HHS Releases Best Practice Healthcare Cybersecurity Guidelines
With cyber attacks on the rise healthcare organizations must find a secure way to operate with their patients data. How do you store and share your patients' sensitive information? With…
With cyber attacks on the rise healthcare organizations must find a secure way to operate with their patients data. How do you store and share your patients' sensitive information? With…
An unknown person leaked German politicians’ credit card details, private communications, and other data last month — along with data from rappers and other media figures. Do not let hackers…
According to cybersecurity researchers from F-Secure, unpatched machines in Asia are being infected with the latest version of NRSMiner, malware designed to steal computing resources in order to mine for…
Brazil's National Authority for Personal Data Protection (ANPD) includes the creation of frameworks on how to handle information and guide organizations on how to adhere to the rules. It will also…
As data ownership will be a defining factor for the entire 2019, other countries will follow the EU's GDPR lead and announce new data regulations, according to the 11th annual…
Inspector General audit of two Arizona Managed Care Organizations found significant, security vulnerabilities in its information systems, which call into question the integrity of the systems used to process Medicaid…
Akamai has detected an ingenious malware campaign that alters configurations on home and small office routers to open connections toward internal networks so crooks can infect previously isolated computers. As…
Patients needing emergency care were diverted away from East Ohio Regional Hospital and Ohio Valley Medical Center due to a ransomware attack. The emergency transportation team began bringing those patients…
The European Consumer Organisation (BEUC), of which each of the groups are a member, claims that Google’s “deceptive practices” around location tracking don’t give users a real choice about whether…
Uber's systems were compromised by an attacker who was able to use credential stuffing techniques to expose information belonging to approximately 57 million riders and 7 million drivers. In today’s…