science and technology

Your Phone and Your Face: Anchoring Users to Real Identities




science and technology

Live Webinar | How to avoid the security dangers with working from home (WFH)




science and technology

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




science and technology

JavaScript Skimmers Found Hidden in 'Favicon' Icons

Malwarebytes Researchers Say Attacks Appear Related to Magecart
Cybercriminals are hiding malicious JavaScript skimmers in the "favicon" icons of several ecommerce websites in an effort to steal payment card data from customers, researchers at Malwarebytes say.




science and technology

Ransomware Slams Healthcare, Logistics, Energy Firms

Attacks Traced to Gangs Wielding Nefilim, Snake Strains
Ransomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic.




science and technology

Zoom's NY Settlement Spells Out Security Moves

Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption Company
Zoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company.




science and technology

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




science and technology

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




science and technology

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




science and technology

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




science and technology

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




science and technology

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




science and technology

Addressing Telehealth, Telework Security Amid COVID-19

With more employees working remotely and a much heavier demand for telehealth services, entities need to consider extra, accelerated steps in keeping data and systems secure, says Martin Littmann, Kelsey-Seybold Clinic CISO, and Stephen Moore, a former security leader at Anthem.




science and technology

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




science and technology

Testing Medical Device Security During COVID-19 Crisis

As manufacturers - including companies such as automakers that do not typically produce healthcare devices - race to help fill medical equipment shortages during the COVID-19 crisis, steps must be taken to ensure adequate security testing, says Fairuz Rafique of cybersecurity services firm EmberSec.




science and technology

Live Webinar | Take Control: Complete Visibility and Unmatched Security for Unmanaged and IoT Devices




science and technology

Live Webinar | Strong Customer Authentication: The role of Biometrics in PSD2




science and technology

Live Webinar | Third-Party Risk Management: How to Mature Your Program Beyond Just Outside-In Scanning




science and technology

Live Webinar | 2021: A Cybersecurity Odyssey




science and technology

FDA: Unique Device Identification System

This proposed rule from the U.S. Food and Drug Administration would require unique identifiers on medical devices. While the rule aims to ease the collection and analysis of data about adverse health events and help detect counterfeit products, no patient information would be collected in a proposed new FDA database to help track the safety of these devices.




science and technology

HITECH Act Stage 2 EHR Incentive Program Meaningful Use Final Rule

This rule establishes criteria that hospitals and physicians must meet to qualify as "meaningful users" of electronic health records and receive further financial incentives in Stage 2 of the HITECH Act Electronic Health Record Incentive Program. The program, part of the economic stimulus package, is providing billions of dollars in Medicare and Medicaid incentives to spur widespread adoption of EHRs.




science and technology

HITECH Act Stage 2 EHR Incentive Program Software Certification Final Rule

This rule establishes criteria for electronic health records software that qualifies for Stage 2 of the HITECH Act Electronic Health Record Incentive Program. The program, part of the economic stimulus package, is providing billions of dollars in Medicare and Medicaid incentives to hospitals and physicians to spur widespread adoption of EHRs.




science and technology

HIPAA Omnibus Final Rule

This package of regulations includes modifications to the HIPAA privacy, security, enforcement and breach notification rules, as required under the HITECH Act.




science and technology

Webcast: Keeping Remote Workers Safe and Your Work Secure

This webcast gives 6 tips for keeping employees safe and mitigating security threats as your workforce goes remote.
Learn how to protect employees from malicious web content.




science and technology

Zoom's NY Settlement Spells Out Security Moves

Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption Company
Zoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company.




science and technology

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




science and technology

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




science and technology

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




science and technology

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




science and technology

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




science and technology

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




science and technology

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




science and technology

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




science and technology

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




science and technology

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




science and technology

Ensuring Secure Business Continuity Amid COVID-19 Chaos




science and technology

Your Phone and Your Face: Anchoring Users to Real Identities




science and technology

Live Webinar | How to avoid the security dangers with working from home (WFH)




science and technology

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




science and technology

JavaScript Skimmers Found Hidden in 'Favicon' Icons

Malwarebytes Researchers Say Attacks Appear Related to Magecart
Cybercriminals are hiding malicious JavaScript skimmers in the "favicon" icons of several ecommerce websites in an effort to steal payment card data from customers, researchers at Malwarebytes say.




science and technology

Ransomware Slams Healthcare, Logistics, Energy Firms

Attacks Traced to Gangs Wielding Nefilim, Snake Strains
Ransomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic.




science and technology

Zoom's NY Settlement Spells Out Security Moves

Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption Company
Zoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company.




science and technology

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




science and technology

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




science and technology

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




science and technology

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




science and technology

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




science and technology

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




science and technology

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




science and technology

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.