Sat.Jan 27, 2018 - Fri.Feb 02, 2018

article thumbnail

First ATM 'Jackpotting' Attacks Hit US

Data Breach Today

Cash-Out Malware Called 'Ploutus' Migrates North From Mexico U.S. Secret Service alert: For the first time, malware-using fraudsters have been draining U.S. ATMs of their cash via what's known as a jackpotting or cash-out attack. Two older models of ATMs made by Diebold Nixdorf appear to have been targeted.

259
259
article thumbnail

Securing Data in the Digital Transformation Era

Thales Cloud Protection & Licensing

Data breaches are the new normal. According to our 2018 Global Data Threat Report , 67% of enterprises have been breached, with that percentage rate growing every year. Regardless of the security measures and efforts put in place, organizations need to act as if a successful cyberattack is not a question of “if” but “when.”. As organizations continue to embrace digital transformation, greater amounts of sensitive data is created, stored and transferred in digital form putting more data at risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

If Robert Mueller Is Fired, the Russia Probe Could Continue

WIRED Threat Level

The special counsel is under attack, but if Robert Mueller gets fired, the investigation into Trump’s Russia ties and obstruction of justice could keep going.

Security 112
article thumbnail

The Consumerization of Artificial Intelligence

Bill Schmarzo - Dell EMC

Consumerization is the design, marketing, and selling of products and services targeting the individual end consumer. Apple CEO Tim Cook recently promoted a $100-per-year iPhone app called Derm Expert. Derm Expert allows doctors to diagnose skin problems using only their iPhone. Doctors take a photo of a patient’s skin condition and then Derm Expert diagnoses the problem and prescribes treatment.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

US Data Breaches Hit All-Time High

Data Breach Today

Millions of Payment Cards and Social Security Numbers Exposed The number of data breaches reported by U.S. organizations reached an all-time high last year. In 2017, organizations that described how bad their breach was - and one-third did not - collectively lost 14 million payment cards and 158 million Social Security numbers, according to the Identity Theft Resource Center.

More Trending

article thumbnail

'Jackpotting' ATM Hack Comes to the United States

WIRED Threat Level

The "jackpotting" ATM attack drained tens of millions of dollars worldwide before landing in the United States.

Security 111
article thumbnail

Braindates: How We’re Kicking Peer-to-Peer Learning Up a Notch at #AIIM18

AIIM

Say you’re feeling a bit under the weather. Ache here, pain there, friends asking “Are you ok? You look.tired.” What’s the first thing you’ll do? Go to the doctor? Of course not. You Google your symptoms, so you can judge if 1) you can cure what ails you on your own, or 2) it’s worth the hassle of going in to see your doctor. If you do end up going, you’ll proudly share your diagnosis with her before she can even examine you, just to make sure she doesn’t waste your time.

article thumbnail

Cybercrime as a Service: Tools + Knowledge = Profit

Data Breach Today

On cybercrime forums and darknet marketplaces, there's an abundant supply of cybercrime products and services and lots of demand, plus prices remain low, says Flashpoint's Liv Rowley. All that's needed to leverage the products and services to make a profit, she says, is a bit of knowledge.

182
182
article thumbnail

How ECM solutions are keeping pace with a new generation

OpenText Information Management

The way we work—the way we access, use, share and collaborate on business content—is undergoing a massive transformation. Workers today are more mobile. Projects demand greater collaboration, often across multiple sites and time zones. What’s more, the rise in consumer file sharing services has changed the way users interact with enterprise software, with vastly more … The post How ECM solutions are keeping pace with a new generation appeared first on OpenText Blogs.

ECM 92
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Strava Data Heat Maps Expose Military Base Locations Around the World

WIRED Threat Level

The US military is reexamining security policies after fitness tracker data shared on social media revealed bases and patrol routes.

Military 111
article thumbnail

Who's Watching Your Operations?

AIIM

You manage a large facility with multiple buildings across the campus. Each building while somewhat unique, is equipped with plumbing, electrical, security, HVAC, and other elements that must be monitored, maintained and repaired at some point. Ideally, you would have an army of staff available to monitor and check everything constantly to provide feedback and predict what will happen before catastrophe strikes, but you don’t.

article thumbnail

Japanese Cryptocurrency Exchange Suffers $530 Million Theft

Data Breach Today

Coincheck Says It Was Hacked; Stolen XEM Transactions to be Blocked Coincheck, a Tokyo-based exchange, says it suffered a hack attack that led to the theft of $530 million worth of XEM cryptocurrency from its hot wallet. But the developers of XEM say they are tagging all accounts that receive the stolen funds to stop it from being converted to cash.

IT 176
article thumbnail

Connected Device Data Exchange – Who’s Minding the Store on Security?

