Sat.Mar 24, 2018 - Fri.Mar 30, 2018

article thumbnail

Facebook Faces New Uproar: Call and SMS Metadata

Data Breach Today

Users Surprised By Metadata Collection, But Facebook Says It Always Asked Facebook is facing a new controversy after some users say they've found records of phone calls and text messages in their personal files, but claim they never granted the social networking site permission to collect the data.

Metadata 180
article thumbnail

Security Keys

Imperial Violet

Introduction. Predictions of, and calls for, the end of passwords have been ringing through the press for many years now. The first instance of this that Google can find is from Bill Gates in 2004 , although I suspect it wasn’t the first. None the less, the experience of most people is that passwords remain a central, albeit frustrating, feature of their online lives.

Security 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Post - Data Privacy and Open Data: Secondary Uses under GDPR

AIIM

This is the ninth post in a series on privacy by Andrew Pery. You might also be interested in: Three Critical Steps for GDPR Compliance. Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law. Privacy by Design: The Intersection of Law and Technology.

GDPR 95
article thumbnail

How modern RIM professionals are staying relevant – Part 2

TAB OnRecord

In a three-part blog post we are outlining the ways that modern RIM professionals are increasing the value they provide to the organization. In part one of our blost post we discussed how records managers are extending their reach beyond the filing and storage rooms. This allows them to apply their expertise in information architecture, [.] Read More.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Misconfigured Server Exposes Patient Data

Data Breach Today

Security Researcher Discovers Apparent Breach at Medical Practice A medical practice's misconfigured database server that allegedly exposed information about thousands of patients plus staff serves as another reminder about the importance of safeguarding sensitive data from exposure on the internet.

Security 164

More Trending

article thumbnail

What's in an Event Name? -- Reflections on Think2018

AIIM

I was invited to attend the IBM Think 2018 event last week in Las Vegas. There were so many interesting aspects of the event, but most notable to me as someone who has attended multiple versions of this event over the years under multiple names (multiple event names, not my aliases) were: 1) the sheer scale of the event; and 2) the convergence of content and data.

article thumbnail

Facebook logs texts and calls, users find as they delete accounts

The Guardian Data Protection

Leaving the social network after Cambridge Analytica scandal, users discover extent of data held As users continue to delete their Facebook accounts in the wake of the Cambridge Analytica scandal , a number are discovering that the social network holds far more data about them than they expected, including complete logs of incoming and outgoing calls and SMS messages.

Mining 112
article thumbnail

3 Steps to Asset Management and Software Auditing

Data Breach Today

Protecting Critical Endpoints Is Paramount for Your Business With the explosion of laptops, IoT, tablets, smartphones and other smart technologies, endpoints are the single largest group of devices inside your network today. Managing all of your assets and their software requires three foundational steps.

IoT 139
article thumbnail

Inside Fort Gordon: Where Next-Gen Cyber Troops Are Trained

WIRED Threat Level

What's happening at the US Army's new cyber branch headquarters marks a change for Fort Gordon. Hell, it might be changing warfare itself—all through a computer screen.

IT 110
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Is 2018 the Tipping Point in Digital Transformation?

Bill Schmarzo - Dell EMC

“Survival, in the cool economics of biology, means simply the persistence of one’s own genes in the generations to follow.” — Lewis Thomas. A recent article in The Economist titled “ The Year of the Incumbent ” postulates that 2018 is the year that the incumbents “get back into the game” by stealing the momentum from technology startups to reclaim their spots atop the market valuation charts.

article thumbnail

The Brexit whistleblower: ‘Did Vote Leave use me? Was I naive'

The Guardian Data Protection

Shahmir Sanni, a volunteer for Vote Leave, the official pro-Brexit EU referendum campaign, explains how a data company linked to Cambridge Analytica played a crucial role in the result, and voices his concerns that electoral spending rules were manipulated… and evidence apparently destroyed • Brexit insider claims Vote Leave team may have breached spending limits When I first met Shahmir Sanni last August, he was nervy, anxious, uncertain.

IT 112
article thumbnail

Atlanta After Ransomware Attack: Please Restart Your PC

Data Breach Today

5 Days After Outbreak, Email Works, But Don't Try Paying Parking Tickets Online Five days after a ransomware outbreak crypto-locked city systems, Atlanta has advised its 8,000 employees that they can once again boot their PCs and printers. But information security experts warn that the city's infrastructure still appears to have easily exploitable misconfigurations.

article thumbnail

Have I Been Pwned is Now Partnering With 1Password

Troy Hunt

The penny first dropped for me just over 7 years ago to the day: The only secure password is the one you can't remember. In an era well before the birth of Have I Been Pwned (HIBP), I was doing a bunch of password analysis on data breaches and wouldn't you know it - people are terrible at creating passwords! Of course, we all know that but it's interesting to look back on that post all these years later and realise that unfortunately, nothing has really changed.

Passwords 104
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Lions and Tigers and Facebook – Oh My!

