CaptureRx Data Breach Impacts Healthcare Providers

CaptureRx Data Breach Impacts Healthcare Providers

At least three American healthcare providers have suffered a data breach after a cyber-attack on an administrative services company in Texas. CaptureRx, which is based in San Antonio, fell victim to a ransomware attack on February 6. On February 19, an investigation into the attack determined that certain files had been accessed without authorization. During the attack, cyber-criminals exfiltrated files containing the personal health information (PHI) of more than 24,000 individuals. CaptureRx serves the Mohawk Valley Health…

Read More

How to integrate Linux Malware Detection and ClamAV for automated malware detection on Linux servers

How to integrate Linux Malware Detection and ClamAV for automated malware detection on Linux servers

Jack Wallen walks you through the steps of installing both Linux Malware Detection and ClamAV for a reliable one-two punch of malware and virus prevention. Image: Getty Images/iStockphoto Say that you’ve deployed Linux as your data center servers because of the reliability and security the open source platform offers. Don’t be fooled into thinking using Linux will be the be-all, end-all of your security needs. It’s always important to remember that, so long as it’s…

Read More

Android phones may be vulnerable to security flaw in Qualcomm chip

Android phones may be vulnerable to security flaw in Qualcomm chip

Patched on Qualcomm’s end, the flaw could allow attackers to access your call history and text messages and eavesdrop on your phone conversations, says Check Point Research. Android phone users may be susceptible to a security vulnerability that could compromise their devices. In a research report published Thursday, cyber threat intelligence provider Check Point Research revealed certain details on a flaw it identified in 2020 in Qualcomm mobile station modem (MSM) chips, including ones used…

Read More

DOD Expands Hacker Program

DOD Expands Hacker Program

The United States Department of Defense (DOD) has expanded its ethical hacking program to include more targets. DoD officials announced yesterday that the Department’s Vulnerability Disclosure Program will be broadened to include all publicly accessible DOD information systems. Bug hunters were first invited to engage with the DOD in 2016 when the initiative ‘Hack the Pentagon’ was launched. Through this initiative, the Defense Digital Service set up a bug bounty program to reward ethical hackers for identifying flaws…

Read More

Beware of Social Media Scams

Beware of Social Media Scams

Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for misinformation to run rampant, and it is a virtual treasure chest for cybercriminals to steal personal information. Over 25 million Canadians own a social media account, and more than 80% of the Canadian population is expected to be on social media by 2025. Check out this roundup of common social media scams so you can…

Read More

Beware of Social Media Scams | McAfee Blogs

Beware of Social Media Scams

Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for misinformation to run rampant, and it is a virtual treasure chest for cybercriminals to steal personal information. Over 25 million Canadians own a social media account, and more than 80% of the Canadian population is expected to be on social media by 2025. Check out this roundup of common social media scams so you can…

Read More

Accelerating Digital Agility with Cisco Plus – Cisco Blogs

Accelerating Digital Agility with Cisco Plus – Cisco Blogs

Cisco Live is always an exciting time where technologists and innovators from around the world can come together to hear about the latest innovations. It’s a time to enhance technical skills and learn from the best in the industry, as well as have a little fun in the process. It’s been several weeks since our event, and I feel strongly that Cisco Live 2021 really accelerated a mindset of innovation and excitement. There were several…

Read More

64Gig Fibre Channel Done Right – Cisco Blogs

64Gig Fibre Channel Done Right – Cisco Blogs

Data Center Storage Area Networks (SAN) need to evolve to keep up with increasing application workload availability and performance requirements. NVMe (Non-Volatile Memory Express) is a key technology that will help accelerate existing applications as well as enable new applications optimized for performance and latency in data centers and at the cloud edge. For the SAN to keep pace with the latest application needs, Cisco’s new 64-Gbps line rate, 48-port MDS switch module provides the…

Read More

Patch Priority Index for April 2021 | The State of Security

Patch Priority Index for April 2021 | The State of Security

Tripwire’s April 2021 Patch Priority Index (PPI) brings together important vulnerabilities from Google Chrome and Microsoft. First on the patch priority list this month are patches for insufficient input validation vulnerabilities in Google Chrome (Chromium). Exploits for these vulnerabilities have been recently added to the Metasploit Exploit Framework. These systems should be patched as soon as possible. Next on the patch priority list this month are patches for Microsoft Excel, Office, Word, and Outlook. These…

Read More

NSA: Connecting OT to the net can lead to “indefensible levels of risk”

NSA: Connecting OT to the net can lead to “indefensible levels of risk”

The US Defense Department and third-party military contractors are being advised to strengthen the security of their operational technology (OT) in the wake of security breaches, such as the SolarWinds supply chain attack. The guidance comes from the NSA, which this week has issued a cybersecurity advisory entitled “Stop Malicious Cyber Activity Against Connected Operational Technology” In its advisory, the NSA describes how organisations should evaluate the risks against OT – such as Industrial Control…

Read More
1 3,827 3,828 3,829 3,830 3,831 4,265