US University Offers First Ever Healthcare-Specific Cybersecurity Certification

US University Offers First Ever Healthcare-Specific Cybersecurity Certification
  • US University Offers First Ever Healthcare-Specific Cybersecurity CertificationThe McCombs School of Business at the University of Texas at Austin has launched America’s first professional cybersecurity certificate program specifically geared toward protecting healthcare providers from cyber-attacks. The Leadership in Healthcare Privacy and Security Risk Management program has been launched by the school in a bid to help close the 1.8 million person gap&nb



  • Suspect in soldiers’ killings in Northern Ireland in 1972 refused bail

    Charge against John Downey, suspect in car bombing in Enniskillen, ‘could not be more grave’, says judgeA man accused of murdering two British soldiers in 1972 has been remanded in custody after appearing at Omagh magistrates court.John Downey, now 67, handed himself in to police on Friday after losing an appeal to challenge his extradition to the UK from the Republic of Ireland. Continue reading…

  • Mississippi Shows Flagrant Disregard for Cybersecurity

    Mississippi Shows Flagrant Disregard for CybersecurityAn audit of Mississippi government institutions has revealed an alarming lack of compliance with standard cybersecurity practices and with the state’s own enterprise security program.A survey of 125 state agencies, boards, commissions, and universities conducted by the Office of the State Auditor (OSA) revealed that only 53 had a cybersecurity policy in place. Eleven reported having no security policy or disaster recovery plan whatsoever.&nbs

  • Most Americans Are Clueless About Private Browsing

    Most Americans Are Clueless About Private Browsing New research has found that only a quarter of Americans know that surfing the internet in private browsing mode only prevents other users of the same computer from seeing what you’ve been up to online.A survey conducted in June by the Pew Research Center asked 4,272 adults living in the United States ten digital knowledge questions. When asked to identify the correct definition of private browsing, 24% of respondents got it w

  • Advertisement



  • US Homeland Security Wants to Subpoena ISPs to Hand Over Data

    US Homeland Security Wants to Subpoena ISPs to Hand Over DataThe cybersecurity branch of the Department of Homeland Security has requested legal permission from Congress to demand data from internet services providers in a bid to prevent cyber-attacks.The Cybersecurity and Infrastructure Security Agency (CISA) has chosen National Cybersecurity Awareness Month to seek administrative subpoena authority, which will give it the power to compel ISPs to hand over information. Currently, when the

  • #SecTorCa: Finding a New Route to Solve Tomorrow’s Cyber-Attacks

    #SecTorCa: Finding a New Route to Solve Tomorrow’s Cyber-AttacksFor modern security systems to succeed, it’s important for organizations to expect that security systems will fail. By expecting failure and planning for it, it’s possible to be more resilient and deliver better security outcomes, according to Solomon Sonya, assistant professor of computer science at the United States Air Force Academy.Sonya delivered his message during a keynote at the SecTor security conference i

  • BAE Systems Pilots Tech to Support Child Protection Agencies

    BAE Systems Pilots Tech to Support Child Protection AgenciesBAE Systems has announced details of a technology pilot aimed at supporting child protection agencies. The initial project, run in partnership with Gloucestershire Constabulary Police Force, seeks to improve speed and accuracy for identifying potentially vulnerable children.BAE Systems has adapted technology normally used to protect and safeguard businesses against fraudulent activity, to quickly and accurately bring together data relat

  • #SecTorCa: Millions of Phones Leaking Information Via Tor

    #SecTorCa: Millions of Phones Leaking Information Via TorThere is a privacy threat lurking on perhaps hundreds of millions of devices, that could enable potential attackers to track and profile users, by using information leaked via the Tor network, even if the users never intentionally installed Tor in the first place.In a session at the SecTor security conference in Toronto, Canada on October 10, researchers Adam Podgorski and Milind Bhargava from Deloitte Canada outlined and demonstrated prev

  • Advertisement



  • New ISF Paper Attempts to Demystify AI in Information Security

    New ISF Paper Attempts to Demystify AI in Information Security In a paper released today, the Information Security Forum is urging organizations to capitalize on the opportunities offered by artificial intelligence while taking sensible steps to reduce the risks posed by this still immature technology.  Demystifying Artificial Intelligence in Information Security defines exactly what AI is, then lays out a realistic analysis of what it can do, and will be able to do soon, for

