Sat.Dec 16, 2017 - Fri.Dec 22, 2017

article thumbnail

Lazarus Hackers Phish For Bitcoins, Researchers Warn

Data Breach Today

Bitcoin Exchange Job Lure Traces to Hackers Tied to North Korea Bitcoin-seeking phishing attacks have been trying to socially engineer would-be cryptocurrency exchange executives, warn researchers at Secureworks. The attacks use Word documents with malicious macros and control code previously seen in attacks launched by the Lazarus Group, which has been tied to North Korea.

Phishing 136
article thumbnail

Predictions 2018: 5 trends driving the IoT and IIoT

Information Management Resources

Adoption of the Internet of things and the Industrial Internet of Things show no signs of slowing down. If anything, adoption and implementations will only increase.

IoT 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 Reasons Digital Preservation Needs to be Part of Your Intelligent Information Strategy

AIIM

According to IDC, the digital universe is doubling every two years, and will reach 40,000 exabytes (40 trillion gigabytes) by 2020. (Note: A single exabyte of storage can contain 50,000 years’ worth of DVD-quality video.) Organizations that fail to immediately address the long-term preservation implications of this massive tsunami of data as it enters the organization will never ever catch up.

article thumbnail

The Best Christmas Ads on Social Media of All Time; Get Festive!

Data Matters

It’s the holiday season once again and brands are launching their campaigns for the occasion. Here are some of the best Christmas ads and campaigns on social media that you can take inspiration from for your own promotions. Best Christmas ads on Twitter: Marks & Spencer “Two Fairies” Magic was the theme of British clothing […]. The post The Best Christmas Ads on Social Media of All Time; Get Festive!

Marketing 100
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Teen Hacker Avoids Jail Over On-Demand DDoS Attacks

Data Breach Today

Student Disrupted Amazon, NatWest, Netflix for vDOS 'Stresser' Service Users A British teenager has avoided jail time after pleading guilty to thousands of DDoS disruptions against Amazon, Netflix, NatWest Bank and others. Separately, a U.S. man has pleaded guilty to launching DDoS attacks on behalf of Lizard Squad and PoodleCorp, among other offenses.

114
114

More Trending

article thumbnail

31 Letters to Santa from ECM Users

AIIM

We Want Simplicity, Commitment, Strategy, and Solutions. This time of year, if you start a Google search with the words “funny letters,” Google will immediately complete the phrase with “funny letters to Santa.”. So for those of you who are hanging in there and thinking about content management in the shrinking shopping days before the holidays, here is your reward – a few nuggets that pop up in the “funny letters to Santa” search stream.

ECM 84
article thumbnail

E-Commerce Holiday Planning with Pricing Tips

TAB OnRecord

Christmas is here! It’s the busiest time of the year, but also the most important and stressful for the e-commerce market. Sales figures increase dramatically as people buy gifts, decorations, cards, food, and more. For example, in the U.S., about 25% of all personal spending occurs in the holiday shopping season starting in October and lift up significantly on Black Friday and Cyber Monday in November.

Retail 90
article thumbnail

HHS Attempts to Clear Up HIPAA Confusion on PHI Release

Data Breach Today

Online Resources Clarify When Patient Info Can Be Shared With Families, Caregivers Federal regulators have set up online resources to help healthcare providers as well as consumers navigate circumstances under which HIPAA permits a covered entity to disclose mental health or substance abuse information to a patient's family members and caregivers.

103
103
article thumbnail

In 'Star Wars: The Last Jedi', the Resistance Keeps Making the Same Tactical Mistake

WIRED Threat Level

The urge to fight one decisive battle has undone countless real-world rebellions—and those in the Star Wars universe as well.

Security 111
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Facebook use of third-party apps 'violates data protection principles'

The Guardian Data Protection

German watchdog accuses site of merging data from WhatsApp and Instagram into users’ Facebook accounts without consent Germany’s competition authority has accused Facebook of abusing its dominant market position to improperly amass third-party data on its users. A statement released on Tuesday criticised the world’s largest social media site for collecting data via Facebook-owned services, such as WhatsApp or Instagram, and then absorbing it into users’ Facebook accounts.

article thumbnail

Northern District of California Enjoins LinkedIn from Preventing Scraping of Public User Profiles

Data Matters

In a decision that may have profound implications for social media companies, the big data industry and website terms of use everywhere, Judge Edward Chen of the Northern District of California granted hiQ Labs’ motion for preliminary injunction on August 14, 2017, enjoining LinkedIn from “preventing hiQ’s access, copying, or use of public profiles on LinkedIn’s website.” hiQ Labs, Inc. v.

article thumbnail

Kaspersky Lab Sues US Government Over Ban

Data Breach Today

Federal Software Ban Violates Due Process, Anti-Virus Firm Alleges Kaspersky Lab has sued the U.S. Department of Homeland Security for issuing an order that bans the Moscow-based anti-virus firm's software from being used on federal systems, saying DHS violated the company's right to respond to the allegations against it.

article thumbnail

Top 8 Cybersecurity Skills IT Pros Need in 2018

Dark Reading

Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.

