Sat.Feb 24, 2018 - Fri.Mar 02, 2018

article thumbnail

Darknet Vendors Sell Counterfeit TLS Certificates

Data Breach Today

Pro Tip: Change TLS Certificates Regularly For Better Data Security Certificate Authorities continue to be tricked into issuing bogus TLS certificates. A study by Recorded Future found that there are at least three underground vendors that can supply fraudulent TLS certificates, which pose serious risks to data security and privacy.

Privacy 184
article thumbnail

A 1.3Tbs DDoS Hit GitHub, the Largest Yet Recorded

WIRED Threat Level

On Wednesday, a 1.3Tbps DDoS attack pummeled GitHub for 15-20 minutes. Here's how it stayed online.

IT 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'Living laboratories': the Dutch cities amassing data on oblivious residents

The Guardian Data Protection

In Eindhoven and Utrecht smart tech is tackling traffic, noise and crime. But with privacy laws proving futile and commercial companies in on the act, are the plans as benign as they seem? Stratumseind in Eindhoven is one of the busiest nightlife streets in the Netherlands. On a Saturday night, bars are packed, music blares through the street, laughter and drunken shouting bounces off the walls.

Privacy 111
article thumbnail

Great Data Scientists Don’t Just Think Outside the Box, They Redefine the Box

Bill Schmarzo - Dell EMC

Special thanks to Michael Shepherd, AI Research Strategist, Dell EMC Services, for his co-authorship. Learn more about Michael at the bottom of this post. Imagine you wanted to determine how much solar energy could be generated from adding solar cells to a particular house. This is what Google’s Project Sunroof does with Deep Learning. Enter an address and Google uses a Deep Learning framework to estimate how much money you could save in energy costs with solar cells over 20 years (see Figure 1)

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Leak of 23,000 Private Keys Triggers Security Scramble

Data Breach Today

Digital Certificate Revocation Blame Game: Trustico Swaps Blows With DigiCert Digital certificate vendor Trustico is sparring with DigiCert, which recently took over Symantec's digital certificate business, following a serious security incident. The private keys for at least 23,000 Trustico digital certificates have been compromised, prompting a scramble to protect affected websites.

Security 183

More Trending

article thumbnail

Insights about the first three years of the Right To Be Forgotten requests at Google

Elie

The "Right To Be Forgotten" (RTBF) is the landmark European ruling that governs the delisting of personal information from search results. This ruling establishes a right to privacy, whereby individuals can request that search engines delist URLs from across the Internet that contain “inaccurate, inadequate, irrelevant or excessive” information surfaced by queries containing the name of the requester.

Privacy 107
article thumbnail

Millions of Office 365 Accounts Hit with Password Stealers

Dark Reading

Phishing emails disguised as tax-related alerts aim to trick users into handing attackers their usernames and passwords.

Passwords 103
article thumbnail

Equifax Discloses 2.4 Million More Mega-Breach Victims

Data Breach Today

Breach Costs Hit $114 Million, But Data Broker Still Sees Revenues Rise Equifax has identified 2.4 million U.S. consumers whose names and snippets of their driver's license numbers were stolen, adding to one of the worst breaches in history, which resulted in personal data for nearly every U.S. adult being exposed.

article thumbnail

How Liberals Amped Up a Parkland Shooting Conspiracy Theory

WIRED Threat Level

A fake story about a Parkland student started on the right, but outrage-tweeting on the left propelled it into the mainstream.

IT 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

I've Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned

Troy Hunt

tl;dr - a collection of nearly 3k alleged data breaches has appeared with a bunch of data already proven legitimate from previous incidents, but also tens of millions of addresses that haven't been seen in HIBP before. Those 80M records are now searchable, read on for the full story: There's an unknown numbers of data breaches floating around the web.

article thumbnail

How & Why the Cybersecurity Landscape Is Changing

Dark Reading

A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.

article thumbnail

SEC Reportedly Launches Cryptocurrency Probe

Data Breach Today

Report: Dozens of Firms and Advisers Behind Initial Coin Offerings Receive Subpoenas The U.S. Securities and Exchange Commission has reportedly issued dozens of subpoenas and requests for information to technology companies, executives and advisers involved in initial coin offerings. The regulator's new cyber unit investigates ICOs, which attempt to raise funds for cryptocurrency ventures.

Security 145
article thumbnail

Replay Sessions From Mixpanel and Others Have Recorded Passwords

WIRED Threat Level

Analytics services are unintentionally collecting a mass of passwords and other sensitive data, new research shows.

