- Welcome Guest
- Sign In
Despite its computer systems being infected with malware since Monday, MedStar Health, which operates 10 hospitals and more than 250 outpatient facilities in and around Washington, D.C., has continued to provide patient care at near normal levels, according to several updates released this week. Sin...
Downtime caused by a ransomware attack can cost a company more than paying a ransom to recover data encrypted by the malware, according to a report released last week by Intermedia. Nearly three-quarters (72 percent) of companies infected with ransomware could not access their data for at least two ...
Security researchers at Palo Alto Networks Unit 42 on Wednesday announced they had discovered in the wild a method of infecting nonjailbroken iPhones with malware by exploiting design flaws in Apple's digital rights management technology. The flaw has been exploited since 2013 largely as a means to ...
Researchers last week discovered the first ransomware in the wild aimed at Apple's hardware platform. While the threat was subdued quickly, it exposed the weakness of digital certificates in authenticating software to devices. The ransomware appeared as a legitimate application because it contained ...
In the world of computer security, fingerprints are found in more places than where the tips of hands touch. That's because the term is applied to any data set that can be used to make a unique identification. For example, antifraud programs used by online retailers can identify customers by the str...
Hollywood Presbyterian Medical Center on Wednesday announced that it paid approximately $17,000 to resume normal operations after digital extortionists knocked its computer systems offline. The Los Angeles hospital discovered its computer network infected with ransomware earlier this month. Ransomwa...
The Internet Archive on Friday cut the ribbon on its online Malware Museum, an online compendium of malware programs computer users in the 1980s and 1990s sometimes encountered. Everything old is new again, so the saying goes, and apparently that retro fascination applies to computer viruses. The mu...
Ukrainian officials earlier this week said they had launched a probe into the source of a cyberattack that targeted a Kiev Airport. The attack may be related to the BlackEnergy malware attacks that recently targeted Ukrainian infrastructure facilities, apparently from Russia. CERT-UA on Monday warne...
There's been a lot of wailing and gnashing of teeth about the Sisyphean task of protecting privacy in the Digital Age, but that hasn't stopped innovators from searching for ways to preserve it. One of the latest ideas to emerge in the field is Privacy as a Service. As with many emerging technologies...
Just days before Christmas, a rare event occurred: the report of a successful intrusion into America's infrastructure by overseas hackers. Although the event -- penetration of the control system of a dam 20 miles from New York City -- was more than two years old, it just made it into the public ligh...
Insider threats are becoming increasingly worrisome to corporate security executives. That is one of the findings in a survey of C-level businesspeople Nuix released last week. "The insider threat seems to be a bigger concern this year than it was in previous years," said Nuix's Keith Lowry. "People...
The idea of a "Cyber Geneva Convention" has gained steam in the last five years. Based on the original Geneva Convention, which dates back to 1864, it would ensure that certain types of attacks, as well as specific targets, would remain off-limits in a cyberwar. The concept of rules dictating what s...
As 2016 approaches, it's time to get the crystal ball out and predict next year's cybersecurity trends. Here are some predictions from security pros TechNewsWorld interviewed. Fantasy sports sites like DraftKings and FanDuel in 2015 caught the attention of states' attorneys general, who wanted to tr...
FBI Director James Comey on Wednesday told members of a U.S. Senate committee that high-tech companies may need to adopt a new business model regarding encryption in order to get on the same page with law enforcement. "Encryption is getting in the way of our ability to have court orders effective to...