Why Medical Records Are Hotter Than Credit Card Thefts
Last year, more than 113 million medical records were compromised. Government Health IT indicates that over a third (34%) of U.S. healthcare customer records have already been breached – the highest figure of any industry. Unfortunately, the fact is that hospitals and other healthcare institutions are struggling to adapt to the new threats they face. While health records are galloping into the digital arena at an unprecedented rate, funding for cybersecurity initiatives in healthcare is essentially at a standstill. [Tweet “Why Are Healthcare Network Threats a Problem?”] While it may seem like credit cards, SSNs, and other financial data are…
The Art of Hacking: Why Absolutely Anyone Can Be a Hacker
What do hackers and street artists have in common? If you asked that question to the average person, you probably wouldn’t get much of an answer. But it turns out, both the hacker and the artist are equally capable of exploiting gaps in wireless security. This isn’t hyperbole. In fact, an artist by the name of Kyle McDonald has been making a living as both a street artist and a hacker, albeit with no malicious intentions. With the help of a friend, the North Carolina artist recently created an art installation at Moogfest, which they call the WiFi Whisperer,…
Hardware vs Software Mobile Security – Which Keeps Your Device Safer?
Media coverage of cybersecurity tends to focus on major companies which are victims of hacking and data theft. Consequently, there’s a lot of industry focus on enterprise security within offices and data centers i.e. security issues affecting desktop computers, servers, and physical network infrastructure. This rather misses the fact that mobile devices (laptops, smartphones and tablets) have become the achilles heel for organizations’ cybersecurity. They are an integral part of the workplace and used for handling business data are also…
Hackers Are Also Training to Take Over Mobile Devices at the Olympics
Three things will almost certainly happen at the Olympic Games 2016: Rio de Janeiro weather will be beautiful, Russian athletes will surely be missed and a few athletes will win hearts with captivating performances. Another thing is undoubtedly bound to occur during the summer games: Cybercriminals will desperately try to win the gold medal of network hacking. Millions of people will be in Rio to attend Olympic events and they will assuredly seek WiFi connections for their devices. Hackers –…
Top 6 Places Your Mobile Device Is Most At Risk of Being Hacked
In 2016, connectivity seems less like a technological feature and more like a birthright. Though limitless WiFi and 4G/LTE may seem like nirvana, it also means hackers have nearly limitless opportunities to take control of your mobile device. While connectivity is a passport to the digital world, it is also a hacker’s gateway to sensitive personal and business data. Hackers exploit how mobile devices trust the networks—both wireless and cellular—that they typically connect to. They use readily-available tools to trick…