Sat.Jan 27, 2018 - Fri.Feb 02, 2018

article thumbnail

First ATM 'Jackpotting' Attacks Hit US

Data Breach Today

Cash-Out Malware Called 'Ploutus' Migrates North From Mexico U.S. Secret Service alert: For the first time, malware-using fraudsters have been draining U.S. ATMs of their cash via what's known as a jackpotting or cash-out attack. Two older models of ATMs made by Diebold Nixdorf appear to have been targeted.

257
257
article thumbnail

Securing Data in the Digital Transformation Era

Thales Cloud Protection & Licensing

Data breaches are the new normal. According to our 2018 Global Data Threat Report , 67% of enterprises have been breached, with that percentage rate growing every year. Regardless of the security measures and efforts put in place, organizations need to act as if a successful cyberattack is not a question of “if” but “when.”. As organizations continue to embrace digital transformation, greater amounts of sensitive data is created, stored and transferred in digital form putting more data at risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Braindates: How We’re Kicking Peer-to-Peer Learning Up a Notch at #AIIM18

AIIM

Say you’re feeling a bit under the weather. Ache here, pain there, friends asking “Are you ok? You look.tired.” What’s the first thing you’ll do? Go to the doctor? Of course not. You Google your symptoms, so you can judge if 1) you can cure what ails you on your own, or 2) it’s worth the hassle of going in to see your doctor. If you do end up going, you’ll proudly share your diagnosis with her before she can even examine you, just to make sure she doesn’t waste your time.

article thumbnail

If Robert Mueller Is Fired, the Russia Probe Could Continue

WIRED Threat Level

The special counsel is under attack, but if Robert Mueller gets fired, the investigation into Trump’s Russia ties and obstruction of justice could keep going.

Security 111
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

US Data Breaches Hit All-Time High

Data Breach Today

Millions of Payment Cards and Social Security Numbers Exposed The number of data breaches reported by U.S. organizations reached an all-time high last year. In 2017, organizations that described how bad their breach was - and one-third did not - collectively lost 14 million payment cards and 158 million Social Security numbers, according to the Identity Theft Resource Center.

More Trending

article thumbnail

Who's Watching Your Operations?

AIIM

You manage a large facility with multiple buildings across the campus. Each building while somewhat unique, is equipped with plumbing, electrical, security, HVAC, and other elements that must be monitored, maintained and repaired at some point. Ideally, you would have an army of staff available to monitor and check everything constantly to provide feedback and predict what will happen before catastrophe strikes, but you don’t.

article thumbnail

Worried about Strava? It’s not the only app mapping our every move | Keza MacDonald

The Guardian Data Protection

Giving away all manner of personal information is only a tap away on your phone settings, as the fitness tracking site’s blunder has shown It was a great PR move: in November fitness tracking company Strava launched an updated global heatmap that visualised all the location data that its users had been collectively broadcasting, revealing popular running spots around the world.

article thumbnail

Cybercrime as a Service: Tools + Knowledge = Profit

Data Breach Today

On cybercrime forums and darknet marketplaces, there's an abundant supply of cybercrime products and services and lots of demand, plus prices remain low, says Flashpoint's Liv Rowley. All that's needed to leverage the products and services to make a profit, she says, is a bit of knowledge.

176
176
article thumbnail

How ECM solutions are keeping pace with a new generation

OpenText Information Management

The way we work—the way we access, use, share and collaborate on business content—is undergoing a massive transformation. Workers today are more mobile. Projects demand greater collaboration, often across multiple sites and time zones. What’s more, the rise in consumer file sharing services has changed the way users interact with enterprise software, with vastly more … The post How ECM solutions are keeping pace with a new generation appeared first on OpenText Blogs.

ECM 90
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Strava Data Heat Maps Expose Military Base Locations Around the World

WIRED Threat Level

The US military is reexamining security policies after fitness tracker data shared on social media revealed bases and patrol routes.

Military 103
article thumbnail

Reader favorites February 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover cost savings, risk management and RIM training. Learn how to reduce offsite box storage expenses, how to protect your most valuable documents, and how to deliver a world-class RIM training program. Tips for reducing your offsite storage costs Is too much of your RIM budget going to [.] Read More. The post Reader favorites February 2018: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Japanese Cryptocurrency Exchange Suffers $530 Million Theft

Data Breach Today

Coincheck Says It Was Hacked; Stolen XEM Transactions to be Blocked Coincheck, a Tokyo-based exchange, says it suffered a hack attack that led to the theft of $530 million worth of XEM cryptocurrency from its hot wallet. But the developers of XEM say they are tagging all accounts that receive the stolen funds to stop it from being converted to cash.

IT 173
article thumbnail

Connected Device Data Exchange – Who’s Minding the Store on Security?

OpenText Information Management

The OpenText™ Business Network blog post Top Ten Supply Chain Predictions for 2018, prediction #9 Augmented Reality Technology — talks about how the growing number of products embedded with sensors blurs the line between a physical object and its digital twin. It also indicates an increased focus on the security of information exchanged from these … The post Connected Device Data Exchange – Who’s Minding the Store on Security?

