malware

See the following -

U.S. Department of Veteran Affairs and UL Sign CRADA for Medical Devices Cybersecurity Standards

Press Release | Underwriters Laboratories | June 17, 2016

The U.S. Department of Veteran Affairs (VA) and UL (Underwriters Laboratories), a global safety science organization, today announced a signed Cooperative Research and Development Agreement Program (CRADA) for medical devices cybersecurity standards and certification approaches. As part of the Federal Technology Transfer Act of 1986, the CRADA mechanism was established to encourage the creation of teams to solve technological and industrial problems for the greater benefit of the country...

Read More »

US Utility Companies Warned About Potential for a Cyberattack After Ukraine’s

David E. Sanger | New York Times | February 29, 2016

The Obama administration has warned the nation’s power companies, water suppliers and transportation networks that sophisticated cyberattack techniques used to bring down part of Ukraine’s power grid two months ago could easily be turned on them. After an extensive inquiry, American investigators concluded that the attack in Ukraine on Dec. 23 may well have been the first power blackout triggered by a cyberattack — a circumstance many have long predicted...

Read More »

Want To Protect Your EHR From Hackers? Secure Those Mobile Devices

Ephraim Schwartz | mHealthNews | August 28, 2014

Hackers used malware to penetrate Community Health Systems' firewall, and once inside, they made off with some 4.5 million medical records — a staggering but not surprising number to cyber security professionals.  While the uninformed may ask how such a thing could happen, the probable cause is user error...

Read More »

Why Implanted Medical Devices Should Have Open Source Code

As medical implants become more common, sophisticated and versatile, understanding the code that runs them is vital. A pacemaker or insulin-releasing implant can be lifesaving, but they are also vulnerable not just to malicious attacks, but also to faulty code. For commercial reasons, companies have been reluctant to open up their code to researchers. But with lives at stake, we need to be allowed to take a peek under the hood. Over the past few years several researchers have revealed lethal vulnerabilities in the code that runs some medical implants. 

Read More »

Why The Sony Hack Should Scare Feds

Mark Rockwell | FCW | December 12, 2014

As the fallout from the unprecedented electronic attack on Sony Pictures Entertainment continues, cybersecurity experts said federal IT managers -- while likely facing no immediate threat from the group that attacked Sony -- should be paying close attention...

Read More »

Your Money or Your PHI: HHS Issues New Guidance on Ransomware

Jocelyn Samuels | HHS Blog | July 11, 2016

To help health care entities better understand and respond to the threat of ransomware, the HHS Office for Civil Rights has released new HIPAA guidance. One of the biggest current threats to health information privacy is the serious compromise of the integrity and availability of data caused by malicious cyber-attacks on electronic health information systems, such as through ransomware. The FBI has reported an increase in ransomware attacks and media have reported a number of ransomware attacks on hospitals...

Read More »

‘Cybersecurity Has Become a Full-Time Job’ in Healthcare

Neil Versel | MedCity News | November 28, 2016

If 2015 was supposed to be the “year of the hack” in healthcare, cybercriminals really were just getting started. This year, we have seen the rise of ransomware targeting healthcare organizations, plus continued phishing attacks and even some good, old-fashioned laptop theft. Then, on Oct. 21, hackers unleashed a series of distributed denial-of-service (DDoS) attacks on the East Coast, effectively shutting down access for millions to popular sites, including Twitter, Spotify, PayPal, Netflix and Comcast...

Read More »

Cyber Resilience: Protecting Data and Immunizing Software

Event Details
Type: 
Seminar/Webinar
Date: 
April 21, 2020 - 2:00pm - 3:00pm

Two of the most innovative and impactful cyber security technologies will be featured in a one hour webinar. Cyber Reliant uses a unique shredding technology to protect data at rest, in transit, and in use. RunSafe Security transforms (or "stirs") existing software binaries on devices and in embedded systems to cyber harden them against memory corruption, supply chain, and zero-day attacks. Both of these technologies function under the assumption of breach. Don't miss this opportunity to hear about these two game-changing cyber technologies and ask the presenters your questions.

Read More »