Once again, a supposedly secure service allegedly marketed to criminals has proven to have limits. Dutch police have busted a "cryptophone" operation, allowing them to decrypt more than 258,000 encrypted chat messages, leading to a drug lab bust, 14 arrests and the seizure of cash, drugs and weapons.
Email is Insecure
Boards of directors need effective communication and collaboration in order to reach their goals and fulfill the mission of the organization. Unfortunately, this puts corporate secretaries, general counsels and main board administrators under a lot of pressure to manage, secure and govern board...
Organizations are focused on protecting traditional devices - laptops, desktops - but at each one of those endpoints is a user who has at least one and typically more than one mobile device. You may also have devices in the field to interact with customers and prospects or use IoT tools. This means that about half of...
A new "playbook" co-developed by the Food and Drug Administration and Mitre Corp. aims to assist healthcare delivery organizations in responding to cybersecurity incidents involving medical devices. Julie Connolly, who helped develop the guide, explains how to use it.
Before marketing their medical devices, manufacturers should prepare a "cybersecurity bill of materials" that lists components that could be susceptible to vulnerabilities, according to a draft of updated FDA premarket guidance.
With at least 20 billion new consumer devices set to be internet-connected by 2020, initiatives in the U.K. and California are trying to ensure that as many IoT devices as possible will be out-of-the-box secure, for starters by not shipping with default passwords.
The FDA has announced a "voluntary recall" by Medtronic of certain internet-connected programmers for implantable cardiac devices due to cybersecurity vulnerabilities. Some security experts are hopeful that this will serve as a wake-up call for more manufacturers to take action on addressing cybersecurity issues.
Hackers remotely accessing medical devices and systems - potentially disrupting care and putting patients at risk - is the No. 1 technology hazard facing healthcare entities in the year ahead, according to a new report from the ECRI Institute. Security experts size up the significance of this risk.
Heathrow, the U.K.'s largest airport, has been fined by the country's privacy watchdog for a series of data security missteps that led to a USB memory drive containing highly sensitive information being lost by an airport security trainer on a London city street, where it was found by a passerby.
There is greater awareness to the proliferation of mobile threats, and yet many organizations still underestimate their own vulnerabilities. Brian Duckering of Symantec discusses the rise and maturity of mobile threat defense.
There is greater awareness to the proliferation of mobile threats, and yet many organizations still underestimate their own vulnerabilities.
Mobile security should be taken just as seriously - if not more so - as traditional endpoints. Every employee behind a desktop computer also has at least one mobile device...
Businesses MUST address the proliferation of mobile devices in the workplace, whether authorized or not. For every laptop, there is a mobile phone, literally doubling the attack surface for hackers to breach your business and cause harm to you and/or your customers. While protection for traditional devices has long...
The Food and Drug Administration plans to launch a new digital health "center of excellence" that includes a cybersecurity unit. The new unit would not only deal with cyber issues pertaining to new health technologies, but also challenges facing older medical devices.
If you hold, share or have access to important information, you should assume your smartphone has already been hacked.
Unprotected smartphones could pose the greatest security risks to governments, enterprises and individuals. Consider what's at stake and prevent hackers from capitalizing on your...
Smartphones present a uniquely large attack surface that has been repeatedly exploited by threat actors, making it risky to trust these devices with important data. Inherent limitations in the mobile architectures of
these devices - especially in a world of chip-based attacks - mean that organizations must find new...