The FDA has issued draft guidance urging medical device makers to develop cybersecurity controls. It has also released tips for how healthcare organizations can mitigate cybersecurity risks to devices.
Attacks aimed at mobile devices are progressing much more rapidly than any attacks ever waged against PCs. Organizations are in danger if they don't pay attention, says anti-phishing expert Dave Jevans.
A recent spear-phishing attack involving a Trojan designed to target Android devices offers an important reminder of the emerging threat of mobile malware, says Kaspersky Lab researcher Kurt Baumgartner.
Today's spear-phishing campaigns are localized, small and can slip through typical spam filters. As a result, detection practices have to evolve, says researcher Gary Warner of the University of Alabama at Birmingham.
You've found a virus running on your server. You discover login IDs on your network that don't belong. A hacker has your credit card database. Any one of these is enough for you to hit your panic button and lose it. Don't.
In this eBook, learn:
Tips on how to handle various emergency scenarios;
Hackers were using a Facebook page as a how-to site for financial crime and to sell banking Trojans. One RSA security expert says this public promotion signifies the mainstreaming of "fraud-as-a-service."
New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
This white paper discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and...
Kaspersky Lab has identified a new spear-phishing attack involving a Trojan designed to target Android devices. Researcher Kurt Baumgartner says organizations need to be prepared for more mobile malware attacks.
E-mail authentication foils phishing, but authentication is only effective if every partner in the chain adopts it. John Carlson and Andrew Kennedy of BITS explain how institutions can improve e-mail practices.
The motive behind the cyber-attack on South Korean banks and broadcasters was atypical, as compared to most digital assaults that involve implanting malware on IT systems, says McAfee's Vincent Weafer.
A software vulnerability brought down the website that gives the public access to the National Vulnerability Database, which is run by the National Institute of Standards and Technology, the U.S. federal agency that produces information security guidance.