Sat.Jan 20, 2018 - Fri.Jan 26, 2018

article thumbnail

DDoS Attacker Targeted Banks, Police, Former Employer

Data Breach Today

Records From Hacked Stresser/Booter Service vDos Helped Unmask Suspect In separate cases, two hackers have either pleaded guilty or been sentenced to serve jail time in part for launching or facilitating DDoS attacks. One defendant, John Kelsey Gammell, was unmasked after taunting a former employer over the "ongoing IT issues" his DDoS attacks were causing.

IT 73
article thumbnail

Your Sloppy Bitcoin Drug Deals Will Haunt You For Years

WIRED Threat Level

Scouring the blockchain, researchers found years-old evidence tying Silk Road transaction to users' public accounts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why invest in custom file folders ?

TAB OnRecord

Getting the folder that meets your needs goes a long way to making sure your filing system is as functional as possible when it comes to workflow, retrieval, and security. If you are wondering if custom folders are a good fit for your organization, consider how they can help in the following areas: Read More. The post Why invest in custom file folders ?

article thumbnail

3 Challenges Created by an Ad Hoc Approach to Information Capture

AIIM

Scanning and information capture lead a curious double life. On one hand, it seems like we’ve been doing scanning and capture forever, at least within larger companies. Scanning and capture are stable, mature technologies with a well-documented ROI. On the other hand, they are still somewhat new when it comes to adoption by many smaller and mid sized organizations.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Allscripts Ransomware Attack a Reminder of Cloud Risks

Data Breach Today

Points to Need for Clients to Have Business Continuity Plan A ransomware attack on electronic health records vendor Allscripts late last week is a reminder of the potential disruption to patient care delivery healthcare entities can face if a cloud-services provider suffers a cyberattack. It also points to the need for business continuity planning.

Cloud 171

More Trending

article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

This morning we announced, in tandem with our partner 451 Research, the Global Edition of the 2018 Thales Data Threat Report. It’s abundantly clear that medium to larger enterprises (the focus of the report and underlying survey) are finding it harder than ever to protect their sensitive data. The twin drivers of the problem are increased threats and the drive to digitally transform how organizations deliver value and revenue.

article thumbnail

4 Special Requirements Social Media and Collaboration Create for GDPR Compliance

AIIM

A new set of European rules and standards related to privacy and data protection (the General Data Protection Regulation , or GDPR ) has set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers. The regulation is designed to harmonize privacy across the EU, codify more rigorous privacy rights; strike a balance between privacy and security and create an explicit obligation for both data contr

GDPR 95
article thumbnail

Ransomware Outlook: 542 Crypto-Lockers and Counting

Data Breach Today

Crypto-Lockers Remain Serious Threat Despite Recent Attack Volume Decline After spiking in 2017, the volume of attacks involving ransomware has since declined, but the malware still remains a potent threat. For attackers, ransomware barriers to entry are lower than ever, thanks to highly automated ransomware-as-a-service offerings.

article thumbnail

Tinder's Lack of Encryption Lets Strangers Spy on Your Swipes

WIRED Threat Level

Thanks to Tinder's patchwork use of HTTPS, researchers found they could reconstruct someone's entire experience in the app.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

DDoS Attacks Become More Complex and Costly

Dark Reading

Major DDoS attacks cost some organizations more than $100,000 in 2017, according to a new NETSCOUT Arbor report.

94
article thumbnail

AI and analytics has the power to change upstream oil and gas

OpenText Information Management

The upstream oil and gas industries have traditionally been slow to adopt new technologies. Anything new has to be proven in the field before most companies will adopt it. The development of Artificial Intelligence (AI) and advanced analytics should be different. For oil and gas, this combination offers the ability to continuously increase operational performance … The post AI and analytics has the power to change upstream oil and gas appeared first on OpenText Blogs.

article thumbnail

Intel: Stop Installing Patches Due To Reboot Problems

Data Breach Today

Struggles With Firmware Fixes For Meltdown and Spectre The usual advice for major security flaws is to patch as quickly as possible. Now Intel is calling for a full stop due to imperfect patches for a trio of chip security vulnerabilities known as Meltdown and Spectre.

Security 162
article thumbnail

Meltdown and Spectre Patches From Intel and Others Have a Rough Start

WIRED Threat Level

In the haste to address the Meltdown and Spectre vulnerabilities that shook the computer industry, several clumsy patch attempts have had to be pulled.

Security 111
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Satori Botnet Malware Now Can Infect Even More IoT Devices

Dark Reading

Latest version targets systems running ARC processors.

IoT 87
article thumbnail

Organisations need to prepare for “cyber shocks”

IT Governance

Most organisations are aware of the catastrophic damage that extreme cyber attacks can cause, but few have put in place appropriate measures to defend and respond to such incidents, according to a new report from PwC. Strengthening digital society against cyber shocks , which analyses key findings from the 2018 Global State of Information Security ® Survey (GSISS), focuses on the effects of massive incidents such as NotPetya and WannaCry.

article thumbnail

Online Advertising: Hackers' Little Helper

Data Breach Today

Network of Fake Ad Agencies Distributed 1 Billion Bad Ads, Researchers Find The web may be largely funded thanks to online advertising, but the threat posted by malicious advertisements continues to escalate. Indeed, the latest malvertising scheme, uncovered by security firm Confiant, served 1 billion malicious advertisements.

Security 153
article thumbnail

Want to Avoid Malware on Your Android Phone? Try the F-Droid App Store

WIRED Threat Level

Opinion: Researchers from Yale Privacy Lab argue that the scourge of trackers in Android apps means users should stop using the Google Play store.

Privacy 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Top four reasons to start AB testing today

OpenText Information Management

In recent years, the pressure applied to marketers has grown significantly. Year over year, goals are handed down and marketers are expected to do more with less. This trend often leaves marketers scrambling to find new ways to meet these goals. What’s more, in today’s digital ecosystem, with an abundance of options, visitors have come … The post Top four reasons to start AB testing today appeared first on OpenText Blogs.

article thumbnail

More Cloud Means More Multi-Tenant Environments

Thales Cloud Protection & Licensing

Gartner predicts that the worldwide public cloud services market will grow 17 percent in 2018 to $287.8 billion, up from $246.8 billion in 2017. While the increase in cloud migration is by no means a new trend, we are seeing more and more organizations seeking cloud-like consolidation, whether on-premises or in a private or public cloud. Consolidation is becoming the norm, and it is critical that organizations, whether consolidating internally or externally, have a secure multi-tenant environmen

Cloud 81
article thumbnail

Equifax Breach Victims: UK Count Goes Up

Data Breach Today

15 Million UK Residents' Records Exposed, 860,000 Consumers At Risk Data broker Equifax has released a revised count of U.K. victims of its massive 2017 data breach, now saying 860,000 residents had their personal details exposed. The data broker is offering its own fraud-monitoring services to breach victims, provided they share their personal details.

article thumbnail

Pixek App Encrypts Your Photos From Camera to Cloud

WIRED Threat Level

Pixek, an end-to-end encrypted photo app, could point to the future of searchable cloud data storage.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Regulatory Matters: EU regulatory change is coming fast in Life Sciences

OpenText Information Management

The Life Sciences sector is used to constant regulatory change. However, the next few years are about to see major new legislation in the EU that could result in major disruption to Life Sciences, Pharmaceutical and Healthcare companies – wherever they are. As I mentioned in my previous blog, I’m going to concentrate on two … The post Regulatory Matters: EU regulatory change is coming fast in Life Sciences appeared first on OpenText Blogs.

article thumbnail

How AI Is Redefining Cybersecurity

eSecurity Planet

A look at how security vendors that are employing artificial intelligence and machine learning to help IT security teams.

article thumbnail

Aetna Signs $1.15 Million Settlement With NY for Breaches

Data Breach Today

Action Comes After $17.2 Million Lawsuit Settlement After settling a breach lawsuit for $17.2 million, Aetna has signed another large settlement related to privacy breaches involving mailings to its health plan members. The latest settlement with the New York state attorney general's office involves two mailings last year.

Privacy 150
article thumbnail

Android Malware, Free Speech, and More Security News This Week

WIRED Threat Level

False alarms, free speech, and more of the week's top security news.

Security 108
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

As technology develops, so must journalists’ codes of ethics | Paul Chadwick

The Guardian Data Protection

AI is sure to bring many benefits but concerns over its ability to make decisions mean human journalists’ input remains vital Journalism is largely collaboration: reporters with sources, writers and editors, lawyers advising publishers, producers with distributors, and audiences feeding back their knowledge. Rapid development of artificial intelligence means journalists are likely to collaborate more and more with machines that think.

article thumbnail

Cyber attacks are now one of the biggest threats to global society

IT Governance

A recent article about the World Economic Forum’s Global Risks Report 2018 said that “the top five risks to global stability over the next five years are natural disasters, extreme weather, cyberattacks, data fraud, and failure to address climate change”. The past few years have seen an increase in cyber attacks and their associated damages. The report’s findings suggest that this acceleration is unlikely to slow.

Risk 76
article thumbnail

Expect More Cybersecurity 'Meltdowns'

Data Breach Today

After Meltdown and Spectre, Researchers Will Pummel Microprocessors for Flaws Technology giants are still struggling to identify what's at risk from the Spectre and Meltdown flaws in modern CPUs, never mind getting working security updates into users' hands. In the meantime, expect a rush by researchers to find more flaws in microprocessor code.