Sat.Mar 17, 2018 - Fri.Mar 23, 2018

article thumbnail

Expedia's Orbitz Suspects 880,000 Payment Cards Stolen

Data Breach Today

Hacker May Have Also Obtained Other Customer Data in Breach, Orbitz Warns Expedia's Orbitz travel fare search engine says it may have suffered a breach that resulted in 880,000 payment cards being compromised, along with other customer data, over a two-year period. Orbitz says the apparent breach involved a legacy system no longer connected to its site.

IT 171
article thumbnail

An Exponential Moment and the Untapped Power of Incumbents

AIIM

I was reflecting a bit on some of the themes raised by Ginni Rometty, CEO of IBM, during her opening keynote at Think 2018 and their alignment with some of the concepts we at AIIM have been raising over the past year under the banner of Intelligent Information Management. I suppose it may seem a bit cheeky as the “Chief Evangelist of AIIM” to be commenting upon the comments of the “Chief Executive” of IBM, so for those who want to hear her thoughts without the benefit of my interpretation, the r

Retail 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook: is it time we all deleted our accounts?

The Guardian Data Protection

The Cambridge Analytica revelations may be the final nudge we need to turn away from the social network. And it’s only the tip of the iceberg when it comes to big tech harvesting private information Sorry to break it to you, but you are probably a “dumb f**k”. This is according to statements by a young Mark Zuckerberg anyway. Back in 2004, when a 19-year-old Zuckerberg had just started building Facebook, he sent his Harvard friends a series of instant messages in which he marvelled at the fact t

IT 112
article thumbnail

Data Analytics and Human Heuristics: How to Avoid Making Poor Decisions

Bill Schmarzo - Dell EMC

The “hot hand,” a metaphor applied frequently to the game of basketball, is the idea that a basketball shooter, after making several consecutive shots, will experience a higher than normal success rate on his or her ensuing shots. I discussed the “hot hand” concept, and its flaw, at a TDWI (The Data Warehouse Institute) conference many years ago. Figure 1: “The Hot Hand in Basketball” by Thomas Gilovich, Robert Vallone and Amos Tversky.

Analytics 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Facebook Attempts to Explain Data Leak, Denies 'Breach'

Data Breach Today

Political Data-Mining Firm Reportedly Obtained 50 Million Users' Private Details Facebook is under fire after reports suggested data-mining firm Cambridge Analytica obtained private information for 50 million Facebook users. The social network contends that it didn't suffer a "breach," as the information was legally obtained but subsequently misused.

Mining 151

More Trending

article thumbnail

'Utterly horrifying': ex-Facebook insider says covert data harvesting was routine

The Guardian Data Protection

Sandy Parakilas says numerous companies deployed these techniques – likely affecting hundreds of millions of users – and that Facebook looked the other way Hundreds of millions of Facebook users are likely to have had their private information harvested by companies that exploited the same terms as the firm that collected data and passed it on to Cambridge Analytica, according to a new whistleblower.

article thumbnail

How modern RIM professionals are staying relevant – Part 1

TAB OnRecord

Many RIM professionals that we speak with struggle to obtain budget and attention within the organization. Why? One of the reasons is that RIM has traditionally been seen as a cost center: an expense to be minimized, rather than a value-add or investment. When this mindset prevails among top executives, RIM professionals can struggle to [.] Read More.

article thumbnail

The Financial Fallout From Data Breaches

Data Breach Today

Banner Health Follows Nuance, Merck in Reporting Details About the Impact Recent financial reports from three healthcare sector organizations that suffered cyberattacks demonstrate how costly data breaches can be for not-for-profit healthcare providers and for-profit companies alike.

article thumbnail

Cambridge Analytica Execs Caught Discussing Extortion and Fake News

WIRED Threat Level

In undercover videos filmed by Britain’s Channel 4 news, Cambridge Analytica executives appear to offer up various unsavory tactics to influence campaigns.

Security 111
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

UK officials seek warrant to enter Cambridge Analytica HQ

The Guardian Data Protection

Information commissioner demands access to data and orders Facebook to halt audit The information commissioner is seeking an urgent court warrant to enter the London headquarters of the elections consultancy Cambridge Analytica after the firm was caught in an undercover sting boasting about entrapping politicians , using honey traps and running fake news campaigns.

Analytics 111
article thumbnail

Success Criteria for Managing Permanent Electronic Records

National Archives Records Express

I am pleased to announce the publication of the Criteria for Successfully Managing Permanent Electronic Records. The guidance supports the Managing Government Records Directive (M-12-18), which states “By December 31, 2019, all permanent electronic records in Federal agencies will be managed electronically to the fullest extent possible for eventual transfer and accessioning by NARA in an electronic format.”.

article thumbnail

Sizing Up Crypto Wallet Vulnerabilities

Data Breach Today

Al Pascual of Javelin Strategy and Research discusses a new report that shows that while crypto wallets may be considered to be at the sharp end of payments innovation, the security vulnerabilities they face are much the same as those that already exist in digital banking and payments.

Security 124
article thumbnail

Facebook Privacy Settings: A Complete Guide to Making Your Account More Secure

WIRED Threat Level

Despite the repeated privacy lapses, Facebook offers a fairly robust set of tools to control who knows what about you.

