Johns Hopkins Health System has agreed to a $190 million settlement in a privacy violation case that involved a physician using a pen-like camera to secretly photograph female patients. Learn what the organization is doing to prevent other privacy incidents.
The EU Joint Cybercrime Action Taskforce pilot is set to coordinate cross-border investigations - across Europe, the United States and beyond - into cybercrime, including payment card fraud, DDoS attacks and malware rings.
Enabling the secure sharing of patient data is a key aspect of work under way to modernize the Department of Veterans Affair's VistA electronic health record system, says Jim Traficant of ASM Research, which is leading an infrastructure project.
Despite official suggestions to the contrary, the Cryptolocker ransomware isn't dead yet, even as new types of ransomware continue to flood onto black market cybercrime forums, one researcher claims.
BYOD poses some of the biggest privacy and security risks facing the healthcare sector, but the efforts of the new IBM/Apple alliance could help address concerns about using personally owned mobile devices, says IBM's Dan Pelino.
A controversial U.K. "emergency" surveillance bill has become law, just seven days after being introduced to Parliament. But a privacy rights group has already promised to challenge the new law in court.
Two zero-day vulnerabilities reportedly were exploited by the attackers who hacked NASDAQ's systems in 2010. While a senior U.S. legislator claims the hackers had "nation-state" backing, security experts say it's still not clear who hacked NASDAQ or why.
Healthcare IT security experts weigh in on whether the new alliance of IBM and Apple could potentially help transform the iPhone and iPad from favorite personal devices used by clinicians to enterprise-sanctioned, secure mobile platforms.
"United we stand; divided we fall." That's the message from Art Coviello to kick off the 2014 RSA Conference Asia Pacific & Japan in Singapore. What advice does the RSA chair offer to global security leaders?
A security expert and average consumers respond differently to the eBay breach. As most customers retain a high degree of faith in online merchant security, the expert believes eBay committed a serious sin in its lack of strong authentication.
It's unlikely that the downing of a Malaysian airliner by an anti-aircraft missile over Ukraine and the air and land battles in Gaza could expand into a cyberwar. Here's why.
From Neiman Marcus to P.F. Chang's, 2014 has shaped up to be the 'Year of the Data Breach.' What lessons can be gleaned from the trenches of breach investigation? Experian's Michael Bruemmer shares tips.
Online retailer eBay is feeling the impact of its early 2014 breach where it hurts the most: in its coffers. Recovery "will take longer and cost more," CEO John Donahoe says.
The Obama administration urges Congress to update U.S. anti-hacking laws to crack down on fraudsters operating abroad, disrupt spam and DDoS botnets, and arrest "botnet for hire" service providers.
The Obama administration withholds judgment on the Cybersecurity Information Sharing Act until the bill is scheduled for a Senate floor vote. But no one is saying if or when that will happen.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.