IT 103
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

France orders WhatsApp to stop sharing user data with Facebook without consent

The Guardian Data Protection

Messaging app has one month to comply or it will face sanctions for sharing user phone numbers and usage data for ‘business intelligence’ purposes WhatsApp has been ordered to stop sharing user data with parent company Facebook or face sanctions. The French data protection agency, Commission Nationale de l’Informatique et des Libertés (CNIL), said on Monday that WhatsApp did not have a legal basis to share user data under French law for “business intelligence” purposes.

GDPR 89
article thumbnail

Snowden-Backed App 'Haven' Turns Your Phone Into a Home Security System

WIRED Threat Level

The NSA leaker's latest project aims to secure your computer—and you—from not just digital but physical attacks.

Security 112
article thumbnail

Bankrupt Cancer Clinic Chain's Insurer to Cover Breach Fine

Data Breach Today

21st Century Oncology Faces More Than $29 Million in Penalties in Two Settlements In an usual move, federal regulators have made arrangements to have a cyber insurer cover a $2.3 million HIPAA penalty on behalf of a bankrupt cancer care clinic chain, 21st Century Oncology, which also signed false claims settlements totaling $26 million.

Insurance 100
article thumbnail

Securing the future of payments – what does 2018 have in store?

Thales Cloud Protection & Licensing

Thanks to heightened consumer confidence, a rise in proximity payments adoption and ongoing developments in biometrics, the payments industry continued to undergo digital transformation throughout 2017. We’re now seeing big data play an increasing role in how retail sales and payments are being tailored to individual consumer’s preferences, and providers are adopting and integrating smarter, more efficient ways of completing the path-to-purchase.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Fixing Data Breaches Part 3: The Ease of Disclosure

Troy Hunt

This week, I've been writing up my 5-part guide on "Fixing Data Breaches" On Monday I talked about the value of education ; let's try and stop the breach from happening in the first place. Then yesterday it was all about reducing the impact of a breach , namely by collecting a lot less data in the first place then recognising that it belongs to the person who provided it and treating with the appropriate respect.

article thumbnail

Top 10 IBM Big Data & Analytics Hub podcasts of 2017

IBM Big Data Hub

It can be difficult to keep up with all the best podcast episodes during the year. That's why we've compiled the Top 10 podcasts of the year from the IBM Big Data & Analytics Hub Insights Podcast feed right here.

article thumbnail

Forensic research awards highlight the difficulty of digital privacy

OpenText Information Management

At OpenText, we talk often about digital transformation. Technology makes businesses more competitive, opens access to information and provides new opportunities for everyone. Unfortunately, it also creates new vehicles for hackers, scammers and criminals. To effectively stop hackers, prosecute criminals and uncover wrongdoing – investigators must understand what happens on digital devices and networks via … The post Forensic research awards highlight the difficulty of digital privacy appe

article thumbnail

Don't Gift an Internet-Connected Toy This Holiday

WIRED Threat Level

They can be hacked. They're a privacy nightmare. This year, it's not too late to keep the IoT toys away from the tree.

IoT 104
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Cloud Leaks Continue: 123 Million U.S. Households' Personal Information Exposed Online

eSecurity Planet

The information, from data analytics firm Alteryx, was in an Amazon S3 bucket configured to provide any AWS user with access.

article thumbnail

Influencers assess 2017 and make predictions for 2018

IBM Big Data Hub

As the year winds down, questions tend to arise about what the big trends of the past year have been and what the year to come may hold.

94
article thumbnail

The damaging after-effects of a data breach

IT Governance

With the number of data breaches increasing every year, they are now a huge issue for organisations. 46% of all UK businesses identified at least one cyber breach in the past 12 months and it’s been predicted that a quarter of the world’s population will have been affected by a data breach by 2020. It should be obvious that it’s a priority for companies to learn how to keep data secure.

article thumbnail

Hold North Korea Accountable for WannaCry—and the NSA, Too

WIRED Threat Level

As the US government points the finger at North Korea for the WannaCry ransomware epidemic, it also needs to acknowledge the role of its leaked hacking tools.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

[Video] Offsite Document Storage Facilities

Record Nations

Video Transcription Offsite Storage: Starting Off the Process More businesses are shifting towards paperless management, but between retention laws and the reality that there are some files businesses need to keep but rarely reference, it’s often cheaper to keep these records as hard-copies instead of spending the money to scan them instead. On average, storing […].

80
article thumbnail

Spreading OpenText cheer: Germany

OpenText Information Management

The holidays are fast approaching and our colleagues are starting to get festive in their offices around the world! In this post, OpenText employee, Nadja Trützschler, shares her favourite customs and traditions that take place in Oldenburg during the holidays. What’s it like in Germany over the holiday season? Drizzle, rain, fog, and gray skies … The post Spreading OpenText cheer: Germany appeared first on OpenText Blogs.

IT 80
article thumbnail

Interactive: What Does It Really Mean?

The Texas Record

Merriam-Webster ’s online dictionary defines “interactive” as, “involving the actions or input of a user.” When you stop to think about it, that’s not very clear. So, is eLearning with nothing but a next button interactive? The learner clicks something. Is a choose your own adventure book interactive? The reader picks which page to turn to. Let’s dive into this.

IT 75