Skip to main content

Privacy & Security

Security
By Tom Sullivan | 10:19 am | August 10, 2017
The sector is now making security a top priority, hiring CISOs, undertaking threat management and penetration testing, all more than ever.
Security
By Jessica Davis | 05:00 pm | August 09, 2017
The vulnerability in Windows Search service could let a hacker take complete control over a server or workstation and leverage worm-like spreading capabilities like those found with WannaCry.
Security
By Jessica Davis | 03:29 pm | August 09, 2017
Researcher claims the top security firm is exposing thousands of files from major companies, which are being leaked via its API key from its next-generation anti-malware endpoint detection and response tool.
Security
By Bill Siwicki | 03:01 pm | August 09, 2017
Thomas Zenty suggests those once-futuristic technologies are now closer than many realize. And it’s only a matter of time before Amazon Alexa and Apple Siri come to a hospital near you.
Regulation
By Bill Siwicki | 01:22 pm | August 09, 2017
Inviting hackers to attack your network and then paying them for discovering weaknesses seems dangerous. But the U.S. Department of Defense is succeeding with the practice and some infosec firms are specializing in it.
Security
By Jessica Davis | 02:49 pm | August 08, 2017
Researchers have blocked mass email campaigns from hackers that mask malicious links as legitimate communications and trick users into paying for unnecessary support services.
Security
By Mike Miliard | 02:19 pm | August 08, 2017
A new alliance of IT and security professionals wants to promote best practices and spread awareness of a standard definition.
Security
By Bill Siwicki | 02:07 pm | August 08, 2017
Next wave of attacks will likely target Internet of Things and medical devices, which remain tempting targets for their lack of sufficient protections, experts say.
Data Management
By Jessica Davis | 03:15 pm | August 07, 2017
ICS-CERT researchers found four vulnerabilities in Siemens’ molecular imaging products that can be publicly exploited and allow a hacker to remotely access and compromise the devices.
Security
By Bill Siwicki | 02:50 pm | August 07, 2017
The healthcare pros needed to battle today’s criminal arch-villains possess speed, smarts and a desire to be perfect.