OpenText Information Management

The OpenText™ Business Network blog post Top Ten Supply Chain Predictions for 2018, prediction #9 Augmented Reality Technology — talks about how the growing number of products embedded with sensors blurs the line between a physical object and its digital twin. It also indicates an increased focus on the security of information exchanged from these … The post Connected Device Data Exchange – Who’s Minding the Store on Security?

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Devin Nunes Memo: Reading Between the Lines

WIRED Threat Level

The Devin Nunes memo that purports to show improper surveillance practices is out—and national security experts say it falls far short of the hype.

Security 111
article thumbnail

Estimating the Cost of Internet Insecurity

Schneier on Security

It's really hard to estimate the cost of an insecure Internet. Studies are all over the map. A methodical study by RAND is the best work I've seen at trying to put a number on this. The results are, well, all over the map: " Estimating the Global Cost of Cyber Risk: Methodology and Examples ": Abstract : There is marked variability from study to study in the estimated direct and systemic costs of cyber incidents, which is further complicated by the considerable variation in cyber risk in differe

Risk 75
article thumbnail

Information Warfare: Gauging Trolls' Influence on Democracy

Data Breach Today

CIA Chief Warns Russia Is Seeking to Influence US Midterm Elections How effective are nation-backed trolls at influencing individuals via social media? An analysis of Russian trolls' accounts suggests they're designed for "causing havoc by pushing ideas, engaging other users or even taking both sides of controversial online discussions.

171
171
article thumbnail

Top 2018 tech trends for Government

OpenText Information Management

Digital transformation continues to progress in the government sector and this is unlikely to change in 2018. The underlying technologies are maturing and moving from implementation to optimization. That’s why my predictions for the tech trends of 2108 aren’t about revolutionary innovations. Instead, they cover areas where government agencies are likely to begin to realize … The post Top 2018 tech trends for Government appeared first on OpenText Blogs.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Cryptocurrency Scams Like Prodeum Are Just Straight-Up Trolling at This Point

WIRED Threat Level

US regulators and Facebook are finally coming for bogus ICOs.

Security 111
article thumbnail

Thinking about a Career Move in Cybersecurity?

Dark Reading

The numbers show career opportunities for cyber defenders.

article thumbnail

What's Riding on 5G Security? The Internet of Everything

Data Breach Today

5G Brings Great Speed But Also Great Complexity The U.S. government's idea to take the reins of the development of 5G mobile networks has been met with cynicism and criticism. But there are goods reasons the government is worried: Standards haven't been set in stone yet, and 5G will present a bevy of new security challenges. Here are some of them.

Security 157
article thumbnail

Artificial Intelligence: a new frontier to customer experience

OpenText Information Management

Facing heightened competition and increasing demands from customers, many organisations are now leveraging Artificial Intelligence (AI) to stay ahead of the curve. While the use of AI has predominantly been applied in heavy industries and financial services, it is now increasingly applied across a gamut of customer-facing industries, including retail and healthcare.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Winter Olympic Cyberattacks Have Already Started—and May Not Be Over

WIRED Threat Level

Two state-sponsored hacking operations are plaguing Pyeongchang, with murky motivations and no clear endgame.

Security 110
article thumbnail

IoT Botnets by the Numbers

Dark Reading

IoT devices are a botherder's dream attack-vector.

IoT 72
article thumbnail

Cryptocurrency Miners Crash Malware 'Top 10'

Data Breach Today

Beyond Stolen CPU Cycles, Miners Pose Enterprise Security Risks The booming interest and sometimes surging values of cryptocurrencies are drawing the interest of cybercriminals on a scale never seen before - including attacks aimed at trying to steal computing power to mine cryptocurrency.

Mining 154
article thumbnail

Inside OpenText:

OpenText Information Management

OpenText has a strong presence in India with offices in Hyderabad, Bengaluru, Pune, Delhi and Mumbai and over 2,200 employees. Approximately 500 employees are part of the Professional Services India Centre of Excellence (CoE) team. Recently some of the Professional Services (PS) Leadership team and I had the good fortune to visit the OpenText Bengaluru … The post Inside OpenText: appeared first on OpenText Blogs.

7
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Chrome Extension Malware Has Evolved

WIRED Threat Level

While helpful and creative, Chrome extensions have also become a new playground for hackers intent on stealing your data.

Security 109
article thumbnail

Israeli Scientists Accidentally Reveal Classified Information

Schneier on Security

According to this story (non-paywall English version here ), Israeli scientists released some information to the public they shouldn't have. Defense establishment officials are now trying to erase any trace of the secret information from the web, but they have run into difficulties because the information was copied and is found on a number of platforms.

article thumbnail

Feel the Heat: Strava 'Big Data' Maps Sensitive Locations

Data Breach Today

Internet of Things Privacy Fallout, Now in Heat Map Form Fitness app and website developer Strava has landed in hot water after publishing a global heat map that shows users' workout routes in aggregate. By doing so, the firm has inadvertently revealed military installation layouts and other sensitive information.

Big data 153