Remove 2018 Remove Malware Remove Security
article thumbnail

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met. This breadth of information can be much more valuable on the black market—sometimes up to $30 per record—than the typical consumer financial profile , which sells for $10 to $12.

Security 189
article thumbnail

Window Snyder’s new startup Thistle Technologies raises $2.5M seed to secure IoT devices

TechCrunch

The Internet of Things has a security problem. The past decade has seen wave after wave of new internet-connected devices, from sensors through to webcams and smart home tech, often manufactured in bulk but with little — if any — consideration to security. Security veteran Window Snyder thinks there is a better way.

IoT 207
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Extra Crunch roundup: ‘Nightmare’ security breach, Poshmark’s IPO, crypto boom, more

TechCrunch

– APRIL 22, 2018: A statue of Albert Gallatin, a former U.S. The breach of FireEye and SolarWinds by hackers working on behalf of Russian intelligence is “the nightmare scenario that has worried cybersecurity experts for years,” reports Zack Whittaker. But who will it enrich with its final pricing decision?”

Retail 263
article thumbnail

Ransomware attacks against hospitals: A timeline

The Parallax

Hospitals and health care systems, now in the business of collecting patient data as a side effect of treating physical maladies, struggle to keep that information secure. Cybersecurity researchers at Cylance estimated that the number of ransomware attacks tripled in 2017. billion per year.

Security 154
article thumbnail

Your old router could be a hacking group’s APT pawn

The Parallax

Inception Framework’s attack methodology has evolved since it was first detected in 2014 in part by Waylon Grange, senior threat researcher at computer security company Symantec. How to secure your home Wi-Fi. Once the group has profiled the device and tricked the target into installing the hidden malware, it can begin stealing data.

Malware 223
article thumbnail

From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25

Tenable

Twenty five years after the launch of CVE, the Tenable Security Response Team has handpicked 25 vulnerabilities that stand out for their significance. The Tenable Security Response Team has chosen to highlight the following 25 significant vulnerabilities, followed by links to product coverage for Tenable customers to utilize.

article thumbnail

Fragmentation likely to hinder Android P’s security chops

The Parallax

—Google is prepping the Android world for its next upgrade, code-named Android P, with an array of security and privacy enhancements. But even locking down a long-criticized Android privacy flaw won’t help the operating system beat its biggest security flaw: its own success. READ MORE ON ANDROID SECURITY.