Radio controllers used in the construction, mining and shipping industries are vulnerable to hackers, Trend Micro says in a new report. To address the issue, researchers say, manufacturers need to move away from proprietary communication protocols and embrace secure standards, such as Bluetooth Low Energy.
The Trump administration has launched a public awareness campaign, spearheaded by the National Counterintelligence and Security Center, urging the U.S. private sector to better defend itself against nation-state hackers and others who may be trying to steal their sensitive data or wage supply chain attacks.
The embrace of Bring Your Own Device (BYOD) programs by employers and employees, which is transforming workplaces everywhere, brings with it a complex mix of benefits, costs and risks.
This is the summary of key findings from a recent survey conducted by Corporate Counsel Business Journal and AccessData, to explore...
The lack of strong encryption in Philips' HealthSuite Health Android app leaves the mobile health software vulnerable to hacking, according to a new advisory issued by the medical device manufacturer and an alert from the Department of Homeland Security.
What's the outlook for moving from awareness to action when it comes to medical device cybersecurity? Dale Nordenberg, M.D., executive director of the Medical Device Innovation, Safety and Security Consortium, offers an assessment.
Identity theft is the fastest growing
crime in the US. Globally, 1 in 60
online transactions are fraudulent.
That presents a huge financial
and reputational risk for regulated
businesses if they get their KYC
wrong. As more services move
online and fraud techniques mature,
document and biometric...
Consumer organizations in seven countries plan to file complaints alleging that Google is violating the EU's General Data Protection Regulation via its location, web and app activity tracking, in what could be a blow to the search giant's lucrative but data-hungry targeted advertising business.
The FDA's recently issued draft document updating its premarket medical device cybersecurity guidance originally issued in 2014 contains several important provisions, says regulatory attorney Yarmela Pavlovic, who explains the details.
Once again, a supposedly secure service allegedly marketed to criminals has proven to have limits. Dutch police have busted a "cryptophone" operation, allowing them to decrypt more than 258,000 encrypted chat messages, leading to a drug lab bust, 14 arrests and the seizure of cash, drugs and weapons.
Organizations are focused on protecting traditional devices - laptops, desktops - but at each one of those endpoints is a user who has at least one and typically more than one mobile device. You may also have devices in the field to interact with customers and prospects or use IoT tools. This means that about half of...
New account fraud is rising and within that, Identity Fraud is clearly the winner. The vast majority of such cases involved the abuse of an innocent victim's identity, rather than a fictitious identity. The availability of large amounts of personal information obtained from hacking, phishing or data breaches continues...
A new "playbook" co-developed by the Food and Drug Administration and Mitre Corp. aims to assist healthcare delivery organizations in responding to cybersecurity incidents involving medical devices. Julie Connolly, who helped develop the guide, explains how to use it.
Before marketing their medical devices, manufacturers should prepare a "cybersecurity bill of materials" that lists components that could be susceptible to vulnerabilities, according to a draft of updated FDA premarket guidance.
With at least 20 billion new consumer devices set to be internet-connected by 2020, initiatives in the U.K. and California are trying to ensure that as many IoT devices as possible will be out-of-the-box secure, for starters by not shipping with default passwords.
Banks are working harder than ever to address the threats posed by money launderers, fraudsters and cyber attackers. Often, these three groups are one and the same.
Wouldn't it make sense for the teams in your bank facing these threats to work together more closely? We think the answer lies in an intelligence-led...