A London sexual health clinic accidentally leaked the HIV status, names, and email addresses of 780 patients in a newsletter.
American Airlines denied involvement in an apparent security incident at its one-time subsidiary Sabre, but is redoubling its own security measures as a precaution.
A lawsuit filed in a federal court in California accused UCLA Health System of not adequately protecting the personal data of 4.5 million individuals affected by a 2014 breach.
University of Pittsburgh Medical Center (UPMC) Health Plan announced its third breach in two years, information of 722 patients compromised.
Recognizing the increased risk of breach from the interconnectedness of healthcare systems, some healthcare organizations will require third parties to obtain CSF certification.
Evidence seems to indicate that the Anthem data breach and OPM data breaches were carried out by the same Chinese actors.
The personal health information, including Social Security numbers and medical conditions, might have been compromised in a cyber attack in May on Medical Information Engineering.
Security researcher Billy Rios has verified that more Hospira infusion pumps are vulnerable to the same security issues, since they use "identical software."
The guidance is organized into 10 categories, and serves as "starting point for a more complete code," report authors said.
The Ohio-based health care provider is notifying nearly 1,000 patients that three computers in its Cardiac Cath Lab were infected with malware.
ICS-CERT is now aware of more vulnerabilities impacting Hospira infusion pumps.
An annual health care study found that criminal attacks replaced device theft and loss as the leading cause of breaches.
An independent researcher identified the improper authorization vulnerability and insufficient verification of data authenticity flaw.
Biopharma companies need a secure digital signing infrastructure. SureClinical found an answer for them, reports Greg Masters.
The Atlanta-based medical testing lab has, again, filed to have FTC's complaint dismissed.
Two unnamed hospitals have signed on to test the WhatsAppDoc platform developed to detect malware in outdated medical devices by monitoring AC consumption.
Experts consider the lasting impact of data brokers, and potential breaches, on genetic information.
Anthem breach investigators initially claimed that tools, linked exclusively to Chinese espionage attackers, were used against the health insurer.
Of the approximate 78.8 million people whose information was accessed by hackers earlier this month, anywhere from 8.8 to 18.8 million of those affected include non-members.
When it comes to healthcare security, if you think compliance is the only thing you need to worry about, think again.
A unit of AIG Inc. is the primary cyber insurer for Anthem, according to a recent report in Business Insurance.
Plaintiffs in California, Georgia, Indiana and Alabama have filed suits and Anthem warned customers to brace for more phishing scams.
Experts argue that encryption is not the key piece in the Anthem breach if the incident involved a targeted attack on admin credentials.
Mandiant was brought on site Tuesday, after Anthem started their own internal investigation.
The amount of information stored in our medical records creates a ripe environment for security breaches. The health care sector is in search of information security analysts.
LabMD can challenge the FTC's enforcement authority in federal court once the agency comes to a final decision on the exposure of patient data.
The HITRUST Alliance and Deloitte will coordinate cyber town hall meetings in major U.S. cities.
The mission of the working group will be to enhance health information technology (HIT) security.
New Jersey Governor Chris Christie signed the legislation last Friday.
The privacy controls will be added to version 7 of HITRUST's CSF due out later this month.
Sign up to our newsletters
SC Magazine Articles
- Women in IT Security: 10 Power Players
- Report: Phishing costs average organization $3.7 million per year
- Scanner identifies thousands of malicious Android apps on Google Play, other markets
- Women in IT Security: Women of influence
- DARPA seeks to develop program that drastically improves DDoS defense
- DOJ issues new 'stingray' policies and begins requiring a warrant
- Outdated websites deliver TeslaCrypt via Neutrino Exploit Kit: Heimdal
- Scammers and schemers look to cash in on Ashley Madison breach
- ACLU asks DOJ to withhold funds for LAPD body cams
- A question of balance between security solutions and the people who use it