Sat.Jun 02, 2018 - Fri.Jun 08, 2018

article thumbnail

New Data Privacy Regulations

Schneier on Security

When Marc Zuckerberg testified before both the House and the Senate last month, it became immediately obvious that few US lawmakers had any appetite to regulate the pervasive surveillance taking place on the internet. Right now, the only way we can force these companies to take our privacy more seriously is through the market. But the market is broken.

article thumbnail

Cryptocurrency: A Gold Mine for Open-Source Intelligence

Data Breach Today

Expert Says Virtual Currency Systems Leak Useful Data to Track Criminals Experts have long warned that bitcoin is not as private as it appears. The very design of bitcoin, as well as some other virtual currencies, can lend a surprising amount of information about the groups using it to transact. In fact, it's sometimes easier to track than if criminals used the banking system.

Mining 160
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 EIM software benefits for your enterprise in 2018

OpenText Information Management

Enterprise Information Management (EIM) is rapidly becoming a ‘must have’ for many organizations. It helps deliver the value in enterprise information by making it accessible, meaningful, accurate, timely and secure. In this blog, we look at the key benefits in implementing an effective enterprise-wide EIM strategy can bring to your company. Today, the advance of … The post Top 10 EIM software benefits for your enterprise in 2018 appeared first on OpenText Blogs.

Access 45
article thumbnail

Britannica Insights Is a Chrome Extension to Fix False Google Results

WIRED Threat Level

Encyclopedia Britannica released a Chrome extension designed to fix Google's sometimes inaccurate "featured snippets.".

Security 111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Researcher Succesfully Hacked In-Flight Airplanes - From the Ground

Dark Reading

IOActive researcher will demonstrate at Black Hat USA how satellite equipment can be 'weaponized.

107
107

More Trending

article thumbnail

Australia drafts laws forcing Facebook and Google to reveal encrypted data

The Guardian Data Protection

Security agencies would be given access to encrypted messaging apps under bid to ‘modernise’ laws Technology companies such as Facebook and Google would be forced to give Australian security agencies access to encrypted data under legislation to be introduced by the Turnbull government. But the government has refused to say how the security agencies would access the data.

article thumbnail

Facebook Bug Made Up to 14 Million Users' Posts Public For Days

WIRED Threat Level

In late May, millions of Facebook users had new posts set to public by default.

Security 111
article thumbnail

Facebook Bug Sets 14M Users' Settings to 'Public'

Dark Reading

The default sharing setting was accidentally changed for millions of accounts during a four-day period last month.

106
106
article thumbnail

GDPR: UK Privacy Regulator Open to Self-Certification

Data Breach Today

Focus on Continuous Compliance and Breach Response, Experts Say One day, organizations may be able to self-certify their GDPR compliance, says an official at the U.K.'s data privacy regulator. Regardless, experts recommend that organizations ensure they are focusing on continuous GDPR compliance and regularly testing their data breach response plans.

GDPR 171
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Ten best practices for a successful RIM training program – Part one

TAB OnRecord

As you begin new records and information management programs, you will inevitably encounter the challenge of how to train employees and enlist their cooperation. In this two-part blog post, we share the ten best practices for a successful records and information management training program. Obtain senior management endorsement Your training program will have its [.

article thumbnail

Crime Fighting Gets High-Tech Advances Palantir, Axom, and More

WIRED Threat Level

Beyond big data, officers are increasingly turning to software and ­predictive analytics from companies like Palantir to anticipate when and where misdeeds are likely to occur.

Big data 111
article thumbnail

MyHeritage Alerts Users to Data Breach

Dark Reading

A researcher found email addresses and hashed passwords of nearly 92.3 million users stored on a server outside MyHeritage.

article thumbnail

Another Fitness App Exposes Users' Data

Data Breach Today

Independent Researcher Finds PumpUp Data Was Accessible on Unsecured Amazon Server For at least the third time in recent months, a mobile fitness app maker apparently has exposed consumers' sensitive personal information. The latest app to expose data: PumpUp.

Access 168
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

GP practice fined £35K for failing to secure medical records

IT Governance

The Information Commissioner’s Office (ICO) has fined London surgery Bayswater Medical Centre (BMC) £35,000 after highly sensitive medical information was left unsecured in an empty building. According to the ICO, the data was left exposed for more than 18 months – this included medical records, prescription information and patient identifiable medicines.

article thumbnail

What Will Microsoft's GitHub Buy Mean For Controversial Code?

