What Doctors Wish You Knew About HIPAA and Data Security

Credit to Author: Julie Charnet| Date: Tue, 08 Aug 2023 12:00:00 +0000
Think US health data is automatically kept private? Think again.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Julie Charnet| Date: Tue, 08 Aug 2023 12:00:00 +0000
Think US health data is automatically kept private? Think again.
Read More
A UK research team based at Durham University has identified an exploit that could allow attackers to figure out what you type on your MacBook Pro — based on the sound each keyboard tap makes.
These kinds of attacks aren’t particularly new. The researchers found research dating back to the 1950s into using acoustics to identify what people write. They also note that the first paper detailing use of such an attack surface was written for the US National Security Agency (NSA) in 1972, prompting speculation such attacks may already be in place.
“(The) governmental origin of AS- CAs creates speculation that such an attack may already be possible on modern devices, but remains classified,” the researchers wrote.

Credit to Author: BrianKrebs| Date: Tue, 08 Aug 2023 17:37:23 +0000
WormGPT, a private new chatbot service advertised as a way to use Artificial Intelligence (AI) to help write malicious software without all the pesky prohibitions on such activity enforced by ChatGPT and Google Bard, has started adding restrictions on how the service can be used. Faced with customers trying to use WormGPT to create ransomware and phishing scams, the 23-year-old Portuguese programmer who created the project now says his service is slowly morphing into “a more controlled environment.” The large language models (LLMs) made by ChatGPT parent OpenAI or Google or Microsoft all have various safety measures designed to prevent people from abusing them for nefarious purposes — such as creating malware or hate speech. In contrast, WormGPT has promoted itself as a new LLM that was created specifically for cybercrime activities.
Read More
Credit to Author: Editorial Team| Date: Tue, 08 Aug 2023 14:57:11 +0000
Kaspersky solutions are still detecting attempts to exploit CVE-2017-11882 vulnerability in Microsoft Office.
Read More
Credit to Author: Chester Wisniewski| Date: Tue, 08 Aug 2023 10:01:37 +0000
Naming and shaming the bad guys can be gratifying, but for practical protection, Threat Activity Clusters are the way
Read More
Credit to Author: Andrew Brandt| Date: Tue, 08 Aug 2023 10:00:11 +0000
A collection of very specific behaviors, observed by Sophos X-Ops incident response analysts in the lead-up to four separate ransomware attacks in the first quarter of 2023, indicates an unexpected connection between the attacks. In the parlance of the Managed Detection and Response (MDR) team, the peculiarly similar details constitute a threat activity cluster that […]
Read MoreCredit to Author: Melissa Clow| Date: Tue, 08 Aug 2023 00:00:00 +0000
One of the key pillars of the AWS Well-Architected Framework (WAF) is sustainability: the idea that cloud applications should be designed to minimize their environmental impact. Gain insight into the WAF sustainability pillar and discover best practices for architecting your cloud applications to improve sustainability.
Read MoreCategories: News Categories: Privacy Tags: tiktok Tags: privacy Tags: gdpr Tags: children Tags: under 13 TikTok is looking at yet another fine… |
The post TikTok facing fines for violating children’s privacy appeared first on Malwarebytes Labs.
Read More