Computer Ethics a...
Follow
Find
493 views | +0 today
 
Rescooped by Matthew *Matt Warren from Health Care Social Media And Digital Health
onto Computer Ethics and Information Security
Scoop.it!

Top 5 Health information security threats for medical practices

Top 5 Health information security threats for medical practices | Computer Ethics and Information Security | Scoop.it
Despite having their computers secured by antivirus software, firewall and password protected logins – medical practices have increasingly fallen prey to data security breaches. In most cases, it i...

Via HIT Blogger, Marie Ennis-O'Connor
more...
No comment yet.

From around the web

Computer Ethics and Information Security
Bring together information on computer ethics
Your new post is loading...
Your new post is loading...
Scooped by Matthew *Matt Warren
Scoop.it!

IBM Security previews the 2015 Ponemon Cost of a Data Breach Study

Listen to IBM Security preview the release of the 2015 Ponemon Cost of a Data Breach study and learn how it can help businesses understand the implications ...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

DEA, US Army bought $1.2M worth of hacking tools in recent years

DEA, US Army bought $1.2M worth of hacking tools in recent years | Computer Ethics and Information Security | Scoop.it
Remote access malware either already has or will soon turn up in local cops' kits.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Wyden: Cyber Bill Allows Massive Increase in Government Surveillance, Fails on Security | Senator Ron Wyden

Wyden: Cyber Bill Allows Massive Increase in Government Surveillance, Fails on Security | Senator Ron Wyden | Computer Ethics and Information Security | Scoop.it
Washington, D.C. U.S. Senator Ron Wyden, D-Ore., today reiterated his concerns about a cybersecurity bill that would cre
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Obama Emergency Cyber Sanctions 'Another Salvo In War On Legitimate Hackers'

Obama Emergency Cyber Sanctions 'Another Salvo In War On Legitimate Hackers' | Computer Ethics and Information Security | Scoop.it
Critics of Obama's emergency plans to sanction hackers who threaten national infrastructure are concerned legitimate researchers could be under threat as a result.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Hacking the Internet of Things - TheIoT

Hacking the Internet of Things - TheIoT | Computer Ethics and Information Security | Scoop.it
The IoT - All The Internet of Things! The most comprehensive & up to date collection of IoT links that you can find.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Monica Lewinsky's Response to Internet Bullying Deserves a Standing Ovation

Monica Lewinsky's Response to Internet Bullying Deserves a Standing Ovation | Computer Ethics and Information Security | Scoop.it
"I was Patient Zero of losing a personal reputation on a global scale."
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cyber criminals target financial professionals involved in deal-making - The National

Cyber criminals target financial professionals involved in deal-making - The National | Computer Ethics and Information Security | Scoop.it
Cyber crime is most associated with fraudsters taking money off ordinary gullible computer users, bu...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Teen hacks car with $15 worth of parts

Teen hacks car with $15 worth of parts | Computer Ethics and Information Security | Scoop.it
With just a little soldering and assembly, a 14-year-old built a device to wirelessly communicate with a vehicle's controller area network (CAN) and remotely start and unlock the vehicle.
more...
No comment yet.
Rescooped by Matthew *Matt Warren from The Political Side of Things
Scoop.it!

Health insurer Premera hit by "sophisticated cyberattack"

Health insurer Premera hit by "sophisticated cyberattack" | Computer Ethics and Information Security | Scoop.it
Cybercriminals may have gained access to members' Social Security numbers, addresses and more

Via Ken Feltman
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

iSpy: The CIA Campaign to Steal Apple's Secrets

iSpy: The CIA Campaign to Steal Apple's Secrets | Computer Ethics and Information Security | Scoop.it
Researchers working with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Anonymous: New Hacking Group Targets Kanye West, Kim Kardashian, Even ... - The Inquisitr

Anonymous: New Hacking Group Targets Kanye West, Kim Kardashian, Even ... - The Inquisitr | Computer Ethics and Information Security | Scoop.it
Kanye West looks to have been targeted by hackers, after the cyber terrorist group known as Anonymous launched a scathing attack on the rapper, which included
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

NSA Cyber Security - Enterprise For Partnership - Maryland Trust Commonwealth National Security

NSA Cyber Security - Enterprise For Partnership - Maryland Trust Commonwealth National Security | Computer Ethics and Information Security | Scoop.it
UK GOVERNMENT DA-NOTICE NEWS BLACKOUT - MAINSTREAM MEDIA EXTRACTS I The Sensational Carroll Foundation Trust And Parallel Carroll Maryland Trust Multi-billion Dollar Offshore Tax Fraud Bribery Scandal Which Is Now Encircling The Beleaguered UK Attorney...
more...
No comment yet.
Rescooped by Matthew *Matt Warren from Creative teaching and learning
Scoop.it!

Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches

Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches | Computer Ethics and Information Security | Scoop.it
In this lesson, students will learn about the extent of cyberattacks just in the past year and the risks they pose for companies, governments and individuals.

Via Leona Ungerer
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

ICO investigates 173 UK law firms over data protection issues | Technology News World

ICO investigates 173 UK law firms over data protection issues http://t.co/fY2y5xULoE #security #technology #techsec
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Another blow for Sony as WikiLeaks creates online archive of hacked documents | Latest News & Updates at Daily News & Analysis

Another blow for Sony as WikiLeaks creates online archive of hacked documents | Latest News & Updates at Daily News & Analysis | Computer Ethics and Information Security | Scoop.it
Another blow for Sony as WikiLeaks creates online archive of hacked documents - It's the latest blow for the entertainment and technology company struggling to get past the attack, which the company estimates caused millions in damage.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Are you safe in the Internet of Things?

Are you safe in the Internet of Things? | Computer Ethics and Information Security | Scoop.it
So where are you vulnerable? A better question might be where are you NOT vulnerable?
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Google Glass is not dead, says Eric Schmidt | ET CIO

Google Glass is not dead, says Eric Schmidt | ET CIO | Computer Ethics and Information Security | Scoop.it
Eric Schmidt has said that the technology behind Glass is "too important to throw away" and that the program is being made ready for users...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cybersecurity in the age of Terror and Foreign Adversary Aggression

Cybersecurity in the age of Terror and Foreign Adversary Aggression | Computer Ethics and Information Security | Scoop.it
One could argue that Cybersecurity is by far the most important Homeland Security, National Security and Public safety issue of our time.
more...
No comment yet.
Rescooped by Matthew *Matt Warren from What used to be conspiracy theory
Scoop.it!

Beware: Google Docs Phishing Emails are circulating - Cyberwarzone

Beware: Google Docs Phishing Emails are circulating - Cyberwarzone | Computer Ethics and Information Security | Scoop.it
Google Docs Phishing Emails are used by cybercriminals and hackers to obtain credentials from unaware Google Docs users. Learn more about these attacks.

Via Marianne PokeBunny Lenaerts
more...
Scooped by Matthew *Matt Warren
Scoop.it!

Cyber-attacks become top business continuity threat - Computer Business Review

Cyber-attacks become top business continuity threat - Computer Business Review | Computer Ethics and Information Security | Scoop.it
Hackers are worrying continuity managers more than other dangers.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Why Cyber Security Is All About The Right Hires - Lifehacker Australia

Why Cyber Security Is All About The Right Hires - Lifehacker Australia | Computer Ethics and Information Security | Scoop.it
Effective IT security requires many elements — but none is more important than training people with appropriate skills, as Nigel Phair from the ...
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

PM Narendra Modi urges IT industry to develop cyber security solutions - The Times24

PM Narendra Modi urges IT industry to develop cyber security solutions - The Times24 | Computer Ethics and Information Security | Scoop.it
PM Narendra Modi urges IT industry to develop cyber security solutions
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Hacked Fridges Aren't the Internet of Things' Biggest Worry - Wired

Hacked Fridges Aren't the Internet of Things' Biggest Worry - Wired | Computer Ethics and Information Security | Scoop.it
It's not the internet-connected fridge itself that's valuable to hackers. It's the data the fridge has on you.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

The evolution of hacking - CNN

The evolution of hacking - CNN | Computer Ethics and Information Security | Scoop.it
Computer hacking was once the realm of curious teenagers. It's now the arena of government spies, professional thieves and soldiers of fortune.
more...
No comment yet.
Scooped by Matthew *Matt Warren
Scoop.it!

Cyber threats on financial institutions

Cyber threats on financial institutions | Computer Ethics and Information Security | Scoop.it
Could we be heading towards a cyber hack that shutters our financial system?It's a scary thought, but Ben Lawsky, New York's First Superintendent of Financial Services, says our banks and insurers ...
more...
No comment yet.