Some 3.2 million Indian debit cards may have been compromised, according to the National Payments Council of India. While investigations are ongoing and several banks have reissued at-risk cards, the source of the card exposure has not been officially confirmed.
Former NSA contractor Harold T. Martin III., who is accused of pilfering mass quantities of highly classified information, will remain in jail until his trial. Martin engaged in "a course of felonious conduct that is breathtaking in its longevity and scale," prosecutors say.
Ransomware attacks have become commonplace in the healthcare sector, so it's only a matter of time before your organization is targeted. The ransomware epidemic is yet another reminder that all organizations need to manage security across the enterprise and be able to detect new vulnerabilities and respond quickly to...
Did you know that 85 percent of intrusion techniques can be mitigated with prevention disciplines? Prevention is the best defense against malware, ransomware and other cyber threats. As these threats continue to mount and become more complex, understanding and managing the inherent risks must be a top priority. In...
Ransomware attacks are pervasive: There are more than 4,000 such attacks in the U.S. each day. To battle ransomware and other cyberattack threats, a layered approach to security is always best. But your endpoints are your last line of defense. After all, your data resides on laptops and other mobile devices as well as...
A recent breach reported by an Arlington, Texas-based pediatric clinic serves as the latest reminder of the substantial risks ransomware poses to patient data. The clinic offers advice to others based on difficulties it experienced in the response to the attack, and security experts also provide insights.
An online store touting Republican Party paraphernalia was one of thousands hit by sneaky JavaScript that exported payment card details to Russia. The site is fixed, but the hack underscores ongoing challenges in securing e-commerce platforms.
Cybercriminals are continuing to refine their art: Researchers say there are now more than 200 ransomware families, which complicates ongoing attempts to disrupt such attacks.
How Effective Are Your Current Anti-Malware Tools for Keeping Endpoints Secure?
More than half of surveyed security leaders rate their organizations' current anti-malware protection above average or superior. And yet ...
54 percent say their organizations have experienced ransomware in the past year;
25...
As U.S. ATM operators face MasterCard's Oct. 21 EMV liability shift deadline, a surge in explosive attacks against European ATMs is a reminder that anti-fraud features won't block all money machine crime.
As the cost of cybercrime escalates across all industries, banks are suffering the most. Banks are paying particular attention to payment fraud through online and mobile channels - wire transfer fraud has more than doubled year over year and 73% of organizations experienced payments fraud in 2015. (AFP 2016 Payment...
A malware-wielding gang has been targeting financial firms' SWIFT software to inject fraudulent money-moving messages since at least January in "discreet campaigns" not tied to the Bangladesh Bank hack, Symantec warns.
The National Health Information Sharing and Analysis Center aims to better engage smaller healthcare organizations in cyber threat information sharing, leveraging funds from two recent federal grants. Denise Anderson, president of NH-ISAC, describes the plans in this in-depth interview.
As cyberattacks on healthcare entities continue to surge, federal regulators are urging organizations to safeguard network-attached storage devices and other gear that supports or enables file transfer protocol services.
The writing is on the wall. Nearly every company will move to Office 365 sooner or later. Data sharing and data movement are key elements of any O365 adoption - from an Exchange Online plan that comes with a 50GB mailbox, the Outlook app, and OneDrive to the full ProPlus packages. Starting with the very first step, a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.