Apple iOS and Mac OS X devices are susceptible to WireLurker, a previously unseen malware family that spreads via a third-party Chinese app store, and which can infect even non-jailbroken iOS devices, Palo Alto Networks warns.
Although compliance with new FDA guidance recommending that medical device makers bake cybersecurity into the design of their products is voluntary, the guidelines likely will become de facto standards, says privacy attorney Ellen Giblin. Find out why.
Sen. Ron Johnson, R-Wis., the presumptive chairman of the Senate committee with government IT security oversight, hasn't immersed himself heavily in cybersecurity issues during his 4-year Senate tenure.
The new director of Britain's eavesdropping agency, GCHQ, has blasted U.S. technology firms, arguing that - intentionally or not - they're "the command-and-control networks of choice for terrorists and criminals."
JPMorgan Chase in September confirmed that it was the victim of a cyber-attack that compromised customer information. This infographic provides an overview of what we know so far and what questions remain unanswered.
An HHS watchdog agency plans a number of information security reviews, ranging from examining oversight of hospitals' medical device cybersecurity to sizing up electronic health record contingency planning.
The National Institute of Standards and Technology has released a draft of guidance aimed at helping government agencies and businesses establish, participate in and maintain cyberthreat information sharing relationships.
Emerging Web-enabled health technologies, ranging from the upcoming Apple Watch to a Google "pill" that could potentially detect cancer in patients' bodies, pose troubling new privacy risks, says privacy advocate Deborah Peel, M.D.
The breach of an unclassified White House IT network unveiled last week is disturbing, although not surprising. But the way the Obama administration is informing Congress - and the public - about the cyber-attack is equally unsettling.
In new guidance from the PCI Council, its leaders outline why businesses that handle card data need to address employee education. Here, experts explain why this guidance is a positive step for card security.
A settlement finalized this past week in a class action lawsuit filed in 1997 against Tenet Healthcare for a privacy breach involving thousands of patients' paper records offers important lessons for healthcare providers today.
Automated attacks have potentially compromised the majority of websites that run the Drupal content management system, giving attackers platforms for launching malware, DDoS attacks and spam, according to the Drupal security team.
Air-gapped networks promise security by disconnecting PCs from the Internet. But graphics cards in malware-infected systems attached to air-gapped networks can be made to broadcast data via FM radio to nearby smart phones, researchers warn.