June 2018

The healthcare sector has long been seen as a lucrative target for cybercriminals. As today’s threat landscape continues to evolve, cybercriminals are leveraging new and old capabilities to exploit network vulnerabilities as efficiently as possible. In order to maintain an effective security posture in this complex cyber ecosystem, healthcare cybersecurity teams need to be aware […]

By Fred Donovan June 29, 2018 – The Medtronic MyCareLink handheld patient monitor, used for patients with an implantable heart device, suffers from a number of cybersecurity vulnerabilities that could allow an attacker to gain access to the operating system and product development code, warned a June 28 ICS-CERT advisory. These vulnerabilities — hard-coded password and exposed […]

THE KEY California State Sen. Bob Hertzberg (D) holds his smartphone as he urges lawmakers to approve a data privacy bill during the Senate floor session June 28 in Sacramento. (AP Photo/Rich Pedroncelli) The state that is the epicenter of Big Tech’s data collection has just adopted the strongest privacy protections in the country.  After a last-minute frenzy in […]

We’re now well into the second quarter of 2018, a point where organizations should be well into executing their technology and cybersecurity plans for the year. However, many are still looking for guidance on what products they should be considering, how to align their needs with their limited budgets, or even more simply, how to […]

Earlier this year, security researchers were able to demonstrate that malicious actors on the same Wi-Fi connection as someone using Tinder could be able to both see photos shared as well as deduce whether this unknowing dater swiped left, right, or matched. In a letter to Democratic Senator Ron Wyden of Oregon, who brought up […]

Special Adviser to the President on Niger Delta and Coordinator of the Presidential Amnesty Programme, Prof Charles Dokubo, on Thursday warned that Nigeria was becoming vulnerable to cyber terror owing to reliance on computer systems, wireless networks and ubiquitous internet-enabled smart devices including smart phones, televisions and various among others. The Amnesty Coordinator, who stated […]

Security teams must expand strategies to go beyond simply identifying details tied to a specific threat to include context and information about attack methodologies. Cybersecurity is sometimes viewed as being inherently reactive. But given the security issues we face today, security professionals must push beyond merely blocking an attack before a network breach. Cybersecurity teams […]

The federal government can’t legislate or mandate its way out of the risk of foreign hackers compromising its networks, the top tech official in the government’s nuclear security agency said Tuesday. Instead of banning software with a connection to China or other U.S. cyber adversaries, government tech shops should focus on installing safeguards that mitigate […]

Special Adviser to the President on Niger Delta and Coordinator of the Presidential Amnesty Programme, Prof Charles Dokubo, on Thursday warned that Nigeria was becoming vulnerable to cyber terror owing to reliance on computer systems, wireless networks and ubiquitous internet-enabled smart devices including smart phones, televisions and various among others. The Amnesty Coordinator, who stated […]