Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Posts Tagged ‘Independent Security Evaluators’
Most Recent
 
Read More
February 23, 2016

White Hats Hack 12 U.S. Hospitals, Find Patient Data Highly Vulnerable

Patient and hospital records are at serious risk of hacking attacks, according to a two-year study of healthcare facilities by Independent Security Evaluators, based in Baltimore, Md. The 71-page study assessed security at 12 hospitals, two health data facilities, two medical devices from one manufacturer, and two web applications. The assessment took place over a two-year period.

Evaluators attacked medical organizations in controlled settings. The attacks included compromising drug dispensers, patient monitoring systems and check-in kiosks. The attacks on drug dispensers took place after infections using USB sticks that were left on hospital premises. Such attacks carried [...]

11100
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University