The U.S. Federal Trade Commission has filed a complaint against router and camera manufacturer D-Link for allegedly failing to secure its products. Experts say it's the opening salvo in what could be a long-term battle to fix IoT devices.
Security experts have seen a doubling in less than a day of successful attacks against insecure MongoDB databases in attempts to extract ransoms from their owners. What's the fix?
The English-language broadcaster RT, which has been closely linked to the Kremlin, is part of an ongoing Russian operation designed to sow distrust in democratic institutions, according to U.S intelligence agencies. Our collective poor cybersecurity practices only make its mission easier.
A new report from a bipartisan Congressional workgroup examining the benefits and challenges of the internet of things spotlights cybersecurity and privacy as top concerns. But will the new Congress take any action on these issues?
Medical device makers need to ensure they have procedures in place to take quicker action once they're alerted of cybersecurity issues in their products, says attorney Yarmela Pavlovic, who specializes in healthcare regulatory issues.
As the Trump administration begins, expect a ramp-up in cyber espionage as well as more "test attacks" by nation-states, says cybersecurity specialist Brad Medairy of the consultancy Booz Allen Hamilton.
Will more "historical" breaches be revealed in 2017 and beyond? Data breach expert Troy Hunt is optimistic that such revelations will become rare as large businesses operating online continue to improve security. But what about small and mid-size organizations?
With the rise of malware infecting IoT devices, DDoS defenders "have to assume that the attackers have an unlimited supply of machines that they can compromise," says Akamai's Michael Smith. But quarantines, ISP feedback loops and better patch management can bolster defenses.
As cybercriminals continue to wage more sophisticated, well-funded attacks, it's more urgent than ever to attract qualified professionals to careers in cybersecurity, Symantec CTO Dr. Hugh Thompson says in this audio interview.
Ransomware is going to get personal. Password managers will be huge targets. And we will see the rise of a whole new exploit kit. These are among the 2017 security predictions from Malwarebytes Laboratories. CEO Marcin Kleczynski offers insight on how to prepare.
With their reliance on so many IoT devices, how can healthcare organizations defend against menaces such as the Mirai malware, which exploit these devices to create powerful botnets and launch DDoS attacks? Akamai's Dave Lewis offers tips.
Remote attackers could easily exploit backdoor accounts and software problems in more than 80 models of Sony IP cameras to install IoT malware such as Mirai, warns Austrian security firm SEC Consult.
Healthcare entities must perform security due diligence when they consider introducing emerging technologies - including "internet of things" devices - into their environments, says attorney Stephen Wu, author of a new book on HIPAA compliance.
The latest ISMG Security Report leads with a look at how to protect patient data should President-elect Donald Trump and the Republican-led Congress follow through with their promise to dismantle Obamacare. Also featured is a discussion of whether IoT security should be regulated.
To help combat a surge in phishing attacks that spread malware, Cooper University Health Care has set up a system for employees to play an active role in the battle, Phil Curran, CISO and chief privacy officer, explains in this video interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.