FBI Director James Comey worries about data corruption, and he's focused on hackers altering data. But if government leaders feed false information into computer systems, what should IT and IT security practitioners do to protect data integrity?
Confide, an encrypted messaging application, received a surge of attention after White House officials began using it for leaks. But a teardown of the app by two security firms revealed a raft of serious security issues.
So far in 2017, hacking incidents continue to affect the largest number of individuals impacted by major health data breaches. Meanwhile, incidents involving unencrypted computing devices continue to decline, according to the federal breach tally.
In an in-depth interview, the Food and Drug Administration's Suzanne Schwartz, M.D., dispels some myths about the FDA's regulatory activities and expectations on the cybersecurity of medical devices.
Attackers are increasingly targeting mobile channels, driving banks to seek better ways of verifying the authenticity and integrity of not just users, but also mobile devices and transactions, says John Gunn of cybersecurity technology firm Vasco Data Security.
A federal judge in Illinois has rejected part of a search warrant application that would allow police to force anyone present at the time of a raid to use their fingerprints to unlock digital devices. But the decision far from resolves the issue of law enforcement's efforts to overcome encryption.
As more IoT devices are compromised to wage large-scale attacks, related litigation and regulatory scrutiny will grow, which means device manufacturers - and users - could be held more accountable, says Richard Henderson, global security strategist at Absolute.
A new website is now available for reporting medical device vulnerabilities, says Dale Nordenberg, M.D., executive director of the Medical Device Innovation, Safety and Security Consortium, who explains how MD-VIPER works in this in-depth interview.
In the enterprise of ubiquitous mobility, there are overlooked BYOD risks from the mobile apps and the unsecured networks employees use. David Jevans of Proofpoint shares how to mitigate these risks.
Easy Solutions' Ricardo Villadiego addresses how the digital revolution, millennials and the pervasive use of online communications affect financial fraud.
A war of words is escalating between Democratic and Republican lawmakers over President Trump's reported use of an unsecured Android mobile device to post messages on his personal Twitter account, @realDonaldTrump. Democrats want Congress to probe Trump's cybersecurity practices, but Republicans are resisting.
Televisions that spy on their users have long been a trope of dystopian fiction, including George Orwell's "1984." But the spying TV appears to be far from fictional, according to a new settlement agreement reached between the FTC and smart-TV maker Vizio.
With great efficiencies and cost savings also come great threats and fraud risks. This is today's digital reality, and it is why cybersecurity and the user experience need to be aligned to create digital trust, says Scott Clements of VASCO Data Security.
Donald Trump's inauguration has led to a call for a mass online protest of questionable legality designed to "occupy" the White House website. Separately, Anonymous has threatened Trump with "regret" and promised to unearth compromising information.
Say hello to Fruitfly, the first piece of Mac malware to be discovered this year. The two-year-old malicious code is odd - it includes code that dates from the late 1990s - and appears to be designed to exploit biomedical institutions via targeted attacks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.