Sat.Jan 06, 2018 - Fri.Jan 12, 2018

article thumbnail

Toymaker VTech Settles FTC Privacy Lawsuit For $650,000

Data Breach Today

Message From FTC to Toymakers: Don't Mess With Kids' Privacy One of the most alarming breaches of 2015, involving Hong Kong toymaker VTech, has resulted in a $650,000 settlement with the U.S. Federal Trade Commission. It's a warning that internet of things security shortcomings - especially involving children's personal data - will have business consequences.

Privacy 169
article thumbnail

Speaking of: Blockchain (with Alan Pelz-Sharpe)

Weissman's World

If a picture is worth 1000 words, then what’s a 15-minute video worth? Tons, especially when the subject is blockchain, and the guest expert is Alan Pelz-Sharpe! Join our discussion of the disruptive force blockchain will prove to be in records and information governance. The post Speaking of: Blockchain (with Alan Pelz-Sharpe) appeared first on Holly Group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Clever Radio Trick Can Tell If a Drone Is Watching You

WIRED Threat Level

A quirk of video compression lets spy targets see what the drone watching them sees.

Security 112
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

India's Aadhaar implementation is the largest biometric system in the world, holding about 1.2 billion locals' data. It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. It's also an era where this sort of information is constantly leaked to unauthorised parties; last year Equifax lost control of 145.5 million records on US consumers (this started a series events which ultimately led to me testifying in front of Congre

Security 111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Meltdown and Spectre Forecast: Patch Now and Keep Patching

Data Breach Today

Activate Available Browser Defenses Without Delay, Security Experts Warn Patch or perish to protect against Meltdown and Spectre attacks, and prepare to keep patching as Intel, AMD and ARM, as well as makers of devices running Apple, Google and Windows operating systems, including Apple iOS and Android smartphones and tablets, continue to refine their fixes.

Security 168

More Trending

article thumbnail

Tech Companies Are Complicit in Censoring Iran Protests

WIRED Threat Level

Opinion: Google, Twitter, and Signal should take steps to ensure their tools aren’t restricting Iranian’s free speech.

Security 111
article thumbnail

Data protection bill amended to protect security researchers

The Guardian Data Protection

Exemption added after researchers said efforts to demonstrate inadequate anonymisation could fall foul of law The government is to amend the data protection bill to protect security researchers who work to uncover abuses of personal data, quelling fears that the bill could accidentally criminalise legitimate research. The move follows a Guardian report on the concerns , and has been welcomed by one of the researchers who raised the alarm.

article thumbnail

Microsoft Pauses Windows Security Updates to AMD Devices

Data Breach Today

Security Update Leaves Some Devices Unbootable; Microsoft Blames AMD Microsoft has paused issuing security updates to some Windows PCs with AMD chipsets after at least one update - meant to add some Meltdown and Spectre mitigations - has left some systems unbootable. Microsoft blamed the problem on AMD failing to properly document its firmware.

Security 167
article thumbnail

Steven Clark AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Steven Clark. Email steven_f_clark@raytheon.com. LinkedIn Profile [link]. Job Title Company Record Manager. Company Raytheon. Please provide one or two points that you will mention during your session Content analytics can be used to your advantage but it does take time and dedication.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Congress Renews FISA Warrantless Surveillance Bill For Six More Years

WIRED Threat Level

The House of Representatives Thursday strengthened spying powers authorized under Section 702 of the 2008 FISA Amendments Act.

Security 112
article thumbnail

Profile of the Month: Cindy Provin, Chief Executive Officer

Thales Cloud Protection & Licensing

Cindy Provin is a 20-year veteran at Thales. This month, she became the CEO for Thales eSecurity. Previously, she served as the President for Thales eSecurity Americas, and Chief Strategy & Marketing Officer for Thales eSecurity. In her new role as CEO, Cindy will be responsible for leading a world-class organization and delivering a portfolio of security solutions to protect data wherever it is created, shared or stored.

article thumbnail

Backdoored in 30 Seconds: Attack Exploits Intel AMT Feature

Data Breach Today

Physical Access Plus Default AMT Credentials Equals Takeover, F-Secure Warns An attacker who gains physical access to a corporate PC with an Intel chip could exploit the built-in Active Management Technology to backdoor the system in about 30 seconds, unless default AMT credentials have been changed, Finnish security firm F-Secure warns.

