Search Results | Malware
PREV 1...10   20   30...46   47   48   49   50   51   52   53   54   55...   60   65   70...76 NEXT
Sort by:  Most Relevant  |  Date
Symantec gives its ThreatCon a makeover

Blog  There's not a lot of passion in the security blogosphere this week over any topic in particular, but there are some nuggets worthy of note, including an announcement in the Symantec Security Response blog about a makeover for the company's ThreatCon. Many security organizations use a measurement sy...

Last updated: Jul 20, 2007   9:33 AM GMT  |  Blog: Security Bytes
CryptoSafeGuard Ransomware Protection For SMBs by BackupAssist

Blog  Ransomware is one of the biggest threat to any business of whatever size. There is only one way to escape once you are in the trap of hackers. And that is to pay the ransom. In fact, depending on the level of the hacker, you never know if the complete data is safe or not. What if the hacker replicat...

Last updated: Aug 31, 2017   8:55 AM GMT  |  Blog: Quality Assurance and Project Management   |      CRYPTO, Ransomware, SMB
10 Immutable Laws of Security Redux

Blog  Nearly six years ago, I posted "10 Immutable Laws of Security" on this blog. That post was based upon a Microsoft TechNet article"10 Immutable Laws of Security"and includedmy comments relative to the security universe at the time. I believe that this information is even more relevant than it w...

Last updated: Feb 9, 2015   1:21 AM GMT  |  Blog: Security Corner   |      Security
From "no" to "know": a report from the Eskenzi CISO forum

Blog   This year's Eskenzi PR annual IT Security Analyst & CISO (chief info security officer) Forum was the 8th such event and attracted the security leaders of some of the largest UK organisations. Household names from insurance, banking, accounting, pharmaceuticals and media were all represented, as...

Last updated: Jun 11, 2015   2:55 PM GMT  |  Blog: Quocirca Insights
What Could You Do With a Stolen DNA Database?

Blog  A DNA testing database was apparently hacked sometime last fall, but it wasnt nearly as interesting as it could have been. It wasnt one of the more well-known sites like 23andme or ancestry.com. It also wasnt the GEDmatch site that law enforcement used to track down the so-called Golden...

Last updated: Jun 7, 2018   1:30 PM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery   |      privacy, Security
Combatting the continued expansion of IoT threats

Blog  The expanding threat landscape resulting from the convergence of cyber and physical systems is providing cybercriminals with additional entry points into the corporate network. This is not going unnoticed by cybercriminals. The Fortinet Threat Landscape Report for Q4 of 2018 not only showed that hal...

Last updated: Mar 5, 2019   6:21 PM GMT  |  Blog: IoT Agenda   |      botnets, Internet of Things, iot
Can California legislation save the world from IoT security risks?

Blog  I am known for railing against IoT devices because I consider them the eventual destroyers of the internet as we know it. They are not secure, most people that use them do not realize they are not secure, and most vendors that make them have done little knowing they are not secure. Having said that...

Last updated: May 2, 2019   7:17 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT devices
F-Secure glams-up laptop security with glitter nail polish

Blog  Finnish security firm F-secure kicked off its 2016 European labs tour this week with an unusual free gift. A bottle of glitter nail polish was handed over to all, boys and girls alike. For all the security-driven software developer know-how thats out there, a bottle of nail varnish might j...

Last updated: Jun 9, 2016   9:17 AM GMT  |  Blog: CW Developer Network
The first steps of understanding mobile security

Blog  We live in a very mobile heavy society and many enterprises have mobility at the center of their IT strategy. As such, it can't help to understand mobile security better and equipping your organization with the security tool kit to defend yourself from harm. Before setting guards in place, it's imp...

Last updated: Jun 9, 2016   3:11 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
"Night Dragon" Attacks Oil Industry

Blog  A report published by McAfee illustrates in detail an extensive pattern of precision attacks targeted specifically against the oil industry. The revelation from McAfee is yet another example of the rising trend of malware as a tool for corporate espionage, and the threat of state-sponsored cyber att...

Last updated: Feb 11, 2011   2:06 PM GMT  |  Blog: The Security Detail
Chuckling Safely from Within the "Walled Garden"

Blog  Apple runs a tight ship. It is very particular about its hardware, and the user experience. It has stringent controls, and sometimes seemingly capricious or arbitrary guidelines restricting the types of apps that are allowed in the Apple App Store. Some might say it is controlling, or that Apple po...

