Sat.Jan 27, 2018 - Fri.Feb 02, 2018

article thumbnail

First ATM 'Jackpotting' Attacks Hit US

Data Breach Today

Cash-Out Malware Called 'Ploutus' Migrates North From Mexico U.S. Secret Service alert: For the first time, malware-using fraudsters have been draining U.S. ATMs of their cash via what's known as a jackpotting or cash-out attack. Two older models of ATMs made by Diebold Nixdorf appear to have been targeted.

252
252
article thumbnail

Securing Data in the Digital Transformation Era

Thales Cloud Protection & Licensing

Data breaches are the new normal. According to our 2018 Global Data Threat Report , 67% of enterprises have been breached, with that percentage rate growing every year. Regardless of the security measures and efforts put in place, organizations need to act as if a successful cyberattack is not a question of “if” but “when.”. As organizations continue to embrace digital transformation, greater amounts of sensitive data is created, stored and transferred in digital form putting more data at risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Braindates: How We’re Kicking Peer-to-Peer Learning Up a Notch at #AIIM18

AIIM

Say you’re feeling a bit under the weather. Ache here, pain there, friends asking “Are you ok? You look.tired.” What’s the first thing you’ll do? Go to the doctor? Of course not. You Google your symptoms, so you can judge if 1) you can cure what ails you on your own, or 2) it’s worth the hassle of going in to see your doctor. If you do end up going, you’ll proudly share your diagnosis with her before she can even examine you, just to make sure she doesn’t waste your time.

article thumbnail

The global expansion of master data management

Information Management Resources

Organizations can integrate various information types into a single MDM platform by leveraging emerging options for schema and taxonomies, producing virtually limitless competitive advantage.

MDM 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

US Data Breaches Hit All-Time High

Data Breach Today

Millions of Payment Cards and Social Security Numbers Exposed The number of data breaches reported by U.S. organizations reached an all-time high last year. In 2017, organizations that described how bad their breach was - and one-third did not - collectively lost 14 million payment cards and 158 million Social Security numbers, according to the Identity Theft Resource Center.

More Trending

article thumbnail

The Consumerization of Artificial Intelligence

Bill Schmarzo - Dell EMC

Consumerization is the design, marketing, and selling of products and services targeting the individual end consumer. Apple CEO Tim Cook recently promoted a $100-per-year iPhone app called Derm Expert. Derm Expert allows doctors to diagnose skin problems using only their iPhone. Doctors take a photo of a patient’s skin condition and then Derm Expert diagnoses the problem and prescribes treatment.

article thumbnail

Who's Watching Your Operations?

AIIM

You manage a large facility with multiple buildings across the campus. Each building while somewhat unique, is equipped with plumbing, electrical, security, HVAC, and other elements that must be monitored, maintained and repaired at some point. Ideally, you would have an army of staff available to monitor and check everything constantly to provide feedback and predict what will happen before catastrophe strikes, but you don’t.

article thumbnail

Cybercrime as a Service: Tools + Knowledge = Profit

Data Breach Today

On cybercrime forums and darknet marketplaces, there's an abundant supply of cybercrime products and services and lots of demand, plus prices remain low, says Flashpoint's Liv Rowley. All that's needed to leverage the products and services to make a profit, she says, is a bit of knowledge.

154
154
article thumbnail

Worried about Strava? It’s not the only app mapping our every move | Keza MacDonald

The Guardian Data Protection

Giving away all manner of personal information is only a tap away on your phone settings, as the fitness tracking site’s blunder has shown It was a great PR move: in November fitness tracking company Strava launched an updated global heatmap that visualised all the location data that its users had been collectively broadcasting, revealing popular running spots around the world.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Strava Data Heat Maps Expose Military Base Locations Around the World

WIRED Threat Level

The US military is reexamining security policies after fitness tracker data shared on social media revealed bases and patrol routes.

Military 109
article thumbnail

How ECM solutions are keeping pace with a new generation

OpenText Information Management

The way we work—the way we access, use, share and collaborate on business content—is undergoing a massive transformation. Workers today are more mobile. Projects demand greater collaboration, often across multiple sites and time zones. What’s more, the rise in consumer file sharing services has changed the way users interact with enterprise software, with vastly more … The post How ECM solutions are keeping pace with a new generation appeared first on OpenText Blogs.

ECM 92
article thumbnail

Japanese Cryptocurrency Exchange Suffers $530 Million Theft

Data Breach Today

Coincheck Says It Was Hacked; Stolen XEM Transactions to be Blocked Coincheck, a Tokyo-based exchange, says it suffered a hack attack that led to the theft of $530 million worth of XEM cryptocurrency from its hot wallet. But the developers of XEM say they are tagging all accounts that receive the stolen funds to stop it from being converted to cash.

IT 150
article thumbnail

Reader favorites February 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover cost savings, risk management and RIM training. Learn how to reduce offsite box storage expenses, how to protect your most valuable documents, and how to deliver a world-class RIM training program. Tips for reducing your offsite storage costs Is too much of your RIM budget going to [.] Read More. The post Reader favorites February 2018: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Devin Nunes Memo: Reading Between the Lines

WIRED Threat Level

The Devin Nunes memo that purports to show improper surveillance practices is out—and national security experts say it falls far short of the hype.

article thumbnail

Connected Device Data Exchange – Who’s Minding the Store on Security?

