untangled news

By Chris Johnson | Chris Johnson created a magazine on Flipboard. “untangled news on Flipboard” is available with thousands of other magazines and all the news you care about. Download Flipboard for free and search for “Chris Johnson”.

Aetna replacing security passwords with machine learning tools

The company turned to a behavior-based security system that knows users by what they use and how they use it.

Machine Learning

This cheap password-stealing malware just added to your security headaches | ZDNet

The Russian-built Ovidiy Stealer comes with slick marketing and support to encourage sales to the lowest-level hackers.<p>A new form of …

Security

US military will finally start encrypting soldiers' emails

You'd think the military's email service mail.mil would be more secure than Gmail and other free alternatives, but that's apparently not the case. A <i>Motherboard</i> investigation in 2015 revealed that while it does have systems in place to protect classified messages, it doesn't even use STARTTLS -- a …

Ron Wyden

FDA chief outlines digital health strategy for post-market medical device regulation

The agency is working on creating a third-party certification program that would allow low-risk products to be marketed without FDA premarket review.

Digital Health

Today's lax medical device security can be fixed. Here's how.

Infosec pros share tips on working with device manufacturers as well as questions that hospitals need to be answering now.

Cybersecurity

What hospital execs should be asking medical device vendors about cybersecurity

Security audits can also help to determine the value of legacy systems and calculate the risk of keeping them against the cost of replacement.

Cybersecurity

Phishing-as-a-service: White hats help but beware the dark web

Hospitals can hire white hat hackers to conduct anti-phishing campaigns but the dark web boasts eerily similar offerings to cybercriminals, too. …

Security

22,000 patients affected by ransomware attack on Cleveland Medical Associates

While the compromised computer was both locked and encrypted, the forensic investigation team couldn’t determine with certainty if there was …

Security

More cyberattacks are imminent, but hospitals are fighting with their hands tied

Ransomware, WannaCry, Petya, NotPetya. What’s next in cybercrime?<p>Whatever may come, it appears that hackers are just getting started. And the real …

In the era of Petya, WannaCry, the good news is users are getting better about passwords

A new survey points to improved password practices, and a cybersecurity expert has password advice for healthcare CIOs and CISOs.

Security

Artificial intelligence is giving healthcare cybersecurity programs a boost

Though not a silver bullet, AI and machine learning can augment security systems to better identify malicious activity and prevent cybercrime, …

Machine Learning

Half of Ransomware Victims Suffer Repeat Attacks

Half of ransomware victims are likely to get hit again as threat actors change their strategies to target servers and accelerate the spread of …

Cybersecurity

Defining Security: The Difference Between Safety & Privacy

Words matter, especially if you are making a case for new security measures, state-of-the-art technology or personnel.

Security

500,000 affected in ransomware attack on home medical equipment supplier

Airway Oxygen discovered the breach in April when a hacker gained access to the network.

Security

Microsoft is building a smart antivirus using 400 million PCs

An upcoming security update will incorporate machine learning from millions of computers fending off malware, the company says.<p>Microsoft is turning to artificial intelligence to create the next generation of antivirus software.<p>The company is under massive pressure to deliver a cybersecurity …

Microsoft

10 Cybercrime Myths that Could Cost You Millions

Don't let a cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organization from attack.

Cybersecurity

Analysts think Petya ‘ransomware’ was built for targeted destruction, not profit

The description of the Petya infections hitting computers worldwide as “ransomware” may be a misnomer, security analysts suggest. The malicious software’s code and other evidence indicate that the profit motive may have been a camouflage for an act of cyber-espionage targeting Ukraine.<p>Ransomware …

Security

SMS: The digital health tool of the century

Leading hospitals deploying secure messaging are finding that once the technology is in use, it opens up new doors to more innovation.

Digital Health

Google strikes several hospital partnerships for machine learning research

Google announced expanded partnerships with three blue-chip academic medical centers this past week, where bioinformaticians will explore how its …

FBI Highlights BEC, Tech Support Scams, Ransomware Concerns

The 2016 Internet Crime Report found tech support fraud, business email compromise, and ransomware were major fraud categories last year.

Cybersecurity

WannaCry Blame Game: Why Delayed Patching is Not the Problem

While post mortems about patching, updating, and backups have some value, the best preventative security controls are increased understanding and …

Cybersecurity

Global ransomware attack hits Merck, health system after thrashing Europe (UPDATED)

The virulent Petya strain spread by infected email attachments that can reboot and shutdown computers, is wreaking havoc across the globe. The …

Health Care Technology

What it will take for cybersecurity to become common sense

Changing your password needs to become like washing your hands after using the bathroom -- a habit. We’re a long way off from that.<p>Look both ways before you cross the street. Wash your hands before leaving the bathroom. Put a seat belt on when you get in the car. Don't eat the yellow snow.<p>These are …

Cybersecurity

Here's how malware gets inside your phone's apps

Malicious software on popular mobile platforms such as iOS and Android is at best a nuisance and at worst a security threat to individuals and businesses.<p>Known as malware, some perpetrators use it to infect apps and get inside your smartphone. Why do they do it? Money, mostly.<p>The recent Judy …

Malware

$71 Million Restitution Owed for Hacking, Fraud Scheme

Convicted money launderer Muhammad Sohail Qasmani is sentenced to 4 years in prison, and will share the hefty payout with other co-conspirators …

Cybersecurity

Timeline: How Apple is piecing together its secret healthcare plan

From the launch of its HealthKit API in September 2014 to revelations this month of EHR-like work with a tiny startup, it’s clear that healthcare is …

Digital Health

It's not just WannaCry: Locky is targeting hospitals on outdated Windows platforms

It appears the hackers rushed the latest round of the notorious ransomware, since the campaign is currently only able to lock down XP, VistA and …

Health Care Technology

Data Breach Costs Drop Globally But Increase in US

The average total cost of a data breach declined 10% year-over-year around the world, but in the US edged upward by 5%.<p>The average cost per data …

Google to remove medical records data from search results to combat leaks

Private medical data will be removed, giving cybercriminals less ability to extort hospitals, patients.

Identity Theft