Privacy 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

No one can pretend Facebook is just harmless fun anymore | Ellie Mae O’Hagan

The Guardian Data Protection

From its stance on extremist content, to its vast caches of user data, Facebook is a corporation whose power must, finally, be reined in The revelation that Cambridge Analytica exploited the data of 50 million Facebook profiles to target American voters is indeed frightening. But Cambridge Analytica shouldn’t act as a diversion from the real bad guy in this story: Facebook.

article thumbnail

Web Conference Report: “Deploying Containers in the Age of GDPR”

Thales Cloud Protection & Licensing

I was fortunate to be one of the presenters at SecureWorld’s recent web conference on “ Deploying Containers in the Age of GDPR.” I suggest you check it out. Here is a taste of what we discussed. A real-time poll of webinar participants asked how ready they think their organizations are for the GDPR deadline of May 25, 2018. It indicated 40% “are doing everything they know about and should be pretty much there.

GDPR 83
article thumbnail

The Growing Threat from Multi-Vector DDoS Attacks

Data Breach Today

Multivector distributed denial-of-service attacks are having a bigger impact than simple volumetric attacks, says Brian McCann, president of Netscout's security business unit, who analyzes the latest trends in an in-depth interview.

Security 121
article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This post provides an in-depth analysis of the inner workings of Gooligan, the infamous Android OAuth stealing botnet. This is the second post of a series dedicated to the hunt and takedown of Gooligan that we did at Google, in collaboration with Check Point, in November 2016. The. first post. recounts Gooligan’s origin story and provides an overview of how it works.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Cambridge Analytica and Facebook accused of misleading MPs over data breach

The Guardian Data Protection

Call for Facebook boss Mark Zuckerberg to testify before parliamentary committee The head of the parliamentary committee investigating fake news has accused Cambridge Analytica and Facebook of misleading MPs in testimony, after the Observer revealed details of a vast data breach affecting tens of millions of people. After a whistleblower detailed the harvesting of more than 50 million Facebook profiles for Cambridge Analytica, Damian Collins, the chair of the House of Commons culture, media and

article thumbnail

Facebook's Privacy and Transparency Failings Are Still a Serious Problem

WIRED Threat Level

You give Facebook all of your data in exchange for using their service—an exchange that seems increasingly out of whack.

Privacy 106
article thumbnail

DHS: Some GE Imaging Devices Are Vulnerable

Data Breach Today

Alert: Hackers Can Potentially Exploit Hardcoded and Default Credentials A recent alert from the Department of Homeland Security warning of vulnerabilities in certain medical imaging products from GE Healthcare is a reminder to other medical device makers and healthcare entities about the risks posed by hardcoded and default credentials.

Risk 121
article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This post provides an in-depth analysis of the inner workings of Gooligan, the infamous Android OAuth stealing botnet. This is the second post of a series dedicated to the hunt and takedown of Gooligan that we did at Google, in collaboration with Check Point, in November 2016. The. first post. recounts Gooligan’s origin story and provides an overview of how it works.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The Facebook breach makes it clear: data must be regulated

The Guardian Data Protection

Companies use our personal information to enrich themselves. Regulation of this practice is long overdue The Observer reported on Saturday that Cambridge Analytica acquired 50 million Facebook profiles from a researcher in 2014. This appears to have been among the most consequential data breaches in history, with an impact that may rival the breach of financial records from Equifax.

IT 109
article thumbnail

DOJ Indicts 9 Iranians For Brazen University Cyberattacks

WIRED Threat Level

A new indictment asserts a long string of attacks against hundreds of universities and private companies, in which Iran pilfered more than $3 billion worth of intellectual property.

article thumbnail

Atlanta Ransomware Attack Freezes City Business

Data Breach Today

Damage Assessment Is Underway, But Backups Are in Place, Officials Say Ransomware has struck the city of Atlanta and frozen internal and customer-facing applications, hampering residents from paying bills or accessing court information. But the city says it has working backups and expects to pay employees on time.

article thumbnail

Artificial intelligence in cyber security

IT Governance

Cyber security has become a major priority for every organisation. The right controls and procedures must be put in place to detect potential attacks and protect against them. However, with the risk of a cyber attack increasing every year, how can you keep up with the ever-evolving threats? What is Artificial Intelligence? Artificial intelligence (AI) is the creation of intelligent machines that can learn from experience, allowing them to work and react as a human would.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Mozilla 'presses pause' on Facebook ads over data-mining claims

The Guardian Data Protection

Non-profit organisation behind Firefox browser announces move after Cambridge Analytica revelations Mozilla, which makes the popular Firefox web browser, has become the first major organisation to stop advertising on Facebook amid the controversy over the Cambridge Analytica files. Related: Mark Zuckerberg apologises for Facebook's 'mistakes' over Cambridge Analytica Continue reading.

Mining 107
article thumbnail

Tumblr Names Russian Propaganda Accounts After Long Silence

WIRED Threat Level

On Friday, after months of silence, Tumblr named 84 accounts it says were devoted to spreading propaganda and disinformation on the platform.

IT 94
article thumbnail

Will Congress Lose Midterm Elections to Hackers?

Data Breach Today

Bill Seeks $380 Million for States, But DHS Says Most Lack Security Clearances States will not have the full range of much-needed cybersecurity practices and equipment in place for this year's U.S. midterm elections. But efforts underway might deliver many much-needed improvements in time for the 2020 elections, Homeland Security Secretary Kirstjen Nielsen tells a Senate committee.