Why Artificial Intelligence Is Not a Silver Bullet for Cybersecurity
Dark Reading
JULY 20, 2018
Like any technology, AI and machine learning have limitations. Three are detection, power, and people.
Dark Reading
JULY 20, 2018
Like any technology, AI and machine learning have limitations. Three are detection, power, and people.
Data Breach Today
JULY 20, 2018
PIR Bank Robbed by Russia's MoneyTaker Gang, Investigators Say Hackers stole at least $920,000 from Russia's PIR Bank after they successfully compromised an outdated, unsupported Cisco router at a bank branch office and used it to tunnel into the bank's local network, reports incident response firm Group-IB.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Data Breach Today
JULY 18, 2018
'We Refuse to be Complicit,' Silicon Valley Employees Tell Bosses Silicon Valley employees are increasingly calling on executives to restrict the use of facial recognition technology, mobilized in part by the U.S. government's previous policy of separating children from parents at the border. Experts say facial recognition regulations are needed - and quickly.
WIRED Threat Level
JULY 17, 2018
You may not have heard of Safe Browsing, but it's made the web more secure for over a decade. Here's its story, from the people who built it.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Krebs on Security
JULY 16, 2018
A 21-year-old Kentucky man has pleaded guilty to authoring and distributing a popular hacking tool called “ LuminosityLink ,” a malware strain that security experts say was used by thousands of customers to gain unauthorized access to tens of thousands of computers across 78 countries worldwide. The LuminosityLink Remote Access Tool (RAT) was sold for $40 to thousands of customers, who used the tool to gain unauthorized access to tens of thousands of computers worldwide.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Data Breach Today
JULY 16, 2018
'CEO Fraud' Remains Alive, Well and Underreported Known losses due to business email compromise have exceeded $12.5 billion worldwide, the FBI's Internet Complaint Center reports, adding that fraudsters are increasingly targeting the U.S. real estate sector with such scams.
AIIM
JULY 20, 2018
I am pleased to announce that we have introduced another exam option for CIP candidates. To recap, there are now three ways you can take the CIP exam: At any Kryterion exam center world-wide. At an AIIM-taught CIP prep course. Online proctored via Kryterion. Online proctoring has been available for years, but has sometimes suffered from confusion with online certificate programs and the perception that "it's just an online exam.
Schneier on Security
JULY 18, 2018
Recently, Apple introduced restricted mode to protect iPhones from attacks by companies like Cellebrite and Greyshift , which allow attackers to recover information from a phone without the password or fingerprint. Elcomsoft just announced that it can easily bypass it. There is an important lesson in this: security is hard. Apple Computer has one of the best security teams on the planet.
Threatpost
JULY 18, 2018
July's critical patch update addresses 334 security vulnerabilities (including 61 rated critical) covering a vast swathe of the Oracle enterprise portfolio.
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Data Breach Today
JULY 16, 2018
Exposed Data Includes Victims' Birth Date, Gender, Country Code and IP Address Timehop, the social media app that resurfaces older social media posts for entertainment, says its ongoing investigation has revealed that an attacker may have compromised more personal information than it previously suspected over the course of a breach that lasted at least seven months.
AIIM
JULY 17, 2018
Last week, we opened up registration for The AIIM Conference 2019 - our annual conference that brings together over 600 information professionals from around the world for 3 days of learning, networking, and fun. If you've never been to one of our conferences or haven't been in a few years, you may be wondering what to expect. Sure, we could try and write up something up and do our best to describe it, but we have a better idea - hear it directly from last year's attendees, keynote speakers, and
Schneier on Security
JULY 20, 2018
The company ProtectWise just published a long report linking a bunch of Chinese cyber-operations over the past few years. The always interesting gruqq has some interesting commentary on the group and its tactics. Lots of detailed information in the report, but I admit that I have never heard of ProtectWise or its research team 401TRG. Independent corroboration of this information would be helpful.
The Guardian Data Protection
JULY 19, 2018
The Australian Digital Health Agency’s bullish approach to My Health Record shows it learned no lessons from the UK’s disastrous version A three-month countdown clock alerted many Australians this week to the government’s progress on a massive, mandatory health data centralisation scheme. Known as My Health Record , the scheme compulsorily enlists all Australians into sharing their health information, unless they opt out before the deadline of 15 October 2018.
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
Data Breach Today
JULY 19, 2018
US Accuses Alexander Vinnik of $4 Billion in Bitcoin Money Laundering A Greek court has ruled that Russian national Alexander Vinnik will be sent to France to face cybercrime charges. The U.S. has accused Vinnik of laundering $4 billion in bitcoins via the BTC-e exchange, which it said also handled stolen Mt. Gox and Silk Road bitcoins.
