Sat.Dec 09, 2017 - Fri.Dec 15, 2017

article thumbnail

Cryptocurrency Infrastructure Flaws Pose Bitcoin Risks

Data Breach Today

Major Cybercrime Gangs Shift From Hacking Banks to Bitcoins Bitcoin's massive rise in value and hype continues to draw the attention of hackers, scammers and organized crime. Flaws in bitcoin mining firmware and hacks of wallet software show that the infrastructure associated with cryptocurrency is not always well-secured.

Risk 186
article thumbnail

MobileCoin: A New Cryptocurrency From Signal Creator Moxie Marlinspike

WIRED Threat Level

MobileCoin aims to make cryptocurrency transactions quick and easy for everyone, while still preserving privacy and decentralization.

Privacy 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukip to face tribunal over use of data in EU referendum campaign

The Guardian Data Protection

Information commissioner announces inquiry into parties’ use of personal information after Ukip’s refusal to cooperate Ukip is to face a tribunal over its use of analytics during the EU referendum after refusing to cooperate with an investigation by the Information Commissioner’s Office (ICO). The ICO announced a formal investigation into how political parties use data analytics to target voters in response to concern about how social media was used during the referendum.

Analytics 111
article thumbnail

Tracking People Without GPS

Schneier on Security

Interesting research : The trick in accurately tracking a person with this method is finding out what kind of activity they're performing. Whether they're walking, driving a car, or riding in a train or airplane, it's pretty easy to figure out when you know what you're looking for. The sensors can determine how fast a person is traveling and what kind of movements they make.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Report: Russian Hackers Target Banks in US, Britain, Russia

Data Breach Today

Nearly $10 Million Stolen from 20 Institutions in Past 1½ Years A group of Russian-speaking hackers over the past year-and-a-half has stolen nearly $10 million from banks, mostly in the United States, Britain and Russia, the Moscow-based, according to cybersecurity firm Group-IB.

More Trending

article thumbnail

I'm Sorry You Feel This Way NatWest, but HTTPS on Your Landing Page Is Important

Troy Hunt

Occasionally, I feel like I'm just handing an organisation more shovels - "here, keep digging, I'm sure this'll work out just fine." The latest such event was with NatWest (a bank in the UK), and it culminated with this tweet from them: I'm sorry you feel this way. I can certainly pass on your concerns and feed this back to the tech team for you Troy?

article thumbnail

Security Planner

Schneier on Security

Security Planner is a custom security advice tool from Citizen Lab. Answer a few questions, and it gives you a few simple things you can do to improve your security. It's not meant to be comprehensive, but instead to give people things they can actually do to immediately improve their security. I don't see it replacing any of the good security guides out there, but instead augmenting them.

article thumbnail

Significant Changes Coming to NIST Cybersecurity Framework

Data Breach Today

The latest ISMG Security Report focuses on the significant changes found in the latest version of the U.S. government's Framework for Improving Critical Infrastructure Cybersecurity, commonly known as the NIST cybersecurity framework. NIST seeks comments from stakeholders on the draft of version 1.1 of the framework by Jan. 19.

article thumbnail

Bots and Form Letters Make It Nearly Impossible to Find Real FCC Net Neutrality Comments

WIRED Threat Level

Over seven months, 39 Nicholas Thompsons submitted net neutrality comments to the FCC. We tried to track each of them down.

IT 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

5 Questions to Ask About Your Social Media Records as Legal Evidence 

AIIM

It's an embarrassing question to ask most organizations, but does your social media presence reflect the reality that the responsibility of business documentation doesn’t go away just because the information is on social media? The reality for most organizations is NO. Recent research conducted by Iron Mountain revealed that 76 percent of businesses regard communications by social media as formal business records, but 46 percent have no idea that they carry legal responsibility for their content

article thumbnail

The future of API banking dominates SIBOS

OpenText Information Management

Something that barely raised any interest only two years ago was the focus of many of the discussions at this year’s SIBOS. The use of APIs in banking has rapidly gone from a peripheral issue to central to the thinking for many banks. As banks are beginning to gear up for API-related business, the question … The post The future of API banking dominates SIBOS appeared first on OpenText Blogs.

article thumbnail

How Malware Known as Triton Threatens Public Safety

Data Breach Today

The latest ISMG Security Report leads with a report on a malware attack on an industrial safety system that experts contend could threaten public safety. Also, legislation giving DHS's cybersecurity unit a meaningful name progresses through Congress.

article thumbnail

Exclusive: Tracing ISIS’ Weapons Supply Chain—Back to the US

WIRED Threat Level

The Islamic State is designing and mass-producing its own advanced munitions—with parts from all over the world.

