The Food and Drug Administration plans to launch a new digital health "center of excellence" that includes a cybersecurity unit. The new unit would not only deal with cyber issues pertaining to new health technologies, but also challenges facing older medical devices.
If you hold, share or have access to important information, you should assume your smartphone has already been hacked.
Unprotected smartphones could pose the greatest security risks to governments, enterprises and individuals. Consider what's at stake and prevent hackers from capitalizing on your...
Smartphones present a uniquely large attack surface that has been repeatedly exploited by threat actors, making it risky to trust these devices with important data. Inherent limitations in the mobile architectures of
these devices - especially in a world of chip-based attacks - mean that organizations must find new...
Smartphone cameras and microphones act as the eyes and ears of the digital age, capable of capturing the smallest audio and visual details in high-definition clarity. Unfortunately, threat actors have demonstrated the ability to hijack these smartphone components, using them to gain valuable insights about targeted...
In Australia, it can take as few as 15 minutes to steal someone's phone number, a type of attack known as SIM hijacking. Such attacks are rising, but mobile operators have no plans to change the authentication required around number porting, which can be set in motion online with minimal personal information.
Email security in the era of the cloud is a critical concern for business leaders. This tool is a powerful way for businesses and services to communicate with their customers. From transaction notifications to billing statements to social media updates, email is a proven reliable and effective way for businesses to...
Digital transformation has made it increasingly easy for consumers to switch institutions at the least provocation.
But leaders like Capital One, Guardian Life, and Goldman Sachs are embracing change and moving to the cloud. They're creating great customer experiences - and fighting churn - by integrating email into...
The new Apple Watch 4, which includes a sensor that can conduct an electrocardiogram, spotlights the emergence of consumer apps that appear to cross over into the territory of medical devices, raising potential cybersecurity concerns.
The Food and Drug Administration should increase its scrutiny of the cybersecurity of networked medical devices before they're approved to be marketed, a new government watchdog agency report says. FDA says it will carry out the report's recommendations.
While healthcare entities and their vendors apparently are improving their encryption practices for computing and storage devices, regulators are also urging organizations to avoid overlooking the importance of physically securing and tracking these devices to help safeguard PHI.
Air Canada is forcing 1.7 million mobile app account users to reset their passwords after it detected unusual login behavior that it says may have exposed 20,000 accounts, including passport information. But the company is enforcing password complexity rules that experts advise against.
It's déjà vu "FBI vs. Apple" all over again, as Reuters reports that the Justice Department is seeking to compel Facebook to build a backdoor into its Messenger app to help the FBI monitor an MS-13 suspect's voice communications.
Leading the latest edition of the ISMG Security Report: Chris Morales of the cybersecurity firm Vectra discusses how the industrial internet of things is changing the nature of industrial espionage and disruption.
The Department of Homeland Security and Philips have issued alerts about cyber vulnerabilities that have been identified in some of the company's medical devices. Are device makers becoming more forthcoming about cyber issues?