Security experts participating in an FDA workshop highlight the urgent need to immediately improve the cybersecurity of networked medical devices, which may be vulnerable to hacking that could potentially be life-threatening.
Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid WÃ¼eest warns in a Black Hat Europe briefing.
Amsterdam is again playing host to the annual Black Hat Europe information security gathering, and presenters have promised to cover everything from privacy flaws in wearable computers to two-factor authentication system failures.
The Food and Drug Administration's Suzanne Schwartz, M.D., is on a mission to debunk the myth that medical device manufacturers need FDA approval for software updates or patches to address potential vulnerabilities.
As the IT security workforce reaches a record high in the United States, what does that workforce look like? It remains overwhelmingly white and male. Here's an explanation of the latest employment statistics.
Top government leaders express high confidence in the security of state IT systems, which could explain why chief information security officers don't feel they're getting enough money to build stronger IT security.
The Food and Drug Administration has issued final guidance calling for manufacturers to consider cybersecurity risks as part of the design and development of medical devices. Find out what the agency recommends.
When the new Apple Pay mobile payment system launches in October in the United States, it could help improve payment security. This infographic reviews the system's features and how to put them to use.
The FDA is ramping up efforts to strengthen the security of medical devices. That includes a collaborative effort to develop a risk assessment framework to identify cybersecurity vulnerabilities and mitigate the risks.
The social media savvy Islamic State frightens most of the world with its gruesome Internet postings of executions and online recruitment of new Jihadists. But is the terrorist group likely to launch cyber-attacks?
What's as disturbing as news of the Chinese hacking U.S. defense contractors' systems is that the contractors failed to notify the military of most of those intrusions because of how they interpreted cyber-intrusion reporting requirements.