Sat.Jun 16, 2018 - Fri.Jun 22, 2018

article thumbnail

Tesla Accuses Insider of Stealing Gigabytes of Data

Data Breach Today

Former Employee Accused of Hacking Software as Tesla Warns of 'Sabotage' Electric car manufacturer Tesla has sued a former employee for sabotage, alleging that he "unlawfully hacked the company's confidential and trade secret information and transferred that information to third parties" while leaving a trail designed to implicate other employees.

article thumbnail

Protecting Sensitive Company Data: How to Educate Employees

AIIM

The threat of a hack is greater than it ever has been before with technology now reaching all parts of the world and granting access to the internet uniformly. The effects of such hacks has been seen in the news lately as well as major corporations like Sony, Yahoo and Equifax experience the terrible consequences of cyber breaches. With the problem growing, and the attacks getting more sophisticated, there has never been a better time to learn how to defend your business’s data and protect your

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Agencies Step Up to Data Security Challenge

Thales Cloud Protection & Licensing

Data-level security is not just another mandate. It’s a necessity. That was a recurring theme during a roundtable discussion held in advance of the Data Security Summit at Spire in Washington, D.C. The theme of the summit, sponsored by Thales eSecurity, was “IT Modernization: The New Cyber Agenda.”. The roundtable, including more than a dozen IT and cyber leaders from government and industry, explored the business drivers, challenges and evolving strategies around cybersecurity in government.

article thumbnail

Google to Fix Location Data Leak in Google Home, Chromecast

Krebs on Security

Google in the coming weeks is expected to fix a location privacy leak in two of its most popular consumer products. New research shows that Web sites can run a simple script in the background that collects precise location data on people who have a Google Home or Chromecast device installed anywhere on their local network. Craig Young , a researcher with security firm Tripwire , said he discovered an authentication weakness that leaks incredibly accurate location information about users of both

IoT 193
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Data Governance Best Practices in the GDPR Era

Data Breach Today

Matt Lock of Varonis on the Need to Have a Baseline for Data Access Behavior GDPR requires organizations to "have a governance model in terms of access and control and accountability," says Matt Lock of Varonis, who describes essential steps.

GDPR 179

More Trending

article thumbnail

Perspective Check: Context is Everything in InfoGov

Weissman's World

If you’ve ever used Google to help you find a new infogov technology solution, then you know how every one you find, from every vendor you look at, seems like the answer to all your problems. Here’s how to figure out which one(s) work best in your context! The post Perspective Check: Context is Everything in InfoGov appeared first on Holly Group.

article thumbnail

AT&T, Sprint, Verizon to Stop Sharing Customer Location Data With Third Parties

Krebs on Security

In the wake of a scandal involving third-party companies leaking or selling precise, real-time location data on virtually all Americans who own a mobile phone, AT&T , Sprint and Verizon now say they are terminating location data sharing agreements with third parties. At issue are companies known in the wireless industry as “location aggregators,” entities that manage requests for real-time customer location data for a variety of purposes, such as roadside assistance and emergenc

Privacy 174
article thumbnail

Massive CIA Hacking Tool Leak: Ex-Agency Employee Charged

Data Breach Today

Lead Suspect Joshua A. Schulte Already Detained on Child Pornography Charges The U.S. Department of Justice has charged a former CIA officer, 29-year-old Joshua A. Schulte, with providing 8,000 documents that describe the agency's offensive malware tools and practices to WikiLeaks, which published them in 2017 as the "Vault 7" archive.

Archiving 184
article thumbnail

VASCO rebrands as OneSpan, makes acquisition, to support emerging mobile banking services

The Last Watchdog

Bank patrons in their 20s and 30s, who grew up blanketed with digital screens, have little interest in visiting a brick-and-mortar branch, nor interacting with a flesh-and-blood teller. This truism is pushing banks into unchartered territory. They are scrambling to invent and deliver a fresh portfolio of mobile banking services that appeal to millennials.

Mining 173
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

[Guest Post] Infosecurity:?3 Industry Trends to Follow

AIIM

In light of recent events, we can all agree that information security has been criminally overlooked on some major fronts across most industries. Absolutely mind-boggling attacks on major corporations like Sony, Yahoo and Equifax have consecrated InfoSec in the most frightening way possible. It is entirely possible that InfoSec had been given the resources it needed in those conditional circumstances but, given the unmitigated damage and lack of response, it is beyond fair to say that InfoSec ma

Passwords 103
article thumbnail

Supreme Court: Police Need Warrant for Mobile Location Data

Krebs on Security

The U.S. Supreme Court today ruled that the government needs to obtain a court-ordered warrant to gather location data on mobile device users. The decision is a major development for privacy rights, but experts say it may have limited bearing on the selling of real-time customer location data by the wireless carriers to third-party companies. Image: Wikipedia.

article thumbnail

Phishing Defense: Block OAuth Token Attacks

Data Breach Today

But OAuth Attack Defense Remains Tricky, Warns FireEye's Douglas Bienstock Just one click: That's all it takes for a victim to inadvertently grant attackers access to their email account via a third-party application. Here's how to spot signs of OAuth-related hacking and how to defend against it.