OpenText Information Management

The OpenText™ Business Network blog post Top Ten Supply Chain Predictions for 2018, prediction #9 Augmented Reality Technology — talks about how the growing number of products embedded with sensors blurs the line between a physical object and its digital twin. It also indicates an increased focus on the security of information exchanged from these … The post Connected Device Data Exchange – Who’s Minding the Store on Security?

article thumbnail

Information Warfare: Gauging Trolls' Influence on Democracy

Data Breach Today

CIA Chief Warns Russia Is Seeking to Influence US Midterm Elections How effective are nation-backed trolls at influencing individuals via social media? An analysis of Russian trolls' accounts suggests they're designed for "causing havoc by pushing ideas, engaging other users or even taking both sides of controversial online discussions.

143
143
article thumbnail

Learn how to build your ladder to AI with "Machine Learning Everywhere"

IBM Big Data Hub

Join us 27 February at 1 PM ET for "Machine Learning Everywhere: Build Your Ladder to AI." Visit the event landing page to learn more about the event and register for a calendar reminder: ibm.com/mleverywhere.

70
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

'Jackpotting' ATM Hack Comes to the United States

WIRED Threat Level

The "jackpotting" ATM attack drained tens of millions of dollars worldwide before landing in the United States.

Security 107
article thumbnail

Top 2018 tech trends for Government

OpenText Information Management

Digital transformation continues to progress in the government sector and this is unlikely to change in 2018. The underlying technologies are maturing and moving from implementation to optimization. That’s why my predictions for the tech trends of 2108 aren’t about revolutionary innovations. Instead, they cover areas where government agencies are likely to begin to realize … The post Top 2018 tech trends for Government appeared first on OpenText Blogs.

article thumbnail

Feel the Heat: Strava 'Big Data' Maps Sensitive Locations

Data Breach Today

Internet of Things Privacy Fallout, Now in Heat Map Form Fitness app and website developer Strava has landed in hot water after publishing a global heat map that shows users' workout routes in aggregate. By doing so, the firm has inadvertently revealed military installation layouts and other sensitive information.

Big data 128
article thumbnail

Estimating the Cost of Internet Insecurity

Schneier on Security

It's really hard to estimate the cost of an insecure Internet. Studies are all over the map. A methodical study by RAND is the best work I've seen at trying to put a number on this. The results are, well, all over the map: " Estimating the Global Cost of Cyber Risk: Methodology and Examples ": Abstract : There is marked variability from study to study in the estimated direct and systemic costs of cyber incidents, which is further complicated by the considerable variation in cyber risk in differe

Risk 69
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Chrome Extension Malware Has Evolved

WIRED Threat Level

While helpful and creative, Chrome extensions have also become a new playground for hackers intent on stealing your data.

article thumbnail

Artificial Intelligence: a new frontier to customer experience

OpenText Information Management

Facing heightened competition and increasing demands from customers, many organisations are now leveraging Artificial Intelligence (AI) to stay ahead of the curve. While the use of AI has predominantly been applied in heavy industries and financial services, it is now increasingly applied across a gamut of customer-facing industries, including retail and healthcare.

article thumbnail

What's Riding on 5G Security? The Internet of Everything

Data Breach Today

5G Brings Great Speed But Also Great Complexity The U.S. government's idea to take the reins of the development of 5G mobile networks has been met with cynicism and criticism. But there are goods reasons the government is worried: Standards haven't been set in stone yet, and 5G will present a bevy of new security challenges. Here are some of them.

Security 129
article thumbnail

Locating Secret Military Bases via Fitness Data

Schneier on Security

In November, the company Strava released an anonymous data-visualization map showing all the fitness activity by everyone using the app. Over this weekend, someone realized that it could be used to locate secret military bases: just look for repeated fitness activity in the middle of nowhere. News article.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Winter Olympic Cyberattacks Have Already Started—and May Not Be Over

WIRED Threat Level

Two state-sponsored hacking operations are plaguing Pyeongchang, with murky motivations and no clear endgame.

article thumbnail

Matson Logistics transforms information exchange with OpenText B2B Managed Services

OpenText Information Management

When your core business is shipping and logistics, what do you do when you find yourself committing substantial resources to managing the complexities of EDI and B2B operations? For Matson Logistics, the solution was to turn to the B2B Integration experts at OpenText. Matson Logistics wanted to focus on their core competencies and move away … The post Matson Logistics transforms information exchange with OpenText B2B Managed Services appeared first on OpenText Blogs.

B2B 73
article thumbnail

Cryptocurrency Miners Crash Malware 'Top 10'

Data Breach Today

Beyond Stolen CPU Cycles, Miners Pose Enterprise Security Risks The booming interest and sometimes surging values of cryptocurrencies are drawing the interest of cybercriminals on a scale never seen before - including attacks aimed at trying to steal computing power to mine cryptocurrency.

Mining 125