The National Railroad Passenger Corporation (Amtrak) has disclosed a data breach that may have resulted in the compromise of customer personally identifiable information (PII). The data breach was discovered on April 16, 2020. In a letter to the Attorney General's Office of Vermont, made public on April 29, the rail service said that an unknown third party managed to fraudulently access Amtrak Guest Rewards accounts. The Amtrak Guest Rewards service allows passengers to rack up points when they travel to exchange for discounts, hotels, and gift cards, among other offerings. See also: This is the impact of a data breach on enterprise share prices The attack vector involved was compromised usernames and passwords, which may suggest the use of credentials previously leaked or stolen, or the use of brute-force methods. Amtrak says that some personal information was viewable, although the company has not specifically said what data may have been compromised. However, Amtrak was keen to emphasize that Social Security numbers, credit card information, and other financial data was not involved in the data leak.
Anti-virus manufacturer BitDefender independently discovered LVI and shared its study with Intel. The company could publish its findings in February. Additional technical details are found in the group's website here. Many Thanks to biffzinker for the tip. Source: The Register
Amazon's 2020 fall device event: The good, bad, and confusing 26:55 / September 25, 2020 In this week's Jason Squared, Jason Cipriani and Jason Perlow discuss flying camera drones, gaming services, and Alexa improvements. Read more:
TechRepublic: Life after lockdown: Your office job will never be the same--here's what to expect In March, the Marriott hotel chain disclosed a security incident in which an attacker was able to access data belonging to roughly 5. 2 million customers, and two months later, easyJet said that the PII of up to nine million customers may have been stolen -- including several thousand credit card records. The consequences of a data breach can be expensive -- and not just in terms of damage mitigation, investigations, and regulator fines. Lawsuits launched on behalf of customers for compensation are common, as in the case of easyJet, which is now facing an £18 billion ($22bn) class-action lawsuit. Previous and related coverage Japan investigates potential leak of prototype missile data in Mitsubishi hack Investors sue LabCorp over security failures in light of data breach, ransomware attack Marriott discloses new data breach impacting 5. 2 million hotel guests Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0
The portfolio variance is the sum of the covariance matrix elements. weights = {w1, w2, w3, w4, w5, w6, w7, w8, w9, w10}; portAverageReturns = 12 weights (Mean /@ portReturnsCleaned) // Total portVar = 12 Total[Outer[Times, weights, weights] Covariance[portReturnsCleaned\[Transpose]], 2] Let's find the lowest variance for a bunch of given returns (the so-called efficient frontier). The range of this will lie between: 12 Min@(Mean /@ portReturnsCleaned) 0. 08960473674 12 Max@(Mean /@ portReturnsCleaned) 0. 7151653802 (should have bought Apple stock) The no short selling, no borrowing/lending case (weights sum to 1 and each weight is between 0 and 1): effFrontier = Table[ {Sqrt[ NMinimize[ {portVar, Total[weights] == 1 && portAverageReturns == i && And @@ (0 <= # <= 1 & /@ weights)}, weights][[1]]], i}, {i, 0. 09, 0. 7,. 02}] // Quiet I collected the square root of the variance (the standard deviations) here as this is usually considered as the measure of risk. Find the minimum variance portfolio: minimumVariance1 = {Sqrt[portVar], portAverageReturns} /.
Luckily, overclocking tools are privileged applications (requiring ring-0 access), and in most machines it springs up a UAC gate unless the overclocking software installs a driver and service that runs in the background (this installation requires a UAC authorization in the first place). If someone managed to install privileged software on your computer, you have bigger problems than a graphics card that likes to sing. Find technical details of the hack here, and a video presentation here.
Walmart Plus or Amazon Prime? There's a clear winner 3:36 / October 12, 2020 ZDNet's Beth Mauder breaks down Walmart's latest service, Walmart Plus, and compares the services, prices, and benefits to Amazon Prime. Read more:
But KELA said that despite the large number of Slack credentials available online, hackers haven't been that interested. "While at least 4, 300 organizations seem to have Slack credentials available for sale, the demand side of the equation doesn't seem to align, " said Raveed Laeb, KELA Product Manager. Laeb said hackers rarely asked around for Slack access on hacking forums, and when they did, forum posts where they requested help remained unanswered. "Almost a year after it was posted, the ad [pictured above] still has no replies, " Laeb said. "Moreover, we found almost no discussions about schemes or methods to monetize Slack credentials, suggesting there is no active interest in targeting Slack among cybercrime communities. " Slack channels rarely yield data Laeb cited different reasons why cybercriminals aren't paying attention to Slack as a "gateway into corporate platforms and internal data. " The primary reason is that Slack channels rarely contain useful information. Even if hackers gain access to an account, the tool mostly contains conversations between colleagues, with little information and opportunities for further escalation to a company's internal network, as Slack is a web-based tool, and not directly connected to Domain Admins, firewalls, or other company equipment.
« press release » EK LAUNCHES VECTOR WATER BLOCKS FOR MSI TRIO AND SUPRIM 3080, 3090 GPUS EK®, the leading computer cooling solutions provider, is ready to offer its premium high-performance GPU water block for the MSI® Trio and Suprim editions of NVIDIA® GeForce® RTX™ 30 Series graphics cards. This new water block is named EK-Quantum Vector Trio RTX 3080/3090 D-RGB and is exclusively engineered for MSI Trio and Suprim RTX 3080 and RTX 3090 GPUs. An EK Water Block for MSI Trio and Suprim GeForce RTX 3080 and 3090 Graphics Cards The new water block is one of the larger ones in the 3000 series, so make sure your PC case can accommodate it. It's 157mm wide and 320mm long and cools all key components on the GPU's printed circuit board. This gives the water block advantage on the market of having a clean design, showing off all of the cooling liquid, and cooling each and every necessary component. The EK-Quantum Vector Trio RTX 3080/3090 water block is compatible with MSI Trio and Suprim RTX 3080 and 3090 graphics cards.
portf = {"AAPL", "BA", "IBM", "", "DIS", "R", "PEP", "BRBY. L", "AXP", "BTI"}; prices = FinancialData[#, "Price", {{2004}, {2011}, "Month"}] & /@ portf; Returns are often calculated as the difference of the logarithms of the prices: Differences[Log@#] &[prices[[1, All, 2]]] This works because $\log(\text{price}_{new})-\log(\text{price}_{old})=\log(\text{price}_{old}(1+r))-\log(\text{price}_{old})=\log(1+r)$, which is Series[Log[o (1 + r)] - Log[o], {r, 0, 2}] that is, approximately $r$. But we can get returns from FiancialData right away using "FractionalChange" instead of "Price": portReturns = FinancialData[#, "FractionalChange", {{2004}, {2011}, "Month"}] & /@ portf; Can't hurt to check the data a bit. Let's see if we have data from the same dates: Outer[ Length[Intersection[#1, #2]] &, portReturns[[All, All, 1]], 1] // MatrixForm It appears not all periods are exactly the same. So, if we want to be prudent we could use only the data for the periods that match. overlappingDates = Intersection @@ (#[[All, 1]] & /@ portReturns); portReturnsCleaned = Select[#, MemberQ[overlappingDates, #[[1]]] &][[All, 2]] & /@ portReturns; Now, introduce symbolic weights and define portfolio return and variance in terms of them.