Bad medicine: Can poor data security result in death?
Medical records could become compromised during transmission, on the patient’s computer, or at any number of multiple points of storage.
Medical records could become compromised during transmission, on the patient’s computer, or at any number of multiple points of storage.
Far from being Doctor Evil’s Facebook page, social networks for criminals cover multiple facets of global crime. Should countering cybercrime be a goal of corporate business or is it merely a job for law enforcement?
When fiction meets reality: Competitive Intelligence and corporate interests merge with nation state espionage priorities targeting private sector industry.
Stuxnet has radically changed the global perception of cyberwarfare leveraging internet-connected SCADA vulnerabilities of critical infrastructure. Will the lights stay on or are we in for trouble?
As the technical evaluator for more than 200 wireless developer partners, my laptop was an espionage goldmine and I knew it. So I made a point not to bring it.
Hotels are the spots where industrial spies used to crouch like lions around a waterhole on the business savannah. Do these old school threats still exist?
With four billion mobile phones compared to one billion computers, cell phones remain a primary espionage target. You can eliminate most traveler-related cell phone risk with one step.
Aruba, Belgium, Curacao, Sint Maarten, Suriname, and Netherlands Antilles all may want to check out this .nl Windows Server 2008 vulnerability.
According to Iran, Stuxnet is no longer a threat – however use of a new zero-day exploit has extended its life cycle.
In a direct 10-year comparison, the Delaware banking industry’s overuse of the FinCEN SAR category of ‘Other’ mirrors the growth pattern of the malware industry year after year. Are these related?