To mitigate the newly discovered Bash bug - AKA Shellshock - which may make millions of systems vulnerable to remote takeover, organizations must take several key steps, says security expert Alan Woodward.
The social media savvy Islamic State frightens most of the world with its gruesome Internet postings of executions and online recruitment of new Jihadists. But is the terrorist group likely to launch cyber-attacks?
Security experts are warning that millions of systems - Apache servers, Linux and Mac systems, and innumerable Internet of Things devices - may be vulnerable to a flaw in Unix that attackers are already using to gain shell access.
Healthcare providers that decide to accept consumer-generated health or fitness data from wearable devices, such as the upcoming Apple Watch, need to develop a plan for protecting the privacy of that information, says privacy attorney Scot Ganow.
Financial institutions are starting to report fraud tied to the massive Home Depot payment card data breach. One card issuer calls the fraud ramp up "much greater than what we saw from Target, Michaels and Neiman Marcus."
FS-ISAC has teamed up with the Depository Trust and Clearing Corp. to offer software designed to ease cyberthreat information collection and sharing, helping safeguard against cyber-attacks.
Jocelyn Samuels, who recently became the nation's top HIPAA enforcer, is sending a strong message: Conduct a security risk analysis to help prevent breaches, or face enforcement consequences.
When it comes to the evolution of machine data, security organizations now can improve protection and the top line. How can they maximize the business benefits? Jean-Francois Roy of TIBCO shares tips.
A researcher says he tricked the Touch ID biometric fingerprint scanner built into the new iPhone 6, using a fake fingerprint created with glue. But it remains to be seen how well would-be fraudsters could employ this technique.
Coming on the heels of a Government Accountability Office report identifying HealthCare.gov security flaws, a new report by another watch-dog agency finds some security weaknesses, as well as strengths, in the Obamacare site and systems.
In the year since federal regulators began enforcing the HIPAA Omnibus Rule, there's been a huge spike in the number of major breaches reported. What's behind the surge?
Banking Trojans are increasingly being repurposed for espionage purposes. Recent victims of modified banking malware include a chemical manufacturer as well as an unknown number of Salesforce users.
The unexpected departure of Steven VanRoekel as the federal chief information officer likely will have little direct impact on the Obama administration's cybersecurity initiatives. Find out why.
Security experts analyze the latest details that big-box retailer Home Depot provided about a breach that exposed 56 million payment cards. A hot topic: the nature of the malware used in the attack.
Healthcare organizations are increasingly top targets for sophisticated data breaches. How can they improve their defenses? Paul Smith of Ascension Health and Mark Hanson of Fortinet offer tips.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.