Search Results | Malware
PREV 1...10   20   30...46   47   48   49   50   51   52   53   54   55...   60   65   70...77 NEXT
Sort by:  Most Relevant  |  Date
Way Cool Repair Tool: Reimage

Blog  I read Windows Secrets regularly (a newsletter from Brian Livingston, Woody Leonhard, and a whole crew of other Windows stalwarts and experts). As I skimmed over the last issue, I chortled at the sight of an advertisement that promised to "...simply fix... Windows PC's. Once only available to techni...

Last updated: Nov 5, 2010   8:50 PM GMT  |  Blog: Windows Enterprise Desktop
CryptoSafeGuard Ransomware Protection For SMBs by BackupAssist

Blog  Ransomware is one of the biggest threat to any business of whatever size. There is only one way to escape once you are in the trap of hackers. And that is to pay the ransom. In fact, depending on the level of the hacker, you never know if the complete data is safe or not. What if the hacker replicat...

Last updated: Aug 31, 2017   8:55 AM GMT  |  Blog: Quality Assurance and Project Management   |      CRYPTO, Ransomware, SMB
Symantec gives its ThreatCon a makeover

Blog  There's not a lot of passion in the security blogosphere this week over any topic in particular, but there are some nuggets worthy of note, including an announcement in the Symantec Security Response blog about a makeover for the company's ThreatCon. Many security organizations use a measurement sy...

Last updated: Jul 20, 2007   9:33 AM GMT  |  Blog: Security Bytes
From "no" to "know": a report from the Eskenzi CISO forum

Blog   This year's Eskenzi PR annual IT Security Analyst & CISO (chief info security officer) Forum was the 8th such event and attracted the security leaders of some of the largest UK organisations. Household names from insurance, banking, accounting, pharmaceuticals and media were all represented, as...

Last updated: Jun 11, 2015   2:55 PM GMT  |  Blog: Quocirca Insights
What Could You Do With a Stolen DNA Database?

Blog  A DNA testing database was apparently hacked sometime last fall, but it wasnt nearly as interesting as it could have been. It wasnt one of the more well-known sites like 23andme or It also wasnt the GEDmatch site that law enforcement used to track down the so-called Golden...

Last updated: Jun 7, 2018   1:30 PM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery   |      privacy, Security
Combatting the continued expansion of IoT threats

Blog  The expanding threat landscape resulting from the convergence of cyber and physical systems is providing cybercriminals with additional entry points into the corporate network. This is not going unnoticed by cybercriminals. The Fortinet Threat Landscape Report for Q4 of 2018 not only showed that hal...

Last updated: Mar 5, 2019   6:21 PM GMT  |  Blog: IoT Agenda   |      botnets, Internet of Things, iot
Can California legislation save the world from IoT security risks?

Blog  I am known for railing against IoT devices because I consider them the eventual destroyers of the internet as we know it. They are not secure, most people that use them do not realize they are not secure, and most vendors that make them have done little knowing they are not secure. Having said that...

Last updated: May 2, 2019   7:17 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT devices
F-Secure glams-up laptop security with glitter nail polish

Blog  Finnish security firm F-secure kicked off its 2016 European labs tour this week with an unusual free gift. A bottle of glitter nail polish was handed over to all, boys and girls alike. For all the security-driven software developer know-how thats out there, a bottle of nail varnish might j...

Last updated: Jun 9, 2016   9:17 AM GMT  |  Blog: CW Developer Network
The first steps of understanding mobile security

Blog  We live in a very mobile heavy society and many enterprises have mobility at the center of their IT strategy. As such, it can't help to understand mobile security better and equipping your organization with the security tool kit to defend yourself from harm. Before setting guards in place, it's imp...

Last updated: Jun 9, 2016   3:11 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
Millions of Medical Records Stolen from Unlocked Van

Blog  All the data security in the world doesn't help if you don't lock the damn door. Medical and financial records of about 1.7 million people -- mostly patients -- fromJacobi Medical Center, North Central Bronx Hospital,Gunhill Health Center, and Tremont Health Center in New York's The Bronx wer...

