Privacy & Security
Deploy detection tool, use threat intelligence services and train your employees now to stay ahead, Beazley report says.
The hacker group APT 28 - responsible for leaking data on Olympic athletes in 2016 - stole confidential medical data of athletes that appear to have been removed from IAAF’s server.
Washington University School of Medicine employee responded to a phishing attempt masked as a legitimate request in December, but medical school officials didn’t learn of the incident for seven weeks.
SPONSORED
The new mantra for healthcare in the Information Age could easily parallel security in today’s evolving cybercrime era – it’s about people.
The agency currently uses a dozen approved cloud service providers.
Penn Medicine security exec: Advanced threat protection vendors and hospitals must join forces to f…
To fend off increasingly sophisticated ransomware, phishing and other malicious attacks, infosec professionals and software vendors can tap into ATD tools to more effectively share threat information.
Email archives, business documents, intellectual property and source code are in hackers’ crosshairs.
The self-extracting variant, which links to a Dropbox account run by hackers, will shut down when certain programs are found on the system.
When servers are configured to allow anonymous access, hackers can infiltrate an organization and launch a cyberattack.
Urology Austin, a healthcare provider with locations throughout central Texas, began notifying its patients March 24 that hackers may have accessed patient records that included names, dates of birth, addresses, medical information and Social Security numbers.