  • GCHQ’s spying is worse than that of the web giants | Letter

    John Green takes issue with former GCHQ head David Omand’s statement that ‘web giants are a bigger privacy threat than the state’The former head of GCHQ, David Omand, is being particularly tendentious when he maintains that “web giants are a bigger privacy threat than the state” (Report, 9 October). He says state security agencies are “extraordinarily strictly regulated” and that “warrants have to be signed by a senior judge”. So how come GCH

  • Data of 250K Users of Sex Industry Website on Sale for $300

    Data of 250K Users of Sex Industry Website on Sale for $300 A hacker has exploited a vulnerability on Dutch website Hookers.nl to appropriate the account details of all 250,000 users, which he is now offering for sale on the dark web.The exposed data includes the email addresses, usernames, IP addresses, and passwords of sex workers and their clients. In a sample of the data viewed by Dutch news broadcaster NOS, the passwords were encrypted, but the email addresses—many of w

  • Verified Mark Certificate Issued to CNN

    Verified Mark Certificate Issued to CNNCNN has been issued a new digital certificate that uses logo verification to prove emails sent from a particular domain are genuine.The certification of the American news channel with a Verified Mark Certificate by DigiCert, Inc. marks the first time a VMC has been issued for a domain that sends emails at scale. The news follows the announcement on September 4, 2019, that Entrust Datacard had become the first certification auth

  • Advertisement




  • Coleen Rooney and Rebekah Vardy in Public Spat Over ‘Leaked Stories’

    Coleen Rooney and Rebekah Vardy in Public Spat Over ‘Leaked Stories’Reports emerged yesterday that Coleen Rooney, wife of professional footballer Wayne Rooney, publicly accused Rebekah Vardy, wife of footballer Jamie Vardy, of leaking personal information about her to tabloid newspaper The Sun. Vardy was quick to refute the claims.In a lengthy social media post on October 9, Rooney wrote: “For a few years now someone I trusted to follow me on my personal Instagram account has b

  • Researchers Discover Spy Platform with GSM Fingerprinting

    Researchers Discover Spy Platform with GSM FingerprintingResearchers at ESET have discovered several high-profile espionage attacks aimed at government and diplomatic entities in Eastern Europe.According to the analysis, the attacks were conducted using a previously unreported cyber-espionage platform, which is notable for its modular architecture, along with two prominent features: the AT protocol used by one of its plugins for GSM fingerprinting, and Tor, which is employed for its network comm

  • #DTXEurope: Defense Now Far Harder Than Attack, Warns Security Researcher

    #DTXEurope: Defense Now Far Harder Than Attack, Warns Security ResearcherAt Digital Transformation EXPO Europe Samy Kamkar, independent security researcher and ‘Samy’ MySpace computer worm creator, reflected upon the current cyber-threat landscape and warned that defenders are being challenged to a far greater degree than ever before.That’s because of the ever-increasing numbers of internet-connected devices being used across the world, extremely high levels of information bein

  • Turkey launches ground offensive against Kurdish forces in Syria

    Turkey launched a broad assault on Kurdish-controlled areas in northeastern Syria on Wednesday (Oct 9), with intensive bombardment paving the way for a ground offensive made possible by the…

  • Survey Reveals Widespread Ignorance Over Attack That Affects Most Companies

    Survey Reveals Widespread Ignorance Over Attack That Affects Most CompaniesAccording to a new research survey, 68% of IT security stakeholders aren’t sure whether they’ve experienced a Pass the Hash attack, and 4% don’t even know what this globally prevalent form of attack is. These almost fantastical findings, released today by One Identity, came from a survey of more than a thousand IT professionals conducted by Dimensional Research.One Identity field strategist Dan Co

  • Number of Girls Applying for British Cybersecurity Courses Surges

    Number of Girls Applying for British Cybersecurity Courses SurgesBritain’s National Cyber Security Centre has reported a significant increase in the number of young women applying for cybersecurity courses.According to new figures released yesterday, applications from girls for the NCSC’s 2019 CyberFirst summer courses were up 47% compared to last year.  Rather appropriately, the surge in female applicants for the free cybersecurity courses was announced on Ada Love

  • #DTXEurope: Hacking Not Always Malicious, Says ‘Samy’ MySpace Worm Creator

    #DTXEurope: Hacking Not Always Malicious, Says ‘Samy’ MySpace Worm CreatorAt Digital Transformation EXPO Europe Samy Kamkar, independent security researcher infamous for creating the ‘Samy’ Myspace computer worm that gained notoriety when it propagated across the social networking site in 2005, said that hacking exploits are not always malicious in nature, and are rather often imbedded in inquisitively and a determination to push boundaries.“There is something super

