Sat.Apr 07, 2018 - Fri.Apr 13, 2018

article thumbnail

Facebook's Zuckerberg Pledges Worldwide GDPR Compliance

Data Breach Today

Second Congressional Hearing Probes Privacy Issues At a U.S. House hearing Wednesday, Facebook CEO Mark Zuckerberg said the company would eventually comply worldwide with the European Union's tough privacy law, the General Data Protection Regulation.

article thumbnail

How to check whether Facebook shared your data with Cambridge Analytica

The Guardian Data Protection

People who fear their information may have been used by Cambridge Analytica can go to a new help page Tell us how you’ve been affected by the Facebook data breach Facebook has started the process of notifying the approximately 87 million users whose data was harvested by the election consultancy Cambridge Analytica. The social network eventually hopes to inform every user who was affected with a warning at the top of their Facebook news feed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cambridge Analytica Could Also Access Private Facebook Messages

WIRED Threat Level

A Facebook permission allowed an app to read messages between 1,500 Facebook users and their friends until October 2015—data that Cambridge Analytica could have accessed.

Access 111
article thumbnail

Identifying the Root Causes to the Delays and Exceptions In Your Processes

AIIM

When you’re working to document your processes, an initial goal is to map the workflow of the typical, standard task, getting the most common branches outlined. This will comprise of the steps you know well, the steps that already run fairly smoothly. Yes, this will not cover every scenario, but that’s ok at this stage. An interpretation of Pareto’s Principle , otherwise known as The 80/20 Rule is that 80% of the completed work will come from 20% of the scenarios.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

200,000 Cisco Network Switches Reportedly Hacked

Data Breach Today

What Remediation Steps Should Be Taken? Over 200,000 Cisco networks switches worldwide reportedly were hacked Friday, apparently affecting critical infrastructure of large internet service providers and data centers across the world, especially in Iran, Russia, the United States, China, Europe and India. What remediation steps should be taken?

189
189

More Trending

article thumbnail

How to Check If Cambridge Analytica Could Access Your Facebook Data

WIRED Threat Level

Facebook has released a tool that lets you see if you were caught up in the Cambridge Analytica fiasco—and what other apps know about you know.

Access 111
article thumbnail

Post-quantum confidentiality for TLS

Imperial Violet

In 2016, my colleague, Matt Braithwaite, ran an experiment in Google Chrome which integrated a post-quantum key-agreement primitive ( NewHope ) with a standard, elliptic-curve one (X25519). Since that time, the submissions for the 1 st round of NIST’s post-quantum process have arrived. We thus wanted to consider which of the submissions, representing the new state of the art, would be most suitable for future work on post-quantum confidentiality in TLS.

Paper 88
article thumbnail

Securing the News

Data Breach Today

Time Inc.'s Deputy CISO on the Challenge of Ensuring Content Security In this era of "fake news," Time Inc. Deputy CISO Preeti Palanisamy takes seriously the challenge of maintaining the integrity of journalism from content creation through production and eventual publication.

Security 184
article thumbnail

Zuckerberg got off lightly. Why are politicians so bad at asking questions? | Jonathan Freedland

The Guardian Data Protection

Senators let Facebook’s founder off the hook – but that’s got nothing to do with them being tech dinosaurs Mark Zuckerberg: Facebook CEO faces second day of questioning – live When Mark Zuckerberg appears on Capitol Hill again for a second round of questioning, he will be hoping for nothing so much as a rerun of yesterday’s performance. That went so well, Facebook’s share price leapt 4.5% on the day – with most of the boost coinciding with Zuckerberg’s supposed grilling by a committee of senator

IT 107
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Questions Zuckerberg Should Have Answered About Russia

WIRED Threat Level

Russian agents used Facebook to influence the 2017 election. Congress missed the chance to delve into what the company knows about it—and how they’ll stop it in 2018.

IT 103
article thumbnail

Obscure E-Mail Vulnerability

Schneier on Security

This vulnerability is a result of an interaction between two different ways of handling e-mail addresses. Gmail ignores dots in addresses, so bruce.schneier@gmail.com is the same as bruceschneier@gmail.com is the same as b.r.u.c.e.schneier@gmail.com. (Note: I do not own any of those email addresses -- if they're even valid.) Netflix doesn't ignore dots, so those are all unique e-mail addresses and can each be used to register an account.

article thumbnail

HHS Warns of SamSam Ransomware Attacks

Data Breach Today

At Least Eight U.S. Organizations Hit So Far This Year The Department of Health and Human Services is warning the healthcare sector about ongoing attacks involving SamSam ransomware that have impacted at least eight U.S. organizations so far this year. What mitigation steps are recommended?

article thumbnail

Don’t just blame Facebook for taking your data – most online publishers are at it too | John Naughton

The Guardian Data Protection

Online surveillance is rife but there are plenty of tools available to help preserve your privacy If a picture is worth a thousand words, then a good metaphor must be worth a million. In an insightful blog post published on 23 March, Doc Searls, one of the elder statesman of the web, managed to get both for the price of one. His post was headed by one of those illustrations of an iceberg showing that only the tip is the visible part, while the great bulk of the object lies underwater.

