privacy

QuickHealSecurity

A sloppy click can exfiltrate your important data!

Credit to Author: Anant Pulgam| Date: Mon, 03 Feb 2020 09:17:12 +0000

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in…

Read More
ComputerWorldIndependent

Fed rule on patient access to healthcare data gets EMR vendor pushback

Credit to Author: Lucas Mearian| Date: Thu, 30 Jan 2020 03:00:00 -0800

The largest electronic medical record (EMR) vendor in the U.S. is fighting a proposed government rule to allow patients and their physicians greater access to electronic health information – regardless of the technology platform – to promote data exchange.

According to a number of recent reports, EMR vendor Epic Systems is lookng to derail the finalization of a rule from the Department of Health and Human Services (HHS) that would implement some provisions of the 21st Century Cures Act. In particular, the rules governing information-blocking of patient healthcare information and EMR interoperability are at the heart of the fight.

To read this article in full, please click here

Read More
SecurityTrendMicro

The Everyday Cyber Threat Landscape: Trends from 2019 to 2020

Credit to Author: Trend Micro| Date: Mon, 06 Jan 2020 13:15:04 +0000

The past 12 months have been another bumper year for cybercrime affecting everyday users of digital technology. Trend Micro blocked more than 26.8 billion of these threats in the first half of 2019 alone. The bad news is that there are many more out there waiting to steal your personal data for identity fraud, access…

The post The Everyday Cyber Threat Landscape: Trends from 2019 to 2020 appeared first on .

Read More
ComputerWorldIndependent

Amid privacy and security failures, digital IDs advance

Credit to Author: Lucas Mearian| Date: Mon, 06 Jan 2020 03:00:00 -0800

Frustration over a growing number of privacy and security failuresin recent years is driving the creation of digital identities controlled only by those whose information they contain.

Known as “self-sovereign identities,” the digital IDs will be used by consumers, businesses, their workers and governments over the next few years to verify everything from credit worthiness and college diplomas to licenses and business-to-business credentials.

“We are slowly graduating from crawling to walking. It takes one to two years ’til we have reliable capabilities to spark meaningful decentralized identity adoption,” said Homan Farahmand, a senior research director at Gartner. “A major non-technical hurdle is for organizations to learn the concept and take the necessary steps to appropriately adapt their business processes to decentralized identity ecosystems.”

To read this article in full, please click here

Read More