Sat.Mar 10, 2018 - Fri.Mar 16, 2018

article thumbnail

US Power Company Fined $2.7 Million Over Data Exposure

Data Breach Today

Grid Regulator Says Company Left Critical Data Exposed for 70 Days A U.S. power company, unnamed by regulators, has been fined a record $2.7 million for violating energy sector cybersecurity regulations after sensitive data - including cryptographic information for usernames and passwords - was exposed online for 70 days.

Passwords 144
article thumbnail

The Pushmi-Pullyu Impact of Technology Innovation on Information Preservation

AIIM

It’s bad enough that those of us in the technology space use three letter acronyms as if we’re being paid per usage. So here's a quick definition of terms for those mystified by the title of this post. If you are not conversant in Dr. Doolittle (even the Eddie Murphy version), Pushmi-Pullyu is a "gazelle-unicorn cross that has two heads (one of each) at opposite ends of its body.".

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 ways to detect a phishing email

IT Governance

Phishing has been used as a way for criminal hackers to gain sensitive information since the mid-1990s. It uses deceptive emails and websites to trick victims into clicking malicious links, downloading attachments or sending sensitive information. Phishing emails can impersonate well-known brands or even people you know, such as colleagues. The goal is to trick the recipient into believing that the message is important and convince them to click a malicious link/attachment or provide sensitive d

Phishing 111
article thumbnail

Taking down Gooligan: part 1 — overview

Elie

This series of posts recounts how, in November 2016, we hunted for and took down Gooligan, the infamous Android OAuth stealing botnet. What makes Gooligan special is its weaponization of OAuth tokens, something that was never observed in mainstream crimeware before. At its peak, Gooligan had hijacked over 1M OAuth tokens in an attempt to perform fraudulent Play store installs and reviews.

Access 107
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Will Tight Budget Impede OCR's HIPAA Mission?

Data Breach Today

While the director of the HHS Office for Civil Rights says HIPAA enforcement remains a top priority for the agency, obtaining enough resources to carry out its mission is an ongoing battle, says former OCR official Deven McGraw.

IT 146

More Trending

article thumbnail

Hacker Adrian Lamo Has Died at 37

WIRED Threat Level

The Colombian-American hacker became famous in the early 2000s for breaking into the systems at organizations like *The New York Times*, and later for his role in Chelsea Manning's arrest.

Security 109
article thumbnail

Reader favorites March 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover cost savings, risk management and RIM training. Learn how to digitize paper documents, how to take the risk out of records retention, and how to decide if custom folders are right for your organization. Five keys to a successful digital document conversion Planning to digitize your files? [.] Read More. The post Reader favorites March 2018: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

5 Ways to Improve Insider Threat Prevention

Data Breach Today

If you browsed the latest security headlines, you'd probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity.

article thumbnail

Migration is a good opportunity for some immediate quality wins

AIIM

The movement to the cloud is past the tipping point. Cloud solutions are no longer a question of “should we?” but rather “when?” Organizations may not be ready to go 100% to the cloud, but for nearly 80% of organizations, cloud is a critical part of their strategy. Consider this data from a Fall 2017 AIIM survey of 182 end user organizations: How do you view your delivery/deployment methods for content management over the next 2 years?

Cloud 91
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

YouTube Will Link Directly to Wikipedia to Fight Conspiracy Theories

WIRED Threat Level

After a series of scandals related to misinformation, YouTube CEO Susan Wojcicki announced the company would begin directing users to sources like Wikipedia.

Security 111
article thumbnail

Is All Encryption Equal?

Thales Cloud Protection & Licensing

Data encryption has been around almost since the age of computers. In truth, anyone with minimal experience can write a simple script that uses default services built into virtually every OS to encrypt data. In Linux, for instance, it takes four openSSL commands to generate an encryption key and encrypt data. However, simply encrypting data is not a sufficient control when storing data in the cloud.

article thumbnail

Federal Judge: Yahoo Breach Victims Can Sue

Data Breach Today

Plaintiffs Claim Spam and Card Fraud Resulted From Breach of 3 Billion Accounts A federal judge has largely rejected a motion by Verizon to dismiss a class-action suit filed by victims of three data breaches that compromised Yahoo, which is now part of Verizon. The Yahoo breaches appeared to have compromised nearly every Yahoo user's personal details at least once.

article thumbnail

Celebrating Db2’s 25 years of awesome

IBM Big Data Hub

March 16, 2018 is the 25th anniversary of the Db2 relational database product on Linux UNIX and Windows. Over the past 25 years, this team has built the Db2 brand for the distributed product, complementing IBM’s Db2 mainframe offering and creating a market force.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Taking down Gooligan: part 1 — overview

Elie

This series of posts recounts how, in November 2016, we hunted for and took down Gooligan, the infamous Android OAuth stealing botnet. What makes Gooligan special is its weaponization of OAuth tokens, something that was never observed in mainstream crimeware before. At its peak, Gooligan had hijacked over 1M OAuth tokens in an attempt to perform fraudulent Play store installs and reviews.

Access 91
article thumbnail

WhatsApp sharing user data with Facebook would be illegal, rules ICO

The Guardian Data Protection

Data protection watchdog forces firm to sign an undertaking declaring it will not share user data with parent company before GDPR The UK’s data protection watchdog has concluded that WhatsApp’s sharing of user data with its parent company Facebook would have been illegal. The messaging app was forced to pause sharing of personal data with Facebook in November 2016, after the Information Commissioner’s Office said it had cause for concern.

GDPR 90
article thumbnail

State Department Spends $0 of Anti-Propaganda Allocation

Data Breach Today

Congress Has Allocated $120 Million Since 2016 to Combat Foreign Campaigns To the surprise of many, $120 million allocated by Congress since late 2016 to help the State Department combat foreign governments' U.S.-focused propaganda and disinformation campaigns hasn't been spent. Meanwhile, midterm U.S. elections are fast approaching.

article thumbnail

The 600+ Companies PayPal Shares Your Data With

Schneier on Security

One of the effects of GDPR -- the new EU General Data Protection Regulation -- is that we're all going to be learning a lot more about who collects our data and what they do with it. Consider PayPal, that just released a list of over 600 companies they share customer data with. Here's a good visualization of that data. Is 600 companies unusual? Is it more than average?

GDPR 89
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

A Florida Bill Would Make Criminal Justice Data More Transparent Than Ever

WIRED Threat Level

A newly passed bill in the Florida Legislature would bring unprecedented levels of transparency to the criminal justice system.

Security 103
article thumbnail

Email Security for Your Business

eSecurity Planet

Every business uses email, yet many are unaware of email security threats. Here's a look at the threats - and how to secure your business email.

article thumbnail

Australia Sues Equifax, Alleges False Claims to Consumers

Data Breach Today

Credit Bureau Acted 'Unconscionably' With Vulnerable People, ACCC alleges Equifax has a new problem in Australia, a country that was left unscathed by the credit bureau's devastating data breach. The Australian Competition and Consumer Commission alleges the credit bureau deceived vulnerable consumers by misrepresenting its products and charging for services that should have been free.

article thumbnail

Where to start with GDPR compliance

IT Governance

The first few steps of your EU General Data Protection Regulation (GDPR) compliance project can be the most confusing. Where to start, who should be involved and how to meet all your obligations are just a few of the questions you will undoubtedly ask, and the entire process can seem incredibly daunting. What is the GDPR and does your organisation need to comply?

GDPR 77
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Youtube, Facebook, and Google Can't Expect Wikipedia to Cure the Internet

WIRED Threat Level

YouTube and other tech giants have repeatedly turned to Wikipedia to help solve some of their biggest problems—often without giving back.

article thumbnail

3 signs your database may be out of date

IBM Big Data Hub

For decades, a company’s database usually had a single job: operating as either an operational — also known as transactional — database or acting as a data warehouse. It was also typically deployed in a single location: on premises. Today, companies not only want more from their databases, but also expect greater flexibility concerning where they are located and how they consume data management resources.

IT 78
article thumbnail

How 'Slingshot' Router Malware Lurked for Six Years

Data Breach Today

No Link to Known APT Group Cited, But Attackers Appear to Like Tolkien Kaspersky Lab says it has uncovered an elegantly written piece of malware that leverages a Latvian-designed router to launch stealthy attacks. The security firm hints that the malicious code could only have come from a well-resourced attacker, but it stops short of naming one.

Security 113
article thumbnail

Customer experience as a catalyst for digital transformation

OpenText Information Management

With 63% of Financial Services organizations either planning or formally engaged in digital transformation initiatives, how does a financial brand drive conversion, create loyalty and maintain a competitive edge? Customer experience is a catalyst in many digital transformation projects, as businesses invest in new digital technologies and processes to more effectively engage customers, partners or … The post Customer experience as a catalyst for digital transformation appeared first on Ope

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

How Creative DDOS Attacks Still Slip Past Defenses

WIRED Threat Level

While some major distributed-denial-of-service attacks have been thwarted this month, the threat remains as critical as ever.

article thumbnail

Konica Minolta Promotes QAI’s Scott Swidersky to Vice President of Enterprise Content Management Practice

Info Source

Fulton, Md. – March 14, 2018 – Quality Associates, Inc. (QAI), a Konica Minolta company, proudly announces that Scott Swidersky, president of QAI and its affiliate company DocPoint Solutions (DocPoint), has been promoted to the position of vice president of Konica Minolta’s Enterprise Content Management (ECM) practice, effective March 5, 2018. With more than 20 years of experience in the document management field, Swidersky holds a deep understanding of integrated solutions across the public and

ECM 75
article thumbnail

Health Data Breaches Added to Tally Vary Widely

Data Breach Today

Malware, Mailing Errors and More Reported on the 'Wall of Shame' Large breaches involving hackers continue to plague the healthcare sector this year, but incidents involving lower-tech issues, including mailing errors, also are persisting.