Why are connected medical devices vulnerable to attack and how likely are they to get hacked? Here are five digital chinks in the armor. There’s virtually no realm in healthcare today that isn’t adopting more technology. From real-time wireless access to your own health parameters through smart watches and wearables to implanted devices inside your … More Securing medical devices: Can a hacker break your heart?
In addition to patching the actively exploited bug, the update also brings fixes for another four security loopholes. Google has rolled out an update to its Chrome web browser that fixes five security flaws, including a vulnerability that is known to be actively exploited by attackers. “Google is aware of reports that an exploit for … More Google patches Chrome zero‑day under attack
The flaws, neither of which is being actively exploited, were fixed merely days after the monthly Patch Tuesday rollout. Microsoft has rushed out fixes for two security vulnerabilities affecting Microsoft Windows Codecs Library and Visual Studio Code. The security flaws are classified as Remote Code Execution (RCE) vulnerabilities and if successfully exploited could allow threat … More Microsoft issues two emergency Windows patches
What are some of the key security risks to be aware of when using USB flash drives and how can you mitigate the threats? Most of you probably own at least one USB thumb drive, which you typically use either to transfer data or as a backup for sensitive documents. Alternatively, you may like to carry … More How safe is your USB drive?
You don’t need a degree in cybersecurity or a bottomless budget to do the security basics well – here are five things that will get you on the right track. Many home offices are merely a corporate tentacle complete with a virtual private network (VPN), remotely managed workstations with IT experts at the corporate offices doing the … More 5 things you can do to secure your home office without hiring an expert