WIRED Threat Level

The tech giant will officially acquire the legendary developer platform. The question now is what happens to some of the code it hosts.

IT 111
article thumbnail

5 Tips for Protecting SOHO Routers Against the VPNFilter Malware

Dark Reading

Most home office users need to simply power cycle their routers and disable remote access; enterprises with work-at-home employees should move NAS behind the firewall.

Access 90
article thumbnail

Congress Considers Ways to Beef Up Healthcare Cybersecurity

Data Breach Today

At Hearing, and in Letter, Concerns Raised About Confusion Over HHS's Role Congress is considering how to help beef up the healthcare sector's preparedness and response to cyber threats. But why is there so much confusion about the role of the Department of Health and Human Services?

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

How to prepare for a penetration test

IT Governance

Conducting a successful penetration test is a challenge for even the most experienced tester. It involves much more than simply running tools and probing systems. Rather, it requires a lot of skill and experience, as testers need to know what vulnerabilities to look for, where to find them and how to exploit them. However, penetration testing isn’t a dark art.

article thumbnail

WWDC 2018: Apple Just Made Safari the Good Privacy Browser

WIRED Threat Level

The next version of Safari takes on ad-trackers more aggressively than ever.

Privacy 111
article thumbnail

Phishing Scams Target FIFA World Cup Attendees

Dark Reading

Soccer-themed emails and Web pages target fans with fake giveaways and the chance to snag overpriced, illegitimate 'guest tickets.

article thumbnail

Geneology Service MyHeritage Leaked 92 Million Credentials

Data Breach Today

Company Says No Indications Data Family Trees, DNA Results Affected The geneology service MyHeritage says a security researcher found 92 million email addresses and hashed passwords for its users on a private external server. The company, however, says there's no evidence of abnormal account activity or indications family trees or DNA results were affected.

Passwords 154
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Germany: First court decision on GDPR

DLA Piper Privacy Matters

Only five days after the GDPR became applicable, the first German court, the Regional Court ( Landgericht ) Bonn (in a decision dated 29 May 2018, case number 10 O 171/18 – in German only), issued a ruling on the practical application of the GDPR. This probably makes the court’s ruling the first GDPR court decision worldwide, and the decision addressed the hot-button issue of public availability of ICANN “WHOIS data”.

GDPR 75
article thumbnail

WannaCry Hero Marcus Hutchins' New Legal Woes Spell Trouble for White Hat Hackers

WIRED Threat Level

By expanding the case against Marcus Hutchins, the Department of Justice has signaled a troubling interpretation of cybersecurity law.

article thumbnail

Reinstall a clean macOS with one button

Jamf

Sound too good to be true? Here are five easy steps to make simple reinstalls a reality in your environment.

75
article thumbnail

Medical Device Cyber Vulnerabilities: More Alerts

Data Breach Today

Healthcare Organizations Face Challenge of Tracking, Mitigating All the Risks Identified The Department of Homeland Security has issued two more alerts about cyber vulnerabilities in certain medical devices. The stream of recent advisories is helping to draw more attention to the importance of addressing device security. But healthcare providers face the challenge of tracking and mitigating all risks.

Risk 127
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

US-North Korea Summit News Used as Lure In New Malware Campaign

Dark Reading

Previously known threat actor Group 123 likely behind NavRAT malware, security vendor says.

article thumbnail

Former Cambridge Analytica CEO Alexander Nix Testifies Before Parliament

WIRED Threat Level

Alexander Nix testified before Parliament, but provided more bluster than answers.

Security 106
article thumbnail

Turnbull would 'love to see' Facebook's Zuckerberg face Australian MPs

The Guardian Data Protection

Intelligence committee wants to know what data was shared with Chinese firms and why Malcolm Turnbull would “love to see the boss” of Facebook appear before Australia’s intelligence committee, as parliament grapples with new security threats wrought by global internet and social network giants. After coming to terms on the government’s proposed foreign interference and espionage laws, which are expected to have bipartisan support when the joint committee hands down its report later on Thursday ,