  • Twitter Admits Personal Contact Details Used by Advertising Systems

    Twitter Admits Personal Contact Details Used by Advertising SystemsTwitter has admitted that personal contact information of users may have “inadvertently been used for advertising purposes.”According to a statement published earlier, it discovered that when users provided an email address or phone number for safety or security purposes (for example, two-factor authentication) this data may have been the recipient of Twitter’s Tailored Audiences and Partner Audiences advertisin

  • Twitter Admit Personal Contact Details Used by Advertising Systems

    Twitter Admit Personal Contact Details Used by Advertising SystemsTwitter has admitted that personal contact information of users may have “inadvertently been used for advertising purposes.”According to a statement published earlier, it discovered that when users provided an email address or phone number for safety or security purposes (for example, two-factor authentication) this data may have been the recipient of Twitter’s Tailored Audiences and Partner Audiences advertising

  • #DTXEurope: Former Chief of MI6 Reflects on Growth of Tech and Cyber-Threats

    #DTXEurope: Former Chief of MI6 Reflects on Growth of Tech and Cyber-ThreatsAt Digital Transformation EXPO Europe Sir John Sawers, former chief, Secret Intelligence Service (MI6), explored the recent growth of cyber technology and its impact on cyber-threats and cyber-defense.Reflecting upon his career at MI6, Sawers noted how cyber and technology became an integral part of the Secret Intelligence Service’s work during his tenure.“Even at MI6, a human-intelligence service, I had to increas

  • Ex-MI6 chief criticises threat to withdraw security cooperation with EU

    Sir John Sawers says it would be hugely damaging if UK-EU relations collapsed Latest Brexit news – live updatesA former MI6 chief has said Brexit negotiations have got to “an extraordinarily damaging state” because unnamed Downing Street officials have been briefing that the UK might withdraw security cooperation with the EU.Sir John Sawers, in a briefing to reporters at a technology summit, said any attempt to stop working with EU countries in tackling terrorism “would be an a

  • #DTXEurope: Huawei Dispute Symbolic of Wider Problems in Telecoms Industry

    #DTXEurope: Huawei Dispute Symbolic of Wider Problems in Telecoms IndustrySpeaking in the opening keynote session of Digital Transformation EXPO Europe Sir John Sawers, former chief, Secret Intelligence Service (MI6), said that the ongoing dispute between the US and Chinese telecommunications giant Huawei is symbolic of broader problems affecting the global telecoms industry.“A big thing has been made about the intelligence and security threat posed by having Huawei equipment in the Britis

  • Microsoft October Update Patches Nine Critical Vulnerabiltiies

    Microsoft October Update Patches Nine Critical VulnerabiltiiesMicrosoft patched 59 vulnerabilities yesterday, releasing one advisory for Windows 10 Servicing Stack.Of the 59 vulnerabilities patched, nine are classified as “critical.” There were no vulnerabilities exploited in the wild this month, nor were any publicly disclosed prior to Patch Tuesday.Jimmy Graham, senior director of product management at Qualys, said that alongside these patches, a Remote Code Execution vulnerability

  • #ACS19: Make Your Friends and Plans Before the Breach

    #ACS19: Make Your Friends and Plans Before the BreachPreparing for data breach response should involve practising with third parties, and repeating the processes. Speaking at the ATM & Cybersecurity 2019 conference in London, Mark Whitehead, head of customer breach support at Deloitte said that “reputation is an ethereal thing” and hard to control.He said that reputation is fundamentally based on two things: what you do; and what you say, also consider how you perf

  • US F-16 fighter jet crashes in Germany with pilot taken to hospital

    An American F-16 fighter jet crashed Tuesday near the city of Trier in western Germany, the German air force told AFP, with the pilot surviving after using the ejector seat. After multiple emergency…

  • Northrop Grumman Successfully Tests AQS-24 Deep Tow

    Northrop Grumman Corporation successfully operated the AQS-24 minehunting sonar at depths greater than 400 feet during system testing off the coast of Ft. Lauderdale, Florida. Embarked on the M/V…

  • Germany’s Arms Export Approvals Headed for Record High

    German arms exports could be on track to reach record levels this year, with the government approving sales to the tune of €6.35 billion ($6.8 billion) to the end of last month, the Economy Ministry…

  • Indian Air Force Takes Delivery of First Rafale Fighter

    France: Eric Trappier, Dassault Aviation Chairman and Chief Executive Officer, hosted the handover ceremony of the first Indian Air Force Rafale in Mérignac, Dassault Aviation’s Rafale final assembly…

  • Read More