Access 164
article thumbnail

Tammy Mackenzie AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Tammy Mackenzie. Email Tammymackenziee@gmail.com. LinkedIn Profile [link]. Job Title Document Manager. Company Aecon. Please provide one or two points that you will mention during your session. 1) Planning leads to success. 2) Have the Right people, right places, right time.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

WhatsApp Encryption Security Flaws Could Allow Snoops to Slide Into Group Chats

WIRED Threat Level

German researchers say that a flaw in the app's group-chat feature undermines its end-to-end encryption promises.

article thumbnail

AI in Cybersecurity: Where We Stand & Where We Need to Go

Dark Reading

How security practitioners can incorporate expert knowledge into machine learning algorithms that reveal security insights, safeguard data, and keep attackers out.

article thumbnail

Carphone Warehouse Breach: 'Striking' Failures Trigger Fine

Data Breach Today

Attacker Breached WordPress Installation Outdated by 6 Years Mobile phone retailer Carphone Warehouse has been hit with one of the largest fines ever imposed by Britain's data privacy watchdog after an attacker breached its outdated WordPress installation, exposing 3 million customers' and 1,000 employees' personal details.

Retail 162
article thumbnail

XKCD's Smartphone Security System

Schneier on Security

Funny.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Skype Introduces End-to-End Encrypted Texts and Voice

WIRED Threat Level

After years of lingering questions about Skype's commitment to protecting user data, it will soon offer end-to-end encryption to its 300 million monthly users.

article thumbnail

Gina Smith-Guidi AIIM18 Speaker Interview

AIIM

Name Gina Smith-Guidi. Email gina.guidi@edmonton.ca. Job Title Principal Information Manager. Company City of Edmonton. Please provide one or two points that you will mention during your session. - Implement solutions that work behind the scenes and do not change the way people work - Approach challenges with a flexible, unconventional mindset. Where do you see the information management industry in 5 years?

article thumbnail

Performance Hit: Meltdown and Spectre Patches Slow Systems

Data Breach Today

Intel, Microsoft and Linux Confirm Slowdowns - Especially For Servers, Older PCs Fixes for the Meltdown and Spectre vulnerabilities are leading to decreased processor performance, triggering cloud service and data center slowdowns. All Windows servers - plus older PCs - as well as Linux servers appear to be experiencing noticeable slowdowns.

Cloud 162
article thumbnail

Privacy: The Dark Side of the Internet of Things

Dark Reading

Before letting an IoT device into your business or home, consider what data is being collected and where it is going.

IoT 79
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

How the Government Hides Secret Surveillance Programs

WIRED Threat Level

A new report from Human Rights Watch sheds light on a troubling law enforcement practice called “parallel construction.”.

article thumbnail

Daniel Abdul AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Daniel Abdul. Email daniel.abdul@gmail.com. LinkedIn Profile [link]. Job Title VP Data Solutions Strategy and Commercial Solutions. Company UHG. Please provide one or two points that you will mention during your session.

article thumbnail

Malware Writer Allegedly Spied On Computers for 13 Years

Data Breach Today

Justice Department Accuses Ohio Man of Authoring 'Fruitfly' Malware A 28-year-old Ohio man has been accused of running a 13-year spying scheme that used malware to steal millions of photos, live images and other data from computers. He is accused of developing and using Fruitfly, a malware application for Apple Macs and Windows.

160
160
article thumbnail

Wi-Fi Alliance Launches WPA2 Enhancements and Debuts WPA3

Dark Reading

WPA2 protocol enhancements bring stronger security protection and best practices, while new WPA3 protocol offers new security capabilities.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How Meltdown and Spectre Were Independently Discovered By Four Research Teams At Once

WIRED Threat Level

The uncanny coincidences among the Meltdown and Spectre discoveries raise questions about "bug collisions"—and the safety of the NSA's hidden vulnerability collection.

Security 112
article thumbnail

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example

CGI

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example. pooja.cs@cgi.com. Wed, 01/10/2018 - 15:25. Ten years ago, I had three devices connected to my home Internet, used intermittently, allowing my family and me to be more efficient, flexible, informed, and entertained. Now, I have 33 devices, collectively connected to the Internet, 24x7.

Mining 78
article thumbnail

Patch Now or Risk GDPR Fines Later, Regulator Warns

Data Breach Today

Failures Discovered After Privacy Law Takes Effect Face Retroactive Punishment Following the alert over Meltdown and Spectre vulnerabilities, the U.K. Information Commissioner's Office is warning that failures to patch today could be punished with fines under GDPR, once enforcement of the data protection law begins later this year.

GDPR 159