While hacker attacks increasingly pose threats to electronic patient data, yet another healthcare provider has reported a major breach involving the improper disposal of paper and film records. The number of individuals being notified makes this the biggest reported health data breach of its kind.
Security experts warn enterprises to patch the serious "glibc" domain name system flaw now, with one likening it to a "skeleton key" that could be used against all systems and Internet of Things devices that run Linux.
Automobiles have crash ratings. Do they need ratings for cybersecurity, too? In this interview, security expert Jacob Olcott of BitSight Technologies previews a session he'll moderate at the RSA Conference 2016 that will address this question.
The Justice Department, in a motion to compel Apple to immediately unlock the iPhone of one of the San Bernardino shooters, criticized the company for putting business needs before civic responsibility.
It's the perfect time to debate whether the government should compel Apple to help the FBI circumvent protections blocking access to the San Bernardino shooter's iPhone. Hear Apple CEO Tim Cook, FBI Director James Comey, Sen. Marco Rubio and cryptologist Bruce Schneier in this audio report.
In 2015 alone, 84 million new pieces of malware were created. How can organizations hope to keep pace with the new strains and tactics? Through advanced endpoint protection, says John Peterson of Comodo.
George Orwell's "1984" imagined an authoritarian society in which the government monitored citizens via their televisions. Viewers who want to play along at home can begin by buying a Smart TV.
If recent cyberattacks on healthcare organizations - including the ransomware attack on Hollywood Presbyterian Medical Center - tell us anything, it's that better cyber threat intelligence sharing is desperately needed. A project led by Harris Health Systems aims to help identify the gaps that need to be addressed.
Apple is preparing for a long legal battle over the FBI's attempt to backdoor the encryption on an iPhone seized as part of an investigation. Experts say the case could have profound repercussions on technology and society.
The Department of Homeland Security issues new guidelines to expedite the sharing of cyberthreat information between the government and businesses. See specific examples on how information sharing works.
President Obama tapped Tom Donilon and Samuel Palmisano to lead the Commission on Enhancing National Cybersecurity, a government-industry panel charged with providing detailed recommendations to strengthen public and private sectors IT security over the next decade.
Jeff Shaffer, a former Secret Service agent, has investigated cybercrime for more than 25 years. Now a manager at PricewaterhouseCoopers, he discusses how organizations can protect their assets better by understanding their attackers' MO.
Apple CEO Tim Cook has blasted a U.S. federal judge's Feb. 16 order compelling Apple to help bypass the encryption on an iPhone seized by the FBI, saying the crypto backdoor would set a "dangerous" precedent.
An alleged hacktivist suspected of launching a DDoS attack on a children's hospital has been arrested and charged after he and his wife were rescued at sea by a Disney cruise ship off the coast of Cuba. Will this case have a storybook ending?
The United States and Israel hacked into Iran's military and civilian infrastructure as part of a secret program code-named "Nitro Zeus" that was designed to disable the country's critical infrastructure on demand, claims the new documentary film "Zero Days."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.