The tech, law enforcement, and privacy worlds are abuzz with the recent decision by Apple to refuse to help the FBI crack the security on an iPhone, even though the iPhone in question belonged to an alleged terrorist/mass murderer. As fascinating and important as that story is, I was even more interested in another cybersecurity story, about a hospital paying ransom to hackers in order to regain access to its own computer systems. This was not the first such occurrence, and it won't be the last.
malware
See the following -
Ransomware Costs N.Y. Hospital Nearly $10M
A hospital that lost control of its computers last spring when hackers unleashed ransomware on its systems has paid nearly $10 million recovering in the past few months. The hackers had demanded nearly $30,000 worth of bitcoin as ransom, but officials with Erie County Medical Center in Buffalo, New York, declined, knowing there would be no guarantee that the attackers would fully remove their malicious software once paid off, The Buffalo News reported Wednesday.
- Login to post comments
Report Highlights Positive Elements of U.S. Government Open Source Adoption
I think we've all read our fair share of reports about lessons learned and the challenges and opportunities for governments taking up open source software. Frankly, many of them seem a bit dry, and often repetitive. But one study I recently came across (that has not received much media coverage) stood out. Its predicate was different that most, recognizing the positive: open source software (OSS) "is being used in [the U.S.] government, as well as being released by the government (as both minor improvements and whole new projects), and the government is receiving benefits from doing so. However, many in government are unaware of this." In short, it appears to find the glass half filled—or better—rather than half empty...
- Login to post comments
Secret Service Explores A Unified System To Manage Smartphones, Tablets
The Secret Service is considering adopting a mobile device management system and apps store to better handle employee smartphones and tablets running a variety of operating systems, including BlackBerry, Android, iOS and Windows 8, according to a request for information agency officials posted Thursday. Read More »
- Login to post comments
So Many Android Devices. Too Few Updates.
Only 25 percent of Android handsets have Jelly Bean installed, according to developer.android.com. But nearly ten months after its initial release, shouldn't that adoption figure for Google's latest and most secure Android OS be much higher, especially given all the malware now targeting Androids? Like most things it's complicated. Read More »
- Login to post comments
So...Is Paying Ransom What Bitcoin Is For?
Stallman: How Much Surveillance Can Democracy Withstand?
The current level of general surveillance in society is incompatible with human rights. To recover our freedom and restore democracy, we must reduce surveillance to the point where it is possible for whistleblowers of all kinds to talk with journalists without being spotted. To do this reliably, we must reduce the surveillance capacity of the systems we use. Read More »
- Login to post comments
Storming the Government Castle
Open source software seems like a perfect fit for government IT projects. Developers can take advantage of existing code bases and, it's hoped, mold that code to their needs quickly and at less cost than developing code from scratch. Over the last few years, governments in the U.S. and abroad have been more closely embracing open source. However, agencies at all levels of U.S. government are still wary of open source and can be reluctant to adopt it. It's still not easy for government projects to use open source or for developers employed in the public sector to contribute their work to open source project...
- Login to post comments
Target Breach: Are Pharmacy Records Safe?
Target has not indicated that pharmacy records were exposed, although some say the recent data breach amplifies concerns about “medical identity theft” at retail chains with pharmacies. Read More »
- Login to post comments
Technology Breakdowns A Core Strategic Concern For Hospitals
Not just a hurricane or tornado can shut down the IT infrastructure; man-made attacks threaten as well
- Login to post comments
The Goldilocks Problem of Mobile Security - Usability vs. Security
The “Goldilocks and the Three Bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for government and organizations. The theme is trade-offs between the usability of a mobile device and security for confidential organizational data such as conversations, messages, documents, images, and locations. The security, confidentiality, and integrity of communication are key. However, if the usability of mobile devices for end-users, administrators, and organizations is too challenging, then the availability of the data for productive work is lost.
- Login to post comments
The New Bioterrorism? The Hacked Medical Device
A time-and-technology challenged FDA, proliferation of software-controlled medical devices in and outside of hospitals, and growth of hackers have resulted in medical technology that’s riddled with malware. Furthermore, lack of security built into the devices makes them ripe for hacking and malfeasance. Read More »
- Login to post comments
The NSA Can Get You Offline, Too -- With Radio Waves
Remember how we thought/hoped that keeping our computer offline would protect us from NSA snooping? Well, it won't! According to the New York Times' latest report from the Snowden files, the NSA has developed technology (under the Quantum code name, also used for those malware attacks) that can access computers through radio waves. Read More »
- Login to post comments
The Spooky Side of Healthcare Cybercrime and Steps to Protect Your Data
Although we all applaud the massive push towards electronic health records (EHRs) and the digitization of medical information, there are some very tangible cybercrime data breach threats that exist which could topple the momentum gained by the launch of the Health Information Technology for Economic and Clinical Health Act (HITECH) two and half years ago. Two recently released reports (Verizon’s Data Breach Investigations Report and FireEye’s Advanced Threat Report) suggest that the proportion of healthcare data breaches is rising fast, the largest majority targeting patient personal and payment information (including patient health and insurance data) that attackers can directly or indirectly use to make a profit...
- Login to post comments
Threat Matrix: Malware And Hacking Pose Dangers To Medical Devices
'We’re starting to attach medical devices to electronic health records, and they’re not secure.' Read More »
- Login to post comments
Three US Hospitals Hit by Ransomware
The IT systems of three US hospitals have been infected with ransomware, which encrypts vital files and demands money to unlock them. The systems, at Kentucky Methodist Hospital, Chino Valley Medical Center and Desert Valley Hospital, California, are now running normally again. None of the hospitals is believed to have paid the ransom. And the cases are now being investigated by the FBI...
- Login to post comments