IT 97
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

A Long-Awaited IoT Crisis Is Here, and Many Devices Aren't Ready

WIRED Threat Level

Some network communication protocol vulnerabilities have been known for more than a decade and still aren't fixed. Now they're being exploited.

IoT 110
article thumbnail

Reader Favorites April 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover RIM software success, records protection and recovery, and green file storage solutions. Learn about strategies to ensure your RIM software is successful, how your RIM program strategy can help your organization after a large scale disaster in a hybrid environment, and how to reduce your environmental impact through [.

article thumbnail

Uber Faces Stricter FTC Oversight After Concealing Breach

Data Breach Today

Company Must Submit More Audit Reports, Keep Bug Bounty Records Uber has agreed to stricter monitoring by the U.S. Federal Trade Commission following its concealment of a 2016 data breach while it was negotiating with the agency for a settlement tied to a separate, yet similar, breach two years prior.

article thumbnail

Five questions Mark Zuckerberg should be asked by Congress

The Guardian Data Protection

As embattled Facebook founder appears before Congress again, here is what should be put to him Zuckerberg made the rookie error of leaving out his notes, which an AP reporter promptly snapped. One section said: “Break up FB? US tech companies key asset for America; break up strengthens Chinese companies.” Really? That’s the best you’ve got? The senators need to drive this one home hard.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Mark Zuckerberg Makes Facebook Privacy Sound So Easy

WIRED Threat Level

[In his testimony to Congress, Facebook CEO Mark Zuckerberg repeatedly misrepresented the amount of control Facebook users really have over their data.]([link].

Privacy 96
article thumbnail

Why next-generation execs should care about data governance

IBM Big Data Hub

There’s a general need for next-gen executives to not only understand corporate regulations, but be able to adhere to and follow them using metadata solutions like data governance. As the business world’s top asset becomes data, data governance will ensure that data and information being handled is consistent, reliable and trustworthy. Establishing and deploying an analytics platform that embeds data governance and data integration, amongst other solutions, has never been more critical.

article thumbnail

The Burden of Business Email Compromise

Data Breach Today

Agari's Dan Hoffmann Outlines the Scale and Cost Business email compromise attacks that impersonate executives and business partners to trick employees are "the biggest security issue in all of technology today," says Dan Hoffmann of Agari.

Security 128
article thumbnail

Instagram to let users download everything they have ever shared

The Guardian Data Protection

New portability tool will allow users to extract copy of own content posted on social network Instagram has confirmed it will let users download their personal data, including previously shared photos, videos and messages, as it prepares for the European data regulation GDPR. While its parent company, Facebook, had announced a suite of GDPR controls, which Mark Zuckerberg emphasised during his testimony to Congress this week, Instagram had been quiet on the issue.

GDPR 88
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How Android Phones Hide Missed Security Updates From You

WIRED Threat Level

A study finds that Android phones aren't just slow to get patched; sometimes they lie about being patched when they're not.

Security 108
article thumbnail

Security Product Management at Large Companies vs. Startups

Lenny Zeltser

Is it better to perform product management of information security solutions at a large company or at a startup? Picking the setting that’s right for you isn’t as simple as craving the exuberant energy of a young firm or coveting the resources and brand of an organization that’s been around for a while. Each environment has its challenges and advantages for product managers.

article thumbnail

How to Predict Insider Fraud

Data Breach Today

CMU CERT Researcher Randy Trzeciak on the Power and Promise of Emerging Technology When insider threat researcher Randy Trzeciak looks at artificial intelligence and machine learning, he sees the potential for technology to help organizations predict potentially dangerous insider behavior - not just respond to it.

article thumbnail

Is your friend getting a cheaper Uber fare than you are? | Arwa Mahdawi

The Guardian Data Protection

We have no idea how much data tech firms have on us – but more companies are using it to personalize their prices We all know that ride-share companies like Uber and Lyft operate dynamic, or “surge”, pricing: they change their prices in real time, according to supply and demand. But is there something else behind these fluctuations in fees? Is your taxi fare actually being personalized according to how much the company thinks you are willing to pay?

IT 87
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

This Radio Hacker Could Hijack Emergency Sirens to Play Any Sound

WIRED Threat Level

Balint Seeber found that cities around the US are leaving their emergency siren radio communication systems unencrypted and vulnerable to spoofing.

article thumbnail

Word Attachment Delivers FormBook Malware, No Macros Required

Threatpost

A new wave of document attacks targeting inboxes do not require enabling macros in order for adversaries to trigger an infection chain that ultimately delivers FormBook malware.

78
article thumbnail

Facebook's Zuckerberg Takes First Drubbing in D.C.

Data Breach Today

Florida Sen. Bill Nelson: 'Facebook Failed Us' Facebook CEO Mark Zuckerberg informally met with U.S. lawmakers on Monday ahead of two congressional hearings, where he is expected to face a bruising examination. One senator was blunt with Zuckerberg, contending that on data privacy "Facebook failed us.