Scott E. Rupp reports: The Department of Homeland Security (DHS) says that some of the Siemens medical imaging devices that run Windows 7 software are vulnerable to cyberattack. If hacked, these specific Siemens devices allow for the ability to “remotely execute arbitrary code,” DHS says. The alert from DHS’s Industrial Control Systems Cyber Emergency Response…
Month: August 2017
Visalia woman’s personal information stolen… from her doctor’s car
Not only is the data security problematic, but so is the incident response in this case, as Rich Rodriguez reports: A Visalia woman’s personal information is in the hands of a thief. Robin Walker wasn’t hacked, it was stolen from her doctor. She had knee surgery in July. Days before the operation her doctor’s car…
UK: Malware attack disrupts hospitals
It appears that a UK hospital has been impacted by a ransomware attack that is disrupting services to patients, although a spokesperson claims this attack is not as severe or widespread as an earlier attack. X News Press reports that NHS Lanarkshire was impacted: “Unfortunately a small number of procedures and appointments have been cancelled as…
Day after doctor’s murder, accused still on the run
Another reminder of the need to revoke access – physical and digital – if you are terminating an employee or student’s position with your organization: Summary: The main accused, suspected to be another postgraduate student working in the radiology department, is still on the run. Sushant Pandey was found with his throat slit inside the…
Turkey Arrests Five Suspects in Qatar News Agency Hacking
Albawaba reports: Qatar has said that five suspected computer hackers have been arrested in Turkey in connection with a cyber attack on Qatar’s state news agency last May. Qatar’s general prosecutor Ali bin Fetais al-Marri said on Friday during a press conference in Ankara that the suspects have been accused of involvement in the attack…
Leak of >1,700 valid passwords could make the IoT mess much worse
Dan Goodin reports: Security researchers have unearthed a sprawling list of login credentials that allows anyone on the Internet to take over home routers and more than 1,700 “Internet of things” devices and make them part of a destructive botnet. The list of telnet-accessible devices, currently posted at this Pastebin address, was first posted in…