IT 112
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Is “embodied cognition” the future of AI?

IBM Big Data Hub

As happens so often, IBM is quietly laying the groundwork for the future. A recent step toward that future is TJBot, an unassuming, do-it-yourself cardboard robot that opens a window into what AI researchers are calling “embodied cognition.

IT 81
article thumbnail

Remote Hack of a Boeing 757

Schneier on Security

Last month, the DHS announced that it was able to remotely hack a Boeing 757: "We got the airplane on Sept. 19, 2016. Two days later, I was successful in accomplishing a remote, non-cooperative, penetration," said Robert Hickey, aviation program manager within the Cyber Security Division of the DHS Science and Technology (S&T) Directorate. "[Which] means I didn't have anybody touching the airplane, I didn't have an insider threat.

article thumbnail

Offshoring PHI: Addressing the Security Issues

Data Breach Today

Experts Offer Insights on Precautions to Take U.S. healthcare entities need to keep security top of mind if they use offshore services to handle protected health information, security experts say, pointing to specific steps to take.

Security 138
article thumbnail

The Grand Tor: How to Go Anonymous Online

WIRED Threat Level

You may already be familiar with TorBrowser. But the anonymous internet has a lot more to offer.

Security 112
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The rise of cyber crime

IT Governance

There’s no denying that cyber crime is getting worse every year, but how much has it actually risen over the past few years? Date. Number of records breached. 2010. 3.8 million. 2011. 174 million. 2012. 44 million. 2013. 822 million. 2014. 700 million. 2015. 736 million. 2016. 3.1 billion. With an increase of more than 3 billion records breached over six years, cyber crime is rapidly increasing and it doesn’t seem like organisations’ security functions are keeping up.

article thumbnail

How Good Privacy Practices Help Protect Your Company Brand

Dark Reading

Follow these five guidelines to keep your organization's data protected.

Privacy 77
article thumbnail

Critical Components of an Insider Threat Mitigation Program

Data Breach Today

Organizations should take an "inside-out" approach to mitigating the insider threat, says Brandon Swafford of Forcepoint, who explains the components of that approach in an in-depth interview.

127
127
article thumbnail

The Wired Guide to Digital Security, From Passwords to Faraday Cages

WIRED Threat Level

In an age of nonstop breaches and hacks, here are ways to improve your online security based on your level of risk, from average user to NSA contractor.

Passwords 111
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

A focus on practical usability in ApplicationXtender 16.3

OpenText Information Management

Welcome to the official first complete release of OpenText™ ApplicationXtender. One of the questions that customers and partners sometimes ask is “Why 16.3?” The answer is simple. The current release for all OpenText products is Release 16 and ApplicationXtender is no exception – processes, technologies and management are aligned with this approach.

article thumbnail

Malware Decompiler Tool Goes Open Source

Dark Reading

Avast's RetDec machine-code decompiler now available for free on Github.

77
article thumbnail

Don't Be a Money Mule for the Holidays

Data Breach Today

Cybercrime Money-Transfer Schemes Increasingly Involve Cryptocurrency Cybercriminals continue to rely on individuals who undertake the risky operation of moving illicit proceeds from one location to another. But these "money mules" face a multitude of risks, including imprisonment, police warn.

Risk 124
article thumbnail

How to Rip the Mics Out of Your MacBook and iPhone

WIRED Threat Level

One way to make sure no one's listening in on your private conversations? Drop the mics. Literally.

Security 111
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Court supports eDiscovery machine learning, addresses AI transparency

OpenText Information Management

No other court in the world has had more influence on the use of machine learning in litigation than the U.S. District Court for the Southern District of New York (the “SDNY”) and that tradition continues with the court’s new ruling in Winfield v. City of New York. There’s a lot to unpack in this 28-page … The post Court supports eDiscovery machine learning, addresses AI transparency appeared first on OpenText Blogs.

article thumbnail

Is a Good Offense the Best Defense Against Hackers?

Dark Reading

A proposed new law could make it legal for companies to hack back against attacker. But will it work?

IT 74
article thumbnail

Report: Uber Paid Florida 20-Year-Old $100,000 Over Hack

Data Breach Today

Takeaway: 'Bug Bounty' Plus NDA Still Looks Like Hush Money The hacker to whom Uber paid $100,000 to destroy data and keep quiet about its big, bad breach is a 20-year-old man living in Florida, Reuters reports. But numerous questions remain about the 2016 breach, including whether the payment was a bug bounty, extortion payoff or hush money.

IT 113