malware
See the following -
U.S. Department of Veteran Affairs and UL Sign CRADA for Medical Devices Cybersecurity Standards
The U.S. Department of Veteran Affairs (VA) and UL (Underwriters Laboratories), a global safety science organization, today announced a signed Cooperative Research and Development Agreement Program (CRADA) for medical devices cybersecurity standards and certification approaches. As part of the Federal Technology Transfer Act of 1986, the CRADA mechanism was established to encourage the creation of teams to solve technological and industrial problems for the greater benefit of the country...
- Login to post comments
US Utility Companies Warned About Potential for a Cyberattack After Ukraine’s
The Obama administration has warned the nation’s power companies, water suppliers and transportation networks that sophisticated cyberattack techniques used to bring down part of Ukraine’s power grid two months ago could easily be turned on them. After an extensive inquiry, American investigators concluded that the attack in Ukraine on Dec. 23 may well have been the first power blackout triggered by a cyberattack — a circumstance many have long predicted...
- Login to post comments
Want To Protect Your EHR From Hackers? Secure Those Mobile Devices
Hackers used malware to penetrate Community Health Systems' firewall, and once inside, they made off with some 4.5 million medical records — a staggering but not surprising number to cyber security professionals. While the uninformed may ask how such a thing could happen, the probable cause is user error...
- Login to post comments
Why Implanted Medical Devices Should Have Open Source Code
As medical implants become more common, sophisticated and versatile, understanding the code that runs them is vital. A pacemaker or insulin-releasing implant can be lifesaving, but they are also vulnerable not just to malicious attacks, but also to faulty code. For commercial reasons, companies have been reluctant to open up their code to researchers. But with lives at stake, we need to be allowed to take a peek under the hood. Over the past few years several researchers have revealed lethal vulnerabilities in the code that runs some medical implants.
- Login to post comments
Why The Sony Hack Should Scare Feds
As the fallout from the unprecedented electronic attack on Sony Pictures Entertainment continues, cybersecurity experts said federal IT managers -- while likely facing no immediate threat from the group that attacked Sony -- should be paying close attention...
- Login to post comments
Your Money or Your PHI: HHS Issues New Guidance on Ransomware
To help health care entities better understand and respond to the threat of ransomware, the HHS Office for Civil Rights has released new HIPAA guidance. One of the biggest current threats to health information privacy is the serious compromise of the integrity and availability of data caused by malicious cyber-attacks on electronic health information systems, such as through ransomware. The FBI has reported an increase in ransomware attacks and media have reported a number of ransomware attacks on hospitals...
- Login to post comments
‘Cybersecurity Has Become a Full-Time Job’ in Healthcare
If 2015 was supposed to be the “year of the hack” in healthcare, cybercriminals really were just getting started. This year, we have seen the rise of ransomware targeting healthcare organizations, plus continued phishing attacks and even some good, old-fashioned laptop theft. Then, on Oct. 21, hackers unleashed a series of distributed denial-of-service (DDoS) attacks on the East Coast, effectively shutting down access for millions to popular sites, including Twitter, Spotify, PayPal, Netflix and Comcast...
- Login to post comments
Cyber Resilience: Protecting Data and Immunizing Software
Two of the most innovative and impactful cyber security technologies will be featured in a one hour webinar. Cyber Reliant uses a unique shredding technology to protect data at rest, in transit, and in use. RunSafe Security transforms (or "stirs") existing software binaries on devices and in embedded systems to cyber harden them against memory corruption, supply chain, and zero-day attacks. Both of these technologies function under the assumption of breach. Don't miss this opportunity to hear about these two game-changing cyber technologies and ask the presenters your questions.
- Login to post comments
- previous page
- 1
- 2
- 3
- 4