Last updated: Mar 7, 2011   10:59 PM GMT  |  Blog: The Security Detail
IoT in healthcare: Four attack scenarios and what to do

Blog  As medical devices become increasingly connected to the internet and, therefore, the Internet of Things (IoT), Forrester Research, said in a report that there are four types of attacks healthcare organizations need to aware of, especially after coming off the worst year for data breaches in healthca...

Last updated: Aug 31, 2016   5:40 PM GMT  |  Blog: Health IT Pulse   |      Internet of Things, medical device security
OCR HIPAA guidance

Blog  As Boston lawyer and HIPAA healthcare expert David Harlow points out in his eminently useful blog post on the Office for Civil Rights' recent guidance on cloud computing, there's really not that much new in the guidance, but the bits that are bear examining. Harlow parsed OCR's dense legalese and c...

Last updated: Oct 12, 2016   6:45 PM GMT  |  Blog: Health IT Pulse   |      Cloud Computing, HIPAA, OCR
Health data breaches down in October

Blog  The number of health data breaches decreased for the second month in a row following a summer that saw a record number of breaches, according to the Protenus Breach Barometer. There were 35 reported data breaches, compared to 37 reported incidents in September. The decrease followed 42 data breache...

Last updated: Nov 18, 2016   10:14 PM GMT  |  Blog: Health IT Pulse   |      Data breach, health care data breach, Stolen data
Amid holiday cheer, OCR issues warnings in form of resolution agreements

Blog  The U.S. Department of Health and Human Services HIPAA-enforcing arm, OCR (Office for Civil Rights), has bestowed a few early Christmas presents on healthcare providers and their business associates. The festive cheer all came this November and December in the form of three costly resolution agr...

Last updated: Dec 23, 2015   7:52 PM GMT  |  Blog: Health IT Pulse   |      HIPAA, HIPAA security rule, OCR
Velocity of Risk

Blog   Wow. I was reading an article in InformationWeek magazine: The Top 10 Security Challenges for 2010. I guess Im slowing down: The article is from January 2nd. Ahem, however - Theres a great, great, line in the article I wish Id written it, but Im happy to source it: ...

Last updated: Oct 29, 2010   6:16 PM GMT  |  Blog: The Business-Technology Weave
Windows 8.1 RTMs to OEMs on August 23

Blog  OK, so now we not only know that the official release date for Windows 8.1 will be October 17/18, 2013 (4 AM on 10/18 in New Zealand, 10 AM 10/17 in Redmond), but now we also know that last Friday Microsoft sent off the bits for the release to manufacturing (RTM) as well. Numerous sources, including...

Last updated: Aug 26, 2013   3:40 PM GMT  |  Blog: Windows Enterprise Desktop
Final FDA rule sets up UDI system for medical devices

Blog  The U.S. Food and Drug Administration (FDA) released its long-awaited final rule for unique device identification (UDI) system for medical devices, which will make recalls more straightforward and better organize adverse event reporting all in an effort to improve patient safety. The rule cente...

Last updated: Sep 24, 2013   5:59 PM GMT  |  Blog: Health IT Pulse   |      medical device security, medical devices, mHealth applications
HIMSS reports spike in health IT security worries

Blog  Until recently cyber-security was one of many issues for health IT executives; now it is top of mind for most. Anecdotally, it is abundantly clear how widespread increased worry about cyber-attacks on healthcare data networks is. Also, a recent SearchHealthIT survey found that security systems are ...

Last updated: Jul 1, 2015   7:02 PM GMT  |  Blog: Health IT Pulse   |      cybersecurity, HIMSS
Millions of Medical Records Stolen from Unlocked Van

Blog  All the data security in the world doesn't help if you don't lock the damn door. Medical and financial records of about 1.7 million people -- mostly patients -- fromJacobi Medical Center, North Central Bronx Hospital,Gunhill Health Center, and Tremont Health Center in New York's The Bronx wer...

Last updated: Feb 15, 2011   4:38 AM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery
PREV 1...10   20   30...46   47   48   49   50   51   52   53   54   55...   60   65   70...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: