Sat.Mar 10, 2018 - Fri.Mar 16, 2018

article thumbnail

Will Tight Budget Impede OCR's HIPAA Mission?

Data Breach Today

While the director of the HHS Office for Civil Rights says HIPAA enforcement remains a top priority for the agency, obtaining enough resources to carry out its mission is an ongoing battle, says former OCR official Deven McGraw.

IT 174
article thumbnail

Hacker Adrian Lamo Has Died at 37

WIRED Threat Level

The Colombian-American hacker became famous in the early 2000s for breaking into the systems at organizations like *The New York Times*, and later for his role in Chelsea Manning's arrest.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 ways to detect a phishing email

IT Governance

Phishing has been used as a way for criminal hackers to gain sensitive information since the mid-1990s. It uses deceptive emails and websites to trick victims into clicking malicious links, downloading attachments or sending sensitive information. Phishing emails can impersonate well-known brands or even people you know, such as colleagues. The goal is to trick the recipient into believing that the message is important and convince them to click a malicious link/attachment or provide sensitive d

Phishing 111
article thumbnail

Taking down Gooligan: part 1 — overview

Elie

This series of posts recounts how, in November 2016, we hunted for and took down Gooligan, the infamous Android OAuth stealing botnet. What makes Gooligan special is its weaponization of OAuth tokens, something that was never observed in mainstream crimeware before. At its peak, Gooligan had hijacked over 1M OAuth tokens in an attempt to perform fraudulent Play store installs and reviews.

Access 107
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

US Power Company Fined $2.7 Million Over Data Exposure

Data Breach Today

Grid Regulator Says Company Left Critical Data Exposed for 70 Days A U.S. power company, unnamed by regulators, has been fined a record $2.7 million for violating energy sector cybersecurity regulations after sensitive data - including cryptographic information for usernames and passwords - was exposed online for 70 days.

Passwords 166

More Trending

article thumbnail

The Pushmi-Pullyu Impact of Technology Innovation on Information Preservation

AIIM

It’s bad enough that those of us in the technology space use three letter acronyms as if we’re being paid per usage. So here's a quick definition of terms for those mystified by the title of this post. If you are not conversant in Dr. Doolittle (even the Eddie Murphy version), Pushmi-Pullyu is a "gazelle-unicorn cross that has two heads (one of each) at opposite ends of its body.".

article thumbnail

Is All Encryption Equal?

Thales Cloud Protection & Licensing

Data encryption has been around almost since the age of computers. In truth, anyone with minimal experience can write a simple script that uses default services built into virtually every OS to encrypt data. In Linux, for instance, it takes four openSSL commands to generate an encryption key and encrypt data. However, simply encrypting data is not a sufficient control when storing data in the cloud.

article thumbnail

Federal Judge: Yahoo Breach Victims Can Sue

Data Breach Today

Plaintiffs Claim Spam and Card Fraud Resulted From Breach of 3 Billion Accounts A federal judge has largely rejected a motion by Verizon to dismiss a class-action suit filed by victims of three data breaches that compromised Yahoo, which is now part of Verizon. The Yahoo breaches appeared to have compromised nearly every Yahoo user's personal details at least once.

article thumbnail

A Florida Bill Would Make Criminal Justice Data More Transparent Than Ever

WIRED Threat Level

A newly passed bill in the Florida Legislature would bring unprecedented levels of transparency to the criminal justice system.

Security 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Celebrating Db2’s 25 years of awesome

IBM Big Data Hub

March 16, 2018 is the 25th anniversary of the Db2 relational database product on Linux UNIX and Windows. Over the past 25 years, this team has built the Db2 brand for the distributed product, complementing IBM’s Db2 mainframe offering and creating a market force.

article thumbnail

The 600+ Companies PayPal Shares Your Data With

Schneier on Security

One of the effects of GDPR -- the new EU General Data Protection Regulation -- is that we're all going to be learning a lot more about who collects our data and what they do with it. Consider PayPal, that just released a list of over 600 companies they share customer data with. Here's a good visualization of that data. Is 600 companies unusual? Is it more than average?

GDPR 94
article thumbnail

State Department Spends $0 of Anti-Propaganda Allocation

Data Breach Today

Congress Has Allocated $120 Million Since 2016 to Combat Foreign Campaigns To the surprise of many, $120 million allocated by Congress since late 2016 to help the State Department combat foreign governments' U.S.-focused propaganda and disinformation campaigns hasn't been spent. Meanwhile, midterm U.S. elections are fast approaching.

article thumbnail

Youtube, Facebook, and Google Can't Expect Wikipedia to Cure the Internet

WIRED Threat Level

YouTube and other tech giants have repeatedly turned to Wikipedia to help solve some of their biggest problems—often without giving back.

Security 110
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

More articles about information management than any sane person should write

AIIM

Over 100 eBooks, Guest articles, and Tip Sheets from the past year or so -- 107 of them to be exact. Enjoy. E-books. A winning recipe: SaaS + Cloud Content Management + IaaS. Modern problems require modern solutions: Meeting the challenge of Big Content. 2017: A Digitally “Transformative” Year. Digital Preservation – Is Your Current Approach to Managing Long-Term Digital Information Failing the Business?

ECM 93
article thumbnail

Reader favorites March 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover cost savings, risk management and RIM training. Learn how to digitize paper documents, how to take the risk out of records retention, and how to decide if custom folders are right for your organization. Five keys to a successful digital document conversion Planning to digitize your files? [.] Read More. The post Reader favorites March 2018: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Health Data Breaches Added to Tally Vary Widely

Data Breach Today

Malware, Mailing Errors and More Reported on the 'Wall of Shame' Large breaches involving hackers continue to plague the healthcare sector this year, but incidents involving lower-tech issues, including mailing errors, also are persisting.

article thumbnail

New Sanctions Against Russia Finally Take the Country's Online Chaos Seriously

WIRED Threat Level

From election meddling to NotPetya to grid hacking, Russia's digital provocations are no longer being ignored.

Security 110
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

WhatsApp sharing user data with Facebook would be illegal, rules ICO

The Guardian Data Protection

Data protection watchdog forces firm to sign an undertaking declaring it will not share user data with parent company before GDPR The UK’s data protection watchdog has concluded that WhatsApp’s sharing of user data with its parent company Facebook would have been illegal. The messaging app was forced to pause sharing of personal data with Facebook in November 2016, after the Information Commissioner’s Office said it had cause for concern.

GDPR 91
article thumbnail

Migration is a good opportunity for some immediate quality wins

AIIM

The movement to the cloud is past the tipping point. Cloud solutions are no longer a question of “should we?” but rather “when?” Organizations may not be ready to go 100% to the cloud, but for nearly 80% of organizations, cloud is a critical part of their strategy. Consider this data from a Fall 2017 AIIM survey of 182 end user organizations: How do you view your delivery/deployment methods for content management over the next 2 years?

Cloud 91
article thumbnail

5 Ways to Improve Insider Threat Prevention

Data Breach Today

If you browsed the latest security headlines, you'd probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity.

article thumbnail

How Creative DDOS Attacks Still Slip Past Defenses

WIRED Threat Level

While some major distributed-denial-of-service attacks have been thwarted this month, the threat remains as critical as ever.

Security 109
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Taking down Gooligan: part 1 — overview

Elie

This series of posts recounts how, in November 2016, we hunted for and took down Gooligan, the infamous Android OAuth stealing botnet. What makes Gooligan special is its weaponization of OAuth tokens, something that was never observed in mainstream crimeware before. At its peak, Gooligan had hijacked over 1M OAuth tokens in an attempt to perform fraudulent Play store installs and reviews.

Access 91
article thumbnail

Cybercriminals Launder Up to $200B in Profit Per Year

Dark Reading

Cybercrime funds make up 8-10% of all illegal profits laundered and amount to $80-200 billion each year.

87
article thumbnail

AMD Chipset Flaws Are Real, But Experts Question Disclosure

Data Breach Today

Was AMD Ambushed? A set of vulnerabilities in AMD chipsets that gives attackers enduring persistence on machines appears to be legitimate. But experts are questioning the motivations of the Israeli security company that found the flaws, contending it ambushed AMD to maximize attention.

Security 133
article thumbnail

Researchers Point to an AMD Backdoor—And Face Their Own Backlash

WIRED Threat Level

As an Israeli security firm outlines real flaws in AMD's chips, the security community questions its motivations.

Security 101
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Artificial Intelligence and the Attack/Defense Balance

Schneier on Security

Artificial intelligence technologies have the potential to upend the longstanding advantage that attack has over defense on the Internet. This has to do with the relative strengths and weaknesses of people and computers, how those all interplay in Internet security, and where AI technologies might change things. You can divide Internet security tasks into two sets: what humans do well and what computers do well.

article thumbnail

Where to start with GDPR compliance

IT Governance

The first few steps of your EU General Data Protection Regulation (GDPR) compliance project can be the most confusing. Where to start, who should be involved and how to meet all your obligations are just a few of the questions you will undoubtedly ask, and the entire process can seem incredibly daunting. What is the GDPR and does your organisation need to comply?

GDPR 79
article thumbnail

Winter Olympics Gold Medal for False Flag Goes to. ?

Data Breach Today

Researchers: To Foil Attribution, Attackers Planted Code Previously Tied to Lazarus Group Whoever unleashed malware built to disrupt last month's Winter Olympics in Pyeongchang, South Korea, designed it to look like it had been executed by a group of hackers tied to North Korea. But researchers at the security firm Kaspersky Lab say any such attribution would be false.

Security 133