The recent news that Nexus One smartphone owners were unable to send or receive data is just a precursor to what security experts say is the next big threat to mobile phones and services - mobile malware.
According to Dr. Markus Jakobsson, a noted security expert in the field of phishing and crimeware, mobile...
The Wyoming Department of Health reports that personal information about clients and applicants for the state's Children's Health Insurance Program, known as Kid Care, was improperly appearing in Google search results.
Envelopes mailed Feb. 1 to nearly 50,000 Californians included their Social Security numbers on the mailing labels, according to the California Department of Health Care Services.
On Feb. 6, the state agency began sending notification letters to the adult day health care services beneficiaries notifying them of the...
A former patient care assistant at a Houston hospital was sentenced to 60 months in prison on February 3 after pleading guilty to bank fraud and stealing the identities of patients.
Interview with James Van Dyke of Javelin Strategy & Research
Identity fraud crimes expanded at a 12% rate in 2009. What can we expect to see in 2010?
Javelin Strategy & Research is out with its latest Identity Fraud Study. For insight on the study results and what they mean to organizations across industry,...
Four healthcare associations have called on the Federal Trade Commission to exclude healthcare professionals from compliance with the Identity Theft Red Flags Rule designed to combat identity theft. The groups made the request in the wake of a court ruling exempting attorneys from the rule.
Some healthcare organizations saw a doubling in hacker attacks in the fourth quarter of 2009, according to a small study of customers of SecureWorks Inc., an Atlanta-based information security services company.
The CIO for the Medicare and Medicaid programs and the leader of the federal incentive program for electronic health records are among many speakers who will address data security at the Healthcare Information and Management Systems Society Annual Conference.
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
The Heartland Payment Systems (HPY) data breach came as an unpleasant surprise to many financial institutions and their customers in early 2009. What are the threats we should eye as we look ahead to 2010?
The Heartland Payment Systems (HPY) data breach came as an unpleasant surprise to many financial institutions and their customers in early 2009. What are the threats we should eye as we look ahead to 2010?
In an exclusive interview, Bryan Sartin of Verizon Business, discusses the company's exhaustive research of...
Verizon Business investigated 90 major data breaches in 2008, including 285 million compromised records. Nearly ¾ of those breaches were external hacks, and 99.9 percent of the records were compromised via servers and applications.
These are among the findings of Verizon's new 2009 Data Breach Investigations...
The Heartland Payment Systems data breach is on everyone's mind, and the case is in the hands now of the Federal Trade Commission (FTC) if it chooses to investigate. While the FTC will neither confirm nor deny a Heartland investigation, staff attorney Alain Sheer does offer his insight on:
How the FTC investigates...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.