes to HIPAA privacy rule and enforcement regulations, but aim to first engage the healthcare sector and public for input, says the nation's top HIPAA enforcer. So, what changes are being considered?

Privacy 153
article thumbnail

Facebook announces privacy tools to 'put people in more control' of data

The Guardian Data Protection

Corporation suggests changes are response to Cambridge Analytica scandal, with EU set to toughen data protection rules in May Facebook is launching a range of new tools in an effort to “put people in more control over their privacy” in the buildup to new EU regulations that tighten up data protection. The changes come after a troubling two weeks for the company, which is battling with the fallout of the Cambridge Analytica files.

Privacy 103
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

10 Women in Security You May Not Know But Should

Dark Reading

The first in a series of articles shining a spotlight on women who are quietly changing the game in cybersecurity.

article thumbnail

The Under Armour Hack Was Even Worse Than It Had To Be

WIRED Threat Level

If Under Armour had protected all passwords equally, its 150-million-user MyFitnessPal breach wouldn’t have been nearly as bad.

IT 102
article thumbnail

Under Armour Reports Massive Breach of MyFitnessPal App

Data Breach Today

150 Million Accounts Exposed; Could Phishing Campaign Be Coming? Under Armour says an unauthorized intruder gained access to information for the accounts of 150 million users of its MyFitnessPal mobile app and website. Learn why some fear the breach could lead to a massive phishing campaign.

Phishing 150