Collaboration 2.0
JULY 15, 2018
Like the early stages of the dot com boom, the initial speculative crypto bubble is over. Expect waves of rapid evolution next, as maturity kicks in and serious players emerge and scale.
Hunton Privacy
JULY 17, 2018
On June 27, 2018, the Ministry of Public Security of the People’s Republic of China published the Draft Regulations on the Classified Protection of Cybersecurity (?????????????????) (“Draft Regulation”) and is seeking comments from the public by July 27, 2018. Pursuant to Article 21 of the Cybersecurity Law , the Draft Regulation establishes the classified protection of cybersecurity.
WIRED Threat Level
JULY 18, 2018
Buried in media scholar Jonathan Albright's research was proof of a massive political misinformation campaign. Now he's taking on the the world's biggest platforms before it's too late.
Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage
When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.
Data Breach Today
JULY 17, 2018
Expert: Latest Attack on Healthcare Sector - Growing Target Medical laboratory testing firm LabCorp. is investigating a weekend cyberattack on its IT network, which was resulted in the company taking certain processes offline. The attack is just the latest cyber assault on the healthcare sector.
TAB OnRecord
JULY 19, 2018
Our most popular resources this month cover: RIM software for a hybrid environment, file classification, and navigating mergers and acquisitions. Five tips for selecting and implementing RIM software in the hybrid environment This guide offers five tips to help you select and implement software for the hybrid records management environment. You will learn about: ?
Security Affairs
JULY 17, 2018
Researchers have developed a tool that poses as GPS satellites to deceive nearby GPS receivers and manipulate road navigation systems. Researchers have developed a tool that poses as GPS satellites to deceive nearby GPS receivers. The kit could be used to deceive receivers used by navigation systems and suggest drivers the wrong direction. “we explore the feasibility of a stealthy manipulation attack against road navigation systems.
IT Governance
JULY 18, 2018
Now that the EU GDPR (General Data Protection Regulation) has been in effect for a couple of months, you’ve hopefully become acquainted with its definition of personal data: “any information relating to an identified or identifiable natural person”. But what exactly does this mean? And did you know that the GDPR includes a sub-category of sensitive personal data that comes with its own requirements?
Advertisement
Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.
Data Breach Today
JULY 17, 2018
Traditional server security controls were not built for ransomware, cryptojacking and other modern attacks. Paul Murray of Sophos discusses deep learning, anti-exploit technology and other key elements of the new wave of server defenses.
WIRED Threat Level
JULY 16, 2018
A new facial recognition tool by RealNetworks aims to keep kids safe in school. But privacy experts fear the unchecked surveillance of kids could go awry.
Security Affairs
JULY 15, 2018
Researchers from the Z-Lab at CSE Cybsec analyzed a new collection of malware allegedly part of a new espionage campaign conducted by the APT28 group. It was a long weekend for the researchers from the Z-Lab at CSE Cybsec that completed the analysis a number of payloads being part of a new cyber espionage campaign conducted by the Russian APT28 group (aka Fancy Bear , Pawn Storm , Sednit , Sofacy, and Strontium ).
The Texas Record
JULY 17, 2018
As more organizations move from paper to electronic records, records management professionals face more complex challenges in managing these records. In their effort to maintain seamless records management processes within their organization, records managers expressed interest in products that specifically automate key records processes and controls.
Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL
Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.
Data Breach Today
JULY 20, 2018
SamSam, Other Ransomware Still Menacing Healthcare Sector Medical testing laboratory firm LabCorp is still working to fully recover systems functionality nearly a week after a cyberattack that the company now claims involved "a new variant" of ransomware. What can other organizations do to avoid becoming the next victim?
Threatpost
JULY 19, 2018
Hackers are embedding malicious code within compromised, uploaded images on trusted Google sites – weaponizing the website and staying under the radar.
Security Affairs
JULY 16, 2018
A security researcher discovered that the IoT search engine ZoomEye has cached login passwords for tens of thousands of Dahua DVRs. The IoT search engine ZoomEye has cached login passwords for tens of thousands of Dahua DVRs, the discovery was made by security researcher Ankit Anubhav, Principal Researcher at NewSky Security. Anubhav explained that the passwords are related to Dahua DVRs running very old firmware that is known to be affected by a five-year-old vulnerability tracked as CVE-2013
Let's personalize your content