Passwords 111
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Immigration officials to continue to seek NHS England patient data

The Guardian Data Protection

Ministers reject calls to suspend practice amid fears it is stopping migrants seeking medical help Ministers have rejected a call from MPs to immediately suspend the disclosure of confidential NHS patient data to the Home Office to trace potential immigration offenders despite evidence it is deterring migrants in England from seeking medical help. A joint letter from Home Office and health ministers to the chair of the Commons health select committee discloses that 1,297 requests for non-clinica

IT 86
article thumbnail

I Wanna Go Fast: Why Searching Through 500M Pwned Passwords Is So Quick

Troy Hunt

In the immortal words of Ricky Bobby, I wanna go fast. When I launched Pwned Passwords V2 last week , I made it fast - real fast - and I want to talk briefly here about why that was important, how I did it and then how I've since shaved another 56% off the load time for requests that hit the origin. And a bunch of other cool perf stuff while I'm here.

article thumbnail

Data Cache May Contain 2,800 Partly Undiscovered Breaches

Data Breach Today

Organizations Scramble After 80 Million Potentially Breached Records Surface An analysis of a massive 8.8 GB trove of files containing usernames and plaintext passwords suggests hundreds of services may have experienced unreported or undiscovered data breaches. Data breach expert Troy Hunt says the trove of 80 million records appears to contain fresh data.

article thumbnail

Chrome's WebUSB Feature Leaves Some Yubikeys Vulnerable to Attack

WIRED Threat Level

While still the best protection against phishing attacks, some Yubikey models are vulnerable after a recent update to Google Chrome.

Phishing 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Securing Containers for GDPR Compliance

Thales Cloud Protection & Licensing

Around the world, enterprises are anxious about May 25, 2018, the day enforcement begins for the European Union’s General Data Protection Regulation (GDPR). They have good reason. Perhaps the most comprehensive data privacy standard to date, the GDPR presents a significant challenge for organizations that process the personal data of EU citizens – regardless of where the organization is headquartered or processes the data.

GDPR 82
article thumbnail

How the Move to Content Services Makes CX More Challenging

AIIM

Ultimately, transforming customer experiences is more than conventional change. It is about doing things differently – and doing different things as well. And different not just for the sake of being different, but in support of the key strategic objectives facing every organization in the age of digital disruption. The shift to a more modular “content services” strategy to address large issues like cloud changes and an increasingly chaotic multi-vendor content environment creates additional cha

article thumbnail

Cryptocurrency Theft: Hackers Repurpose Old Tricks

Data Breach Today

Web Injects, Malware, Phishing and Fake Advertising Used in Attack Arsenal Criminals continue their quest for acquiring cryptocurrencies without having to buy and manage their own mining equipment. They're resorting to attacks aimed at stealing the cryptocurrencies via hacking, phishing, fake advertising and web injection attacks via repurposed banking Trojans.

Mining 133
article thumbnail

Facebook Doesn't Know How Many People Followed Russians on Instagram

WIRED Threat Level

By leaving Instagram followers off the public record, Columbia researcher Jonathan Albright says Facebook is making the Russian trolls' true audience appear artificially low.

Security 110
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

If I'm honest, I'm constantly surprised by the extent of how far Have I Been Pwned (HIBP) is reaching these days. This is a little project I started whilst killing time in a hotel room in late 2013 after thinking "I wonder if people actually know where their data has been exposed?" I built it in part to help people answer that question and in part because my inner geek wanted to build an interesting project on Microsoft's Azure.

article thumbnail

7 Key Stats that Size Up the Cybercrime Deluge

Dark Reading

Updated data on zero-days, IoT threats, cryptomining, and economic costs should keep eyebrows raised in 2018.

IoT 79
article thumbnail

'NanoCore RAT' Developer Gets 33-Month Prison Sentence

Data Breach Today

Arkansas Man Admits Developing, Selling Software Intended for Malicious Use Arkansas developer Taylor Huddleston has been sentenced to serve more than two years in prison for developing, marketing and selling two tools designed to be used maliciously - the NanoCore remote access Trojan and Net Seal license software.

article thumbnail

Russia's Olympics Hack Was the Country's Latest False Flag Attack

WIRED Threat Level

The Kremlin's hacking misdirection is evolving. And even when those attempts to confuse forensics fail, they still succeed at sowing future doubt.

Security 110
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Tracking desktop ransomware payments end to end

Elie

Ransomware is a type of malware that encrypts the files of infected hosts and demands payment, often in a crypto-currency such as Bitcoin. In this paper, we create a measurement framework that we use to perform a large-scale, two-year, end-to-end measurement of ransomware payments, victims, and operators. By combining an array of data sources, including ransomware binaries, seed ransom payments, victim telemetry from infections, and a large database of Bitcoin addresses annotated with their owne

article thumbnail

Color-coded filing systems: Reduce downtime and increase ROI – Part 1

TAB OnRecord

In 1967, TAB launched CompuColor® labeling products for application in computer punch cards. Forty-five years later, punch cards are computing history, but color-coded filing techniques are still an integral part of effective information management. What is it that allows color-coding to transcend its original purpose and remain popular four decades later?

article thumbnail

IoT Devices: Reducing the Risks

Data Breach Today

Attorney Steven Teppler, who recently wrote a report that addresses risks related to the internet of things, offers insights on risk management steps organizations in all sectors must take as IoT devices proliferate in the enterprise.

IoT 127