Warning: A dumped Equation Group exploit is designed to bypass authentication on 386 types of Oracle databases. One concern is that the exploit might be used by attackers such as the Lazarus Group to refine their attempts to inject fraudulent money-moving messages into the SWIFT network.
As President Trump approaches day 100 of his presidency April 29, it's time to assess the impact of his administration so far on health data privacy, security and related health IT issues. Do we have any more clarity now than we did when he took office in January?
The purported hacking of computers of French presidential candidate Emmanuel Macron, by the same Russian group that targeted Hillary Clinton's campaign, signifies an expansion of the goals of the attackers that extend beyond trying to influence the outcome of Western elections.
A lack of computer security professionals in Australia made recruiting difficult. But new changes to immigration rules may really pinch the country's nascent cybersecurity industry.
In the wake of fraud reports, Blowout Cards has issued a security alert to customers, warning that an attacker hacked its website and installed a PHP file designed to skim payment card details at the time of purchase.
Word that President Donald Trump's cybersecurity executive order could be unveiled in days leads the latest edition of the ISMG Security Report. Also, large Australian companies anticipate rise in information security risk.
Healthcare organizations must take a long view in their security risk management programs rather than focus on the "cyberthreat du jour," says security expert Bob Chaput, who explains why.
Federal regulators have smacked a mobile heart-monitoring technology firm with a $2.5 million HIPAA settlement related to findings from an investigation into a 2012 breach involving a stolen unencrypted laptop. What factors led to the substantial penalty?
More than15 years ago, the nation of Estonia rolled out a digital identity program for all citizens, allowing access to government services, banking, shopping - even voting. What lessons can global businesses learn from Estonia's example? Joseph Carson of Thycotic offers insight.
Federal regulators, in their latest HIPAA settlement, are again reminding healthcare entities about the importance of having business associate agreements with vendors that handle patients' protected health information.
A federal judge has sentenced 32-year-old Russian hacker Roman Seleznev, aka "Track2," to serve 27 years in prison after he was convicted of defrauding 3,700 U.S. financial institutions of at least $169 million via point-of-sale malware attacks.
When an employee exits, it's essential to ensure their access rights don't go with them. Too often, however, organizations fail to track who's joining, leaving or changing roles, leaving them at increased risk of malicious activity.
President Donald Trump last week failed to meet a self-imposed, 90-day deadline to issue a report on "hacking defenses." But let's not nit-pick. After all, cybersecurity is complex - something the president is likely discovering along with healthcare and tax reform.
Free advice for breached businesses: Once you admit that you've suffered a data breach or that you're investigating a security incident, disseminate that message far and wide so no one can accuse you of trying to cover it up. That's the lesson from an incident at BlowOut Cards, a sports card trading site.
A class action lawsuit against telehealth software vendor MDLive shines a spotlight on regulatory gaps and other murky privacy and security issues related to the growing use of consumer health applications.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.