New Cyber-attack Advice for European Hospitals

New Cyber-attack Advice for European Hospitals

The European Data Protection Board has issued new advice to hospitals regarding what action to take in the event of a cyber-attack. Currently released in draft form, the new set of recommendations urges healthcare providers hit with ransomware to report the attack even if no patient data is accessed or exfiltrated.  The guidelines state: “The internal documentation of a breach is an obligation independent of the risks pertaining to the breach and must be performed in each…

Read More

Home Security Technician Admits Spying on Customers

Home Security Technician Admits Spying on Customers

A former home security technician has admitted habitually hacking into customers’ home surveillance cameras to spy on people without their consent.  Telesforo Aviles accessed the accounts of around 200 customers more than 9,600 times over a period of four and half years while employed by security company ADT.  The 35-year-old carried out the cyber-intrusions for his own sexual gratification. He made a note of which camera feeds were linked to the homes of women he…

Read More

Court Date for Woman Accused in Theft of Pelosi’s Laptop

Court Date for Woman Accused in Theft of Pelosi’s Laptop

A woman from Pennsylvania will appear before a federal court on Monday to face charges in connection with the theft of a laptop belonging to Speaker of the United States House of Representatives Nancy Pelosi. The computer was stolen from Pelosi’s office earlier this month when a crowd of people who had been attending a political protest forced their way into the US Capitol building and disrupted the certification of then President-elect Joe Biden’s electoral victory.  Harrisburg…

Read More

Expert: Manpower is a huge cybersecurity issue in 2021

Expert: Manpower is a huge cybersecurity issue in 2021

Changing threats, volume of threats, and ransomware plague organizations. Having some autonomous AI tools to help pros do their jobs can help. TechRepublic’s Karen Roby spoke with Marcus Fowler, director of strategic threat for Darktrace and former CIA officer, about ways to help cybersecurity professionals get their jobs done more easily. The following is an edited transcript of their conversation. SEE: Identity theft protection policy (TechRepublic Premium) Karen Roby: Marcus, talk a little bit about…

Read More

Looking for cybersecurity experts? Consider hiring veterans

Looking for cybersecurity experts? Consider hiring veterans

Veteran Michael Kassner says former military personnel might know more about cybersecurity than employers think. Read about some of the skills veterans could bring to a cybersecurity job. Image: Smederevac, Getty Images/iStockphoto Something that gladdens the hearts of cybercriminals are tech-media reports that there are not enough cybersecurity pros. For instance, in a May 2020 article from TechRepublic contributing writer Esther Shein about how to find a job in cybersecurity, she stated: “While there are…

Read More

U.K.’s University of Kent establishes cybersecurity and conflict institute

U.K.’s University of Kent establishes cybersecurity and conflict institute

U.K.’s University of Kent establishes cybersecurity and conflict institute | 2021-01-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Asset Management, The Weakest Link in Cybersecurity Risk

Asset Management, The Weakest Link in Cybersecurity Risk

By Gyan Prakash, Head of Cyber Security / Security Engineering, Altimetrik Corp Summary This paper shares the details on the limitations of existing asset management solutions for Cybersecurity needs and how to enhance the capability of existing asset management solutions that would meet enterprise cybersecurity risk needs. Uncover high-risk and vulnerable assets to CISOs and senior management with data-driven automation on a near real-time basis. Highlights the gap in the current asset management solutions and…

Read More

Docker Captain Take 5 – Elton Stoneman – Docker Blog

Docker Captain Take 5 – Elton Stoneman – Docker Blog

Docker Captains are select members of the community that are both experts in their field and are passionate about sharing their Docker knowledge with others. “Docker Captains Take 5” is a regular blog series where we get a closer look at our Captains and ask them the same broad set of questions ranging from what their best Docker tip is to whether they prefer cats or dogs (personally, we like whales and turtles over here)….

Read More

What is a DoS (denial-of-service) attack? – IT Governance UK Blog

What is a DoS (denial-of-service) attack? – IT Governance UK Blog

Denial-of-service (DoS) attacks are intended to shut down or severely disrupt an organisation’s systems. Unlike most cyber attacks, the goal isn’t to steal sensitive information but to frustrate the victim by knocking their website offline. The criminal hacker therefore doesn’t profit from the attack, but the loss of service can cost the victim up to £35,000. Why would an attacker be interested in doing this? Typically, it’s because they hold a grudge against the target…

Read More
1 2,434 2,435 2,436 2,437 2,438 2,544