malicious software

See the following -

Cybersecurity—A Serious Patient Care Concern

Mark P. Jarrett | The JAMA Network | October 10, 2017

The world of paper medical records has almost disappeared, ushering in a new era of electronically stored, analyzed, and shared medical information that offers exciting opportunities for improved patient care. However, this major shift in information management has introduced unintended and unfavorable consequences, such as theft of patient-protected health information, wide-scale sequestering of medical records by ransomware (malicious software—malware—that permanently blocks the access to records unless a ransom is paid), and the ability for hackers to directly harm patients...

Read More »

Print No Evil: Three-Layer Technique Helps Secure Additive Manufacturing

Press Release | Georgia Institute of Technology | August 16, 2017

Additive manufacturing, also known as 3-D printing, is replacing conventional fabrication processes in critical areas ranging from aerospace components to medical implants. But because the process relies on software to control the 3-D printer, additive manufacturing could become a target for malicious attacks – as well as for unscrupulous operators who may cut corners. Researchers from the Georgia Institute of Technology and Rutgers University have developed a three-layer system to verify that components produced using additive manufacturing have not been compromised...

The Belarusian Connection

Bill Gertz | The Washington Free Beacon | February 3, 2014

U.S. intelligence agencies last week urged the Obama administration to check its new healthcare network for malicious software after learning that developers linked to the Belarus government helped produce the website, raising fresh concerns that private data posted by millions of Americans will be compromised. Read More »

Why Feds Are Still Buying IT That Works With Windows XP

Aliya Sternstein | Nextgov.com | April 1, 2014

During the past year, various agencies have bought or expressed interest in buying products compliant with a Microsoft operating system set to lose security support next week, according to a review of federal solicitations and the agencies themselves. The Air Force, Navy and Marine Corps, as well as the Veterans Affairs, Labor and State departments are a few of the Windows XP holdouts.

Read More »

Will “Digital Fingerprint” Forensics Thwart the Data Thieves Lurking in Hospital EHR Corridors?

As Halloween approaches, the usual spate of horror movies will intrigue audiences across the US, replete with slashers named Jason or Freddie running amuck in the corridors of all too easily accessible hospitals. They grab a hospital gown and the zombies fit right in.  While this is just a movie you can turn off, the real horror of patient data theft can follow you...Unfortunately, this horror movie scenario is similar to how data thefts often occur at medical facilities. In 2015, the healthcare industry was one of the top three hardest hit industries with serious data breaches and major attacks, along with government and manufacturers. Packed with a wealth of exploitable information such as credit card data, email addresses, Social Security numbers, employment information and medical history records, much of which will remain valid for years, if not decades and fetch a high price on the black market.

Read More »

Zero-Day Paranoia And The Reality Of Modern Web Browsing

Jason Perlow | ZDNet | January 12, 2013

Remote code execution is an end-user nightmare that can be stopped tomorrow, if we enact the appropriate technologies to prevent it. Read More »