Breach notification regulations from the U.S. Department of Health and Human Services
New regulations requiring health care providers, health plans, and other entities covered by the Health Insurance Portability and Accountability Act (HIPAA) to notify …
Rogue Facebook phishing applications
Sometimes people take it for granted that once they login into Facebook, they don’t have to worry about security threats, but as Rik Ferguson (a researcher for Trend …
HITRUST offers access to Common Security Framework
The Health Information Trust Alliance announced that the Common Security Framework, the first IT security framework developed specifically for healthcare information, is now …
Videos of selected talks at Black Hat 2009 now available
The dust over Black Hat 2009 hasn’t even settled yet and already some talks are available in video format. The links below lead directly to the .mov files. The Language …
10 tips on ways to avoid identity theft at college
Identity theft is one of the fastest growing crimes in the country and the 18-24 year old age group of consumers is often hit hard by identity thieves. Each year, thousands of …
Commercial beta release of privacy-enhanced search technology
Private Access announced today the commercial beta release of its privacy-enabled technologies that put consumers at the center of clinical research in order to more easily …
Virus infects programs written in the Delphi software language
Sophos is reminding businesses of the importance of protecting corporate networks from malware infection following the discovery of an unusual virus – the spread of …
Radisson Hotels suffer data breach
Between November 2008 and May 2009, the computer systems of some Radisson hotels in the U.S. and Canada were accessed without authorization. At this point in time, it’s …
Malware protection on USBs from Ironkey and Tresys
IronKey and Tresys announced the integration of IronKey’s FIPS 140-2 Level 3 validated secure flash drives with Tresys’ FiST (File Sanitization Tool). This …
Policy definition and automated enforcement for virtual infrastructure
HyTrust unveiled the HyTrust Appliance 1.5. Adding to the core capabilities of the previous version – centralized access control, template-based security configuration, …
Video surveillance system with 16 channel recording from Qnap
QNAP announced a new addition to its VioStor line of Network Video Recorders. The VS-4016U-RP VioStor NVR is a video surveillance system that can simultaneously record video …
More users affected by identity theft malware during economic crisis
According to data compiled by PandaLabs, the number of users affected by malware designed for identity theft has increased 600% so far this year with respect to the same …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption