Hackers could take control of Philips ‘smart TVs’ and broadcast their own ‘shows’ to watching famlies, thanks to a ‘fixed’ password which allows nearby attackers easy access to the set’s Wi-Fi adapter.
A young MIT student has invented a new system for storing data which could offer protection against unscrupulous colleagues – and even against the hi-tech tentacles of government organizations with “back doors” into corporate servers.
Starting today, Gmail will use an encrypted HTTPS connection to check or send email, regardless of what platform users employ to access the service – and will use security measures when moving mails internally, citing fears over government snooping.
Facebook’s ‘Deepface’ photo-matching software can now ‘recognize’ human faces with an accuracy just a fraction of a percentage point behind human beings – a huge leap forward in the technology, with some potentially alarming implications for privacy.
Smartphone apps and home equipment for scanning brainwaves could lead to a future in which governments or companies misuse such data as a way of decoding people’s personality traits, researchers from MIT and the Technical University of Denmark have warned.
University of Berkeley researchers have revealed a technique for identifying individual web pages visited ‘securely’ by users, with up to 89% accuracy, revealing data such as health conditions, financial details and sexual orientation.
Did you know that medical data on 20,000 people may be exposed to abuse today? As a healthcare practitioner, you may not be aware of the value of the data in your care, but criminals certainly are.
The Target security breach and the Snowden revelations about NSA surveillance have raised awareness of data privacy to new levels, making Data Privacy Day more relevant than ever in 2014. And yes, Data Privacy Day is a real thing, observed on January 28.
Domestic violence is not something that gets discussed much in information security circles, but there are few people that need advice on assuring their online safety more urgently than victims of stalking and domestic abuse. What can people do to protect themselves when there is a known and persistent threat?
This is a quick reminder that the September 23 deadline for compliance with the new HIPAA regulations is rapidly approaching. Organizations that handle protected health information (PHI) need to be sure they are up to speed on the changes and ready to withstand scrutiny. In general, you will need new NPPs and BAAs (Notices of
An infographic of recent healthcare IT security statistics paints a striking picture of much security work yet to be done, even as new medical privacy regulations go into effect.
Is your company ready for September 23, 2013, the deadline for compliance with HIPAA 2.0? The revised omnibus privacy and security regulations incorporating HITECH expose a lot more companies to possible fines.
The Xbox One Kinect microphone – one of the hi-tech new features of Microsoft’s new Xbox One console – has raised security concerns since it “listens” to users even when the console is turned off.
Britain’s hi-tech government intelligence agency GCHQ should know better than to send passwords in plain text via email – but has been doing so due to “legacy systems”, it admitted in a statement this week.
A prototype multi-cursor system designed to improve the security of on screen password entry has been posted onto DigInfo, the Tokyo based news site that promotes cutting edge technology from Japan.
Results from an eight country Accenture survey shows that US doctors surveyed have mixed feelings about electronic patient records (EPR). While some 82 percent want patients to update their own records, only a third (31 percent) believe they should have full access.
According to the PwC Top Health industry issues of 2013 report, healthcare managers and consumers are increasingly concerned about the rise of healthcare workers using their own devices within hospitals and other healthcare centers.
A French-Moroccan national was jailed by a Dublin court after being found guilty of hacking into the business accounts of an online betting company, according to the Irish Independent.