Last updated: Feb 15, 2011   4:38 AM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery
NT4 Security

Blog  The very first time I put finger to keyboard on a task to write some useful code was whilst serving in the RAF back in the early nineties. Judging by the decision made by the MOD to extend the life of the RAF's NT4 network (see article as reported in Computer Weekly here) I wouldn't be surprised if ...

Last updated: Apr 4, 2007   5:28 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      H-IPS, Network security, NT4
Gartner IT Security Summit - day 1

Blog  I'm back from a good first day at the Gartner IT Security Summit being held in London. Two of the sessions I attended were particularly good. Firstly, there was Richard Hunter of Gartner who presented on "IT Risk: Turning Business Threats Into Competitive Advantage." I've seen Richard present befor...

Last updated: Sep 18, 2007   6:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Gartner
Thoughts on UTM

Blog  We've been having some discussions here about UTM (Unified Threat Management) devices. For those of you who don't know, UTM applicances are products that unify and integrate multiple security features integrated onto a single hardware platform. For instance, a single device typically includes firew...

Last updated: Mar 1, 2007   7:21 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      UTM
Final FDA rule sets up UDI system for medical devices

Blog  The U.S. Food and Drug Administration (FDA) released its long-awaited final rule for unique device identification (UDI) system for medical devices, which will make recalls more straightforward and better organize adverse event reporting all in an effort to improve patient safety. The rule cente...

Last updated: Sep 24, 2013   5:59 PM GMT  |  Blog: Health IT Pulse   |      medical device security, medical devices, mHealth applications
HIMSS reports spike in health IT security worries

Blog  Until recently cyber-security was one of many issues for health IT executives; now it is top of mind for most. Anecdotally, it is abundantly clear how widespread increased worry about cyber-attacks on healthcare data networks is. Also, a recent SearchHealthIT survey found that security systems are ...

Last updated: Jul 1, 2015   7:02 PM GMT  |  Blog: Health IT Pulse   |      cybersecurity, HIMSS
IoT in healthcare: Four attack scenarios and what to do

Blog  As medical devices become increasingly connected to the internet and, therefore, the Internet of Things (IoT), Forrester Research, said in a report that there are four types of attacks healthcare organizations need to aware of, especially after coming off the worst year for data breaches in healthca...

Last updated: Aug 31, 2016   5:40 PM GMT  |  Blog: Health IT Pulse   |      Internet of Things, medical device security
OCR HIPAA guidance

Blog  As Boston lawyer and HIPAA healthcare expert David Harlow points out in his eminently useful blog post on the Office for Civil Rights' recent guidance on cloud computing, there's really not that much new in the guidance, but the bits that are bear examining. Harlow parsed OCR's dense legalese and c...

Last updated: Oct 12, 2016   6:45 PM GMT  |  Blog: Health IT Pulse   |      Cloud Computing, HIPAA, OCR
Health data breaches down in October

Blog  The number of health data breaches decreased for the second month in a row following a summer that saw a record number of breaches, according to the Protenus Breach Barometer. There were 35 reported data breaches, compared to 37 reported incidents in September. The decrease followed 42 data breache...

Last updated: Nov 18, 2016   10:14 PM GMT  |  Blog: Health IT Pulse   |      Data breach, health care data breach, Stolen data
Amid holiday cheer, OCR issues warnings in form of resolution agreements

Blog  The U.S. Department of Health and Human Services HIPAA-enforcing arm, OCR (Office for Civil Rights), has bestowed a few early Christmas presents on healthcare providers and their business associates. The festive cheer all came this November and December in the form of three costly resolution agr...

Last updated: Dec 23, 2015   7:52 PM GMT  |  Blog: Health IT Pulse   |      HIPAA, HIPAA security rule, OCR
"Night Dragon" Attacks Oil Industry

Blog  A report published by McAfee illustrates in detail an extensive pattern of precision attacks targeted specifically against the oil industry. The revelation from McAfee is yet another example of the rising trend of malware as a tool for corporate espionage, and the threat of state-sponsored cyber att...

Last updated: Feb 11, 2011   2:06 PM GMT  |  Blog: The Security Detail
PREV 1...10   20   30...46   47   48   49   50   51   52   53   54   55...   60   65   70...77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: