untangled news

By Chris Johnson | Chris Johnson created a magazine on Flipboard. “untangled news on Flipboard” is available with thousands of other magazines and all the news you care about. Download Flipboard for free and search for “Chris Johnson”.

Google strikes several hospital partnerships for machine learning research

Google announced expanded partnerships with three blue-chip academic medical centers this past week, where bioinformaticians will explore how its …

Machine Learning

FBI Highlights BEC, Tech Support Scams, Ransomware Concerns

The 2016 Internet Crime Report found tech support fraud, business email compromise, and ransomware were major fraud categories last year.<p>Nearly $8 …


WannaCry Blame Game: Why Delayed Patching Is not the Problem

While post mortems about patching, updating, and backups have some value, the best preventative security controls are increased understanding and …


Global ransomware attack hits Merck, health system after thrashing Europe (UPDATED)

The virulent Petya strain spread by infected email attachments that can reboot and shutdown computers, is wreaking havoc across the globe. The …

Health Care Technology

What it will take for cybersecurity to become common sense

Changing your password needs to become like washing your hands after the bathroom -- a habit. We’re a long way off from that.<p>Look both ways before you cross the street. Wash your hands before leaving the bathroom. Put a seatbelt on when you get in the car. Don't eat the yellow snow.<p>These are all …


Here's how malware gets inside your phone's apps

Malicious software on popular mobile platforms such as iOS and Android is at best a nuisance and at worst a security threat to individuals and businesses.<p>Known as malware, some perpetrators use it to infect apps and get inside your smartphone. Why do they do it? Money, mostly.<p>The recent Judy …


$12B in Fraud Loss Came from Data Breach Victims in 2016

Three-quarters of the total fraud losses for 2016 arose from victims who had been victims of a data breach within the previous six years.


Timeline: How Apple is piecing together its secret healthcare plan

From the launch of its HealthKit API in September 2014 to revelations this month of EHR-like work with a tiny startup, it’s clear that healthcare is …

Digital Health

It's not just WannaCry: Locky is targeting hospitals on outdated Windows platforms

It appears the hackers rushed the latest round of the notorious ransomware, since the campaign is currently only able to lock down XP, VistA and …

Health Care Technology

Data Breach Costs Drop Globally But Increase in US

The average total cost of a data breach declined 10% year-over-year around the world, but in the US edged upward by 5%.<p>The average cost per data …


Google to remove medical records data from search results to combat leaks

Private medical data will be removed, giving cybercriminals less ability to extort hospitals, patients.


Anthem agrees to pay record $115M to settle data breach suit

The settlement, subject to a judge's approval, would be the largest to date for a data breach case, according to lawyers for the plaintiffs.<p>Anthem, the largest health insurance company in the US, has agreed to settle a class action lawsuit over a 2015 data breach for a record $115 million.<p>The …

Identity Theft

Experts: There’s no gray area with ransomware breach reporting

OCR’s updated rules make it pretty clear: The burden of proof is on the healthcare provider.


Relentless Attackers Try Over 100,000 Times Before They Breach a System

New report from startup tCell shows XSS attempts a noisy reminder of the overwhelming scale of automated attack techniques.


Consumer Businesses Have False Confidence in their Security: Deloitte

6/21/2017<br>11:39 AM<p>50%<p>50%<p>Consumer business executives are confident in their ability to respond to cyberattacks but fail to document and test response …

Information Security

ONC updates database of certified EHRs

The Office of the National Coordinator for Health IT makes it easier to access the information currently in its Certified Health IT Product List, …

Health Care Technology

Spear-phishing hackers turn to junior staff when execs master security basics

Top executives who are trained well in self-defense don’t make good targets. And that’s what’s starting to happen in healthcare and other industries: …


Cybersecurity Fact vs. Fiction

Based on popular media, it's easy to be concerned about the security of smart cars, homes, medical devices, and public utilities. But how truly …


Apple iOS Threats Fewer Than Android But More Deadly

Data leakage and corruption haunt iOS and Android mobile apps the most, a new study shows.<p>Apple's iOS mobile platform suffers fewer cyberattacks than …

Information Security

How 3 hospital breaches went undetected for more than 3 years

Security firm’s discovery highlights why hospitals struggle to detect these lapses in security.

Health Care Technology

HHS warns of fresh WannaCry-like attacks after Microsoft, DHS reports

Microsoft has released new patches for Microsoft XP and Server 2003 systems while DHS pointed to an increase in North Korean cyber activity.

U.S. Department of Health and Human Services

Hacker Bypasses Microsoft ATA for Admin Access

Microsoft's Advanced Threat Analytics defense platform can be cheated, a researcher will show at Black Hat USA next month.

Information Security

WSU hard drive theft potentially impacts 1 million people

A safe containing a hard drive with the backup of the university’s Social and Economic Sciences Research Center was stolen in April.


Hospital survival guide for a world overflowing with unsecured medical devices

Tech-savvy hospitals like Mayo, Kaiser and Christiana are always testing, recognizing cybersecurity threats could get scarier, and aiming to change …

Health Care

Apple reveals plans to put health records on the iPhone

The company aims to pull all healthcare information, such as labs and medications, into one place.

Health Care Technology

1 Million Endpoints Exposed on Public Internet via Microsoft File-Sharing Services

Research on global Internet security posture found endpoints leaving Microsoft SMB file-sharing systems wide open online, a finding that explains the …

Information Security

Five ways to detect a malicious 'phishing' email

For as long as there’s been email, there’s been email scams. At least since the time email first started gaining widespread popularity in the 1990s, …

Identity Theft

WannaCry hackers just getting started, former federal CISO says

More attacks are coming and they will be much worse, Greg Touhill and other security experts told a House Science subcommittee.


Hospital Email Security in Critical Condition as DMARC Adoption Lags

Healthcare providers put patient data at risk by failing to protect their email domains with DMARC adoption.

Information Security