Phishing 151
article thumbnail

GUEST ESSAY: Here?s why Tesla has been sabotaged twice in two years ? lax network security

The Last Watchdog

The disclosure earlier this week that Tesla CEO Elon Musk reportedly informed all of his employees about a rogue worker conducting “extensive and damaging sabotage” to the company’s operations very much deserves the news coverage it has gotten. Related: The ‘golden age’ of cyber spying is upon us. Musk reportedly sent out an internal email describing how an unnamed insider allegedly made unspecified code changes to the company’s manufacturing systems.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Real-life examples of social engineering ? part 2

IT Governance

Last month, I published an article looking at two examples of the use of social engineering in everyday life. I’d like to continue the theme of that article by talking about three other social engineering attacks that caused great damage. Diamonds, diamonds, DIAMONDS. If you’re planning on stealing USD$27.9 million worth of diamonds, then all you need is some chocolate and a smile.

Phishing 102
article thumbnail

Carpenter v. United States Decision Strengthens Digital Privacy

WIRED Threat Level

Thanks to Carpenter v. United States, the government will now generally need a warrant to obtain your cell site location information.

Privacy 105
article thumbnail

$4.3 Million HIPAA Penalty for 3 Breaches

Data Breach Today

MD Anderson Cancer Center Cited for Unencrypted Devices A lack of device encryption will cost a Texas-based cancer treatment center $4.3 million in civil monetary penalties from the Department of Health and Human Services.

article thumbnail

'Pay Up or Get WannaCry Hit' Extortion Email Spreading

Dark Reading

Sophos warns of a 'protection racket' scam email that threatens to infect victims with the ransomware variant if they don't pay the attackers.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

How to respond to a data subject access request

IT Governance

A key change to data subjects’ rights under the EU General Data Protection Regulation (GDPR) is the right to ask organisations what data they hold about the data subject. Although this was possible under the Data Protection Act 1998, organisations now have only 30 days to respond, and cannot charge an admin fee for doing so. What is a data subject access request (DSAR)?

Access 78
article thumbnail

China Escalates Hacks Against the US as Trade Tensions Rise

WIRED Threat Level

A hacking truce between China and the US doesn't address government espionage operations, a workaround both countries exploit.

article thumbnail

Hackers Hit Satellite Operators and Telecoms, Symantec Says

Data Breach Today

Thrip Group's Latest Attacks Trace to China, Maybe Beyond Symantec says it has uncovered a cyber espionage campaign that targets telecommunications operators in Southeast Asia - as well as a defense contractor and satellite communications operator - and warns that the hacking group, dubbed Thrip, may be laying the groundwork for more destructive attacks.

article thumbnail

Reader Favorites June 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover: ways to optimize the management of physical records, what to consider when auditing incoming files, and how to get the most out of cloud storage. Six ways to optimize your physical records collection This resource offers six tips to improve the way you organize, access, store and share [.] Read More. The post Reader Favorites June 2018: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Cyber attacks hit a fifth of schools and colleges

IT Governance

One in five schools and colleges have fallen victim to cyber crime, according to research from the specialist insurer Ecclesiastical, yet the majority (74%) of educational establishments claim to be “fully prepared” to deal with such attacks. . This discrepancy between perceived preparedness and reality is particularly alarming when you consider the sensitivity of the data held within the schools relating to pupils, parents and staff that could be compromised thanks to the careless actions of u

article thumbnail

Millions of Google, Roku, and Sonos Devices Are Vulnerable to a Web Attack

WIRED Threat Level

Using a technique called DNS rebinding, one amateur hacker found vulnerabilities in devices from Google, Roku, Sonos, and more.

article thumbnail

Employees Suspended for Alleged Record Snooping

Data Breach Today

Tragic Case Spotlights Challenges in Detecting Insider Incidents A health system's decision to reportedly suspend about a dozen employees for apparently snooping at health records related to the tragic death of a co-worker spotlights the many challenges involved with preventing and detecting insider breaches.

122
122
article thumbnail

Sidley Partner William Long Recognized by Best Lawyers 2019

Data Matters

Sidley Partner William RM Long has been recognized by Best Lawyers 2019 for Privacy & Data Protection Law in London. William is global co-leader of Sidley’s Privacy and Cybersecurity practice and also leads the EU data protection practice at Sidley. Recognition by Best Lawyers is based entirely on peer review. Best Lawyers ’ methodology is designed to capture, as accurately as possible, the consensus opinion of leading lawyers about the professional abilities of their colleagues within

Privacy 66
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

GDPR Hates Santa

Hanzo Learning Center

Twitter can be a goldmine of fun stuff slanted a little bit off-center. It's always extra fulfilling when the twitterverse takes a break from the Kardashians to give us a good dose of compliance humor.

GDPR 75
article thumbnail

Apple's Latest iOS 12 Feature Will Save Lives by Pushing Your Location to 911

WIRED Threat Level

Forget memoji. Apple's push to transmit instant, accurate locations during emergency calls will have a profound effect for first responders.

article thumbnail

Ruling Reaffirms Individuals Cannot File HIPAA Lawsuits

Data Breach Today

Federal Court Dismisses Legal Action by Patient in Privacy Case A federal court recently dismissed a case filed by a patient alleging a laboratory violated HIPAA by failing to shield her personal health information from public view. The ruling once again reaffirmed a longstanding precedent that individuals cannot sue for alleged HIPAA violations.

Privacy 113