Yet another California healthcare breach-related lawsuit - this one involving Alere Home Monitoring - has been dismissed because of the lack of proof that anyone actually viewed data stored on an unencrypted computer device that was stolen.
Cybersecurity Coordinator Michael Daniel says much of the Obama administration's efforts will involve getting whatever IT security policy passed on whatever vehicle is available as long as the measure is acceptable to the White House.
Leading this week's industry news roundup, Sophos acquires Mojave Networks to help strengthen its cloud-managed and appliance-based security solutions, while Corero introduces a DDoS analytics application.
Citigroup, E*Trade, Regions Financial, Fidelity Investments, HSBC, Bank of the West and ADP are now believed to have been probed by the same hackers that targeted Chase, according to news reports. But so far, none of those firms believes data was compromised.
The Health Information Trust Alliance, in collaboration with several healthcare-related organizations, has developed and is piloting an automated early warning system to share cyberthreat intelligence.
Federal authorities are ramping up efforts to crack down on healthcare fraud, announcing plans apparently aimed at prosecuting top executives at hospitals and other organizations involved with fraud - and targeting other fraudsters as well.
Some privacy experts are expressing concern about a report that social media giant Facebook is planning to enter the healthcare market with health apps and patient support communities. Find out the nature of their worries.
Yahoo confirms Shellshock-targeting attackers hacked into three of its servers, but claims they didn't exploit Bash flaws. Meanwhile, Lycos denies it's been breached and WinZip isn't responding directly to a report that it was hacked.
The hackers who breached JPMorgan Chase also infiltrated about nine other financial institutions, and may be operating from Russia, according to one news report. But security experts caution against jumping to conclusions over attackers' identities or motives.