AIIM

Yep, that is what I am hearing these days, reminiscent of the scene from the Wizard of Oz when they are entering the forest, knowing that there are animals and possible danger hiding in the shadows. Yet they choose to enter anyway. Now we have Facebook, and news that information was collected and used by Cambridge Analytica. So how does this happen?

article thumbnail

Cambridge Analytica parent company had access to secret MoD information

The Guardian Data Protection

Defence ministry praised SCL for training it gave to psychological warfare group, papers show SCL, Cambridge Analytica’s parent company, had access to secret UK information and was singled out for praise by the UK Ministry of Defence for the training it provided to a psychological operations warfare group, according to documents released by MPs. An endorsement from an official at the 15 UK Psychological Operations Group dated January 2012 concluded that they would “have no hesitation in inviting

Access 108
article thumbnail

4 Tips for Implementing a Mature Endpoint Security Strategy

Data Breach Today

Insights on Vulnerability Management and Incident Response An effective endpoint security strategy can be as layered as you want it to be. But you'll have a strong foundation if you build off of these four key steps.

Security 136
article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about us. A lot, it turns out. It collects data from our posts, our likes, our photos , things we type and delete without posting, and things we do while not on Facebook and even when we're offline. It buys data about us from others. And it can infer even more: our sexual orientation, political beliefs, relationship status, drug use, and other personality traits -- even if we didn't

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Why Enterprises Should Control Their Encryption Keys

Thales Cloud Protection & Licensing

Cloud providers have done a good job of integrating default encryption services within their core infrastructure. However, as discussed in previous blogs , the encryption service is only as secure as the keys that are used to encrypt the data. Enterprises cannot ignore the responsibility of implementing a strong key assurance service that ensures they maintain control of their own risks.

article thumbnail

Facebook logged SMS texts and phone calls without explicitly notifying users

The Guardian Data Protection

Users complain of phone and text data collected by the company despite never having agreed to practice Facebook began logging the text messages and phone calls of its users before it explicitly notified them of its practice, contradicting the company’s earlier claims that “uploading this information has always been opt-in only”. In at least one previous version of the Messenger app, Facebook only told users that the setting would enable them to “send and receive SMS in Messenger”, and presented

article thumbnail

OCR Considering HIPAA Privacy Rule, Enforcement Changes

Data Breach Today

But Agency Will Seek Public Input First Federal regulators are considering potential changes to HIPAA privacy rule and enforcement regulations, but aim to first engage the healthcare sector and public for input, says the nation's top HIPAA enforcer. So, what changes are being considered?

Privacy 128
article thumbnail

Guccifer 2.0's Slip-Up Shows That Even Elite Hackers Make Mistakes

WIRED Threat Level

No matter how much mystique a hacker persona has, the individual or group behind it inevitably makes operations security errors sometimes.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Leveraging tokenization services from the major card brands

Thales Cloud Protection & Licensing

As the volume of both card-based payments and digital payments continue to grow significantly year-on-year, the importance of securing sensitive card data (and in particular the primary account number or PAN) has never been a more critical and challenging task. In the recent Thales eSecurity eBook, ‘ PCI Compliance and Data Protection for Dummies ’, we cover the main technologies that can be used, such as encryption and tokenization, to help with such efforts in protecting the payment prior to a

article thumbnail

Apple launches iOS 11.3 with raft of privacy features

The Guardian Data Protection

Sensing opportunity – and GDPR – the Silicon Valley company launches major data protection push across devices Apple is launching a major privacy push, with software updates across all its devices to introduce new data privacy information immediately, with an updated website offering new privacy management tools to follow in May. Thursday’s updates (macOS 10.13.4, iOS11.3 and tvOS 11.3) are prompted by the enormous new European data protection regulation GDPR, and have been in the works since at

Privacy 105
article thumbnail

US Charges Iranians With Hacking, and Britain Concurs

Data Breach Today

UK's National Cyber Security Center Also Ties HBO, University Hacks to Group The U.K. government concurs with allegations contained in a U.S. Department of Justice indictment, which charges nine Iranians, plus the Mabna Institute, with perpetrating a five-year hacking campaign designed to steal scientific secrets for Iran's military and private industry.

Military 121
article thumbnail

A Scammer Tried to Scare Me into Buying Their Security Services - Here's How It Went Down

Troy Hunt

Here's the tl;dr - someone named "Md. Shofiur R" found troyhunt.com on a "free online malware scanner" and tried to scare me into believing my site had security vulnerabilities then shake me down for a penetration test. It didn't work out so well for him, here's the blow-by-blow account of things then I'll add some more thoughts afterwards: Should I respond?

IT 79
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

The Facebook Privacy Setting That Doesn’t Do Anything at All

WIRED Threat Level

For years, Facebook has left a privacy setting on its site that addresses a problem that no longer exists.

Privacy 102
article thumbnail

Facebook announces privacy tools to 'put people in more control' of data

The Guardian Data Protection

Corporation suggests changes are response to Cambridge Analytica scandal, with EU set to toughen data protection rules in May Facebook is launching a range of new tools in an effort to “put people in more control over their privacy” in the buildup to new EU regulations that tighten up data protection. The changes come after a troubling two weeks for the company, which is battling with the fallout of the Cambridge Analytica files.

Privacy 101
article thumbnail

Boeing Confirms 'Limited' Malware Outbreak

Data Breach Today

WannaCry Reportedly Identified by Boeing Executive as the Culprit Boeing says that a malware outbreak affected a small number of systems but did not disrupt production. An executive has reportedly identified the malware as being WannaCry ransomware and called for "all hands on deck" to respond to the incident.