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Devin Nunes Memo: Reading Between the Lines

WIRED Threat Level

The Devin Nunes memo that purports to show improper surveillance practices is out—and national security experts say it falls far short of the hype.

article thumbnail

Learn how to build your ladder to AI with "Machine Learning Everywhere"

IBM Big Data Hub

Join us 27 February at 1 PM ET for "Machine Learning Everywhere: Build Your Ladder to AI." Visit the event landing page to learn more about the event and register for a calendar reminder: ibm.com/mleverywhere.

76
article thumbnail

Information Warfare: Gauging Trolls' Influence on Democracy

Data Breach Today

CIA Chief Warns Russia Is Seeking to Influence US Midterm Elections How effective are nation-backed trolls at influencing individuals via social media? An analysis of Russian trolls' accounts suggests they're designed for "causing havoc by pushing ideas, engaging other users or even taking both sides of controversial online discussions.

167
167
article thumbnail

Top 2018 tech trends for Government

OpenText Information Management

Digital transformation continues to progress in the government sector and this is unlikely to change in 2018. The underlying technologies are maturing and moving from implementation to optimization. That’s why my predictions for the tech trends of 2108 aren’t about revolutionary innovations. Instead, they cover areas where government agencies are likely to begin to realize … The post Top 2018 tech trends for Government appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

'Jackpotting' ATM Hack Comes to the United States

WIRED Threat Level

The "jackpotting" ATM attack drained tens of millions of dollars worldwide before landing in the United States.

Security 102
article thumbnail

Five reasons why business continuity management is essential to your organisation’s cyber security

IT Governance

Business continuity management is the most comprehensive approach to organisational resilience, and involves managing risks to critical business functions to ensure continuity of service in the event of a disruptive incident. Implementing a business continuity management system (BCMS) is imperative to developing cyber resilience in today’s cyber security environment.

GDPR 73
article thumbnail

What's Riding on 5G Security? The Internet of Everything

Data Breach Today

5G Brings Great Speed But Also Great Complexity The U.S. government's idea to take the reins of the development of 5G mobile networks has been met with cynicism and criticism. But there are goods reasons the government is worried: Standards haven't been set in stone yet, and 5G will present a bevy of new security challenges. Here are some of them.

Security 157
article thumbnail

Artificial Intelligence: a new frontier to customer experience

OpenText Information Management

Facing heightened competition and increasing demands from customers, many organisations are now leveraging Artificial Intelligence (AI) to stay ahead of the curve. While the use of AI has predominantly been applied in heavy industries and financial services, it is now increasingly applied across a gamut of customer-facing industries, including retail and healthcare.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Chrome Extension Malware Has Evolved

WIRED Threat Level

While helpful and creative, Chrome extensions have also become a new playground for hackers intent on stealing your data.

article thumbnail

Weekly discussion podcast: Critical Information Infrastructure, Part 1

IT Governance

This week’s extract is taken from Toomas Viira’s book Lessons Learned – Critical Information Infrastructure Protection , which is a vital source of information and thought-provoking insights into potential issues within critical information infrastructure (CII). Episode 1 – Introduction: “These systems must be very well protected against cyber-attacks.

article thumbnail

Cryptocurrency Miners Crash Malware 'Top 10'

Data Breach Today

Beyond Stolen CPU Cycles, Miners Pose Enterprise Security Risks The booming interest and sometimes surging values of cryptocurrencies are drawing the interest of cybercriminals on a scale never seen before - including attacks aimed at trying to steal computing power to mine cryptocurrency.

Mining 154
article thumbnail

Matson Logistics transforms information exchange with OpenText B2B Managed Services

OpenText Information Management

When your core business is shipping and logistics, what do you do when you find yourself committing substantial resources to managing the complexities of EDI and B2B operations? For Matson Logistics, the solution was to turn to the B2B Integration experts at OpenText. Matson Logistics wanted to focus on their core competencies and move away … The post Matson Logistics transforms information exchange with OpenText B2B Managed Services appeared first on OpenText Blogs.

B2B 72
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Winter Olympic Cyberattacks Have Already Started—and May Not Be Over

WIRED Threat Level

Two state-sponsored hacking operations are plaguing Pyeongchang, with murky motivations and no clear endgame.

article thumbnail

4 of the 5 top causes of data breaches are because of human or process error

IT Governance

Although data breaches as a result of cyber attacks get all the press, it is often negligence or a lack of basic processes, policies and procedures that result in data breaches. The Information Commissioner’s Office (ICO) compiles quarterly statistics about the main causes of reported data security incidents. In the last quarter, four of the five leading causes in cases where the ICO took action involved human errors and process failures: Loss or theft of paperwork – 91 incidents.

article thumbnail

Feel the Heat: Strava 'Big Data' Maps Sensitive Locations

Data Breach Today

Internet of Things Privacy Fallout, Now in Heat Map Form Fitness app and website developer Strava has landed in hot water after publishing a global heat map that shows users' workout routes in aggregate. By doing so, the firm has inadvertently revealed military installation layouts and other sensitive information.

Big data 150