malicious software
See the following -
Cybersecurity—A Serious Patient Care Concern
The world of paper medical records has almost disappeared, ushering in a new era of electronically stored, analyzed, and shared medical information that offers exciting opportunities for improved patient care. However, this major shift in information management has introduced unintended and unfavorable consequences, such as theft of patient-protected health information, wide-scale sequestering of medical records by ransomware (malicious software—malware—that permanently blocks the access to records unless a ransom is paid), and the ability for hackers to directly harm patients...
- Login to post comments
Print No Evil: Three-Layer Technique Helps Secure Additive Manufacturing
Additive manufacturing, also known as 3-D printing, is replacing conventional fabrication processes in critical areas ranging from aerospace components to medical implants. But because the process relies on software to control the 3-D printer, additive manufacturing could become a target for malicious attacks – as well as for unscrupulous operators who may cut corners. Researchers from the Georgia Institute of Technology and Rutgers University have developed a three-layer system to verify that components produced using additive manufacturing have not been compromised...
- Login to post comments
The Belarusian Connection
U.S. intelligence agencies last week urged the Obama administration to check its new healthcare network for malicious software after learning that developers linked to the Belarus government helped produce the website, raising fresh concerns that private data posted by millions of Americans will be compromised. Read More »
- Login to post comments
Why Feds Are Still Buying IT That Works With Windows XP
During the past year, various agencies have bought or expressed interest in buying products compliant with a Microsoft operating system set to lose security support next week, according to a review of federal solicitations and the agencies themselves. The Air Force, Navy and Marine Corps, as well as the Veterans Affairs, Labor and State departments are a few of the Windows XP holdouts.
- Login to post comments
Will “Digital Fingerprint” Forensics Thwart the Data Thieves Lurking in Hospital EHR Corridors?
As Halloween approaches, the usual spate of horror movies will intrigue audiences across the US, replete with slashers named Jason or Freddie running amuck in the corridors of all too easily accessible hospitals. They grab a hospital gown and the zombies fit right in. While this is just a movie you can turn off, the real horror of patient data theft can follow you...Unfortunately, this horror movie scenario is similar to how data thefts often occur at medical facilities. In 2015, the healthcare industry was one of the top three hardest hit industries with serious data breaches and major attacks, along with government and manufacturers. Packed with a wealth of exploitable information such as credit card data, email addresses, Social Security numbers, employment information and medical history records, much of which will remain valid for years, if not decades and fetch a high price on the black market.
- Login to post comments
Zero-Day Paranoia And The Reality Of Modern Web Browsing
Remote code execution is an end-user nightmare that can be stopped tomorrow, if we enact the appropriate technologies to prevent it. Read More »
- Login to post comments