Home | Login      
Hackers encrypt medical centre's entire database, demand ransom
 
Miami Family Medical Centre is reportedly considering paying a ransom demand after blackmailers broke into the organisation’s servers and encrypted its entire patient database. More... http://www.abc.net.au/news/2012-12-10/hackers-target-gold-coast-medical-centre/4418676 Are your databases protected?... (more)
 
 
 
Oracle Security Patches
 
After a record-setting week of Microsoft security patches, Oracle is gearing up for a major update of its own next week. On Tuesday, Oracle will release its quarterly Critical Patch Update, which "contains 38 security vulnerability fixes across hundreds of Oracle products," according to an advance notification posted to Oracle's Web site. As usual, Oracle's most-patched product next week will be its flagship database, which will get 16 bug fixes. Six of these flaws may be exploitable over ... (more)
 
 
 
Will MySQL Survive
 
Will Oracle kill MySQL or slowly fold it into its own database? Common sense suggests that Oracle will gain in the database space from owning MySQL. Sun had a huge SMB base for this product and a steady revenue stream of about 3% of its revenues accrued from this product. MySQL represents an opportunity for Oracle to garner additional revenue from the subscription license base but the company needs to position MySQL clearly in the context of its existing database offerings. MySQL will also give ... (more)
 
 
 
Facebook Security Concerns
 
Security firm Trend Micro has been researching malicious practices on Facebook, and has discovered numerous rogue apps on the social networking site. They've been alerting Facebook of them as they find them, but apparently more keep popping up as fast as they are eliminated. The apps come cleverly disguised, as the most effective phishing attacks do. With all of the apps circulating around Facebook, it's got to be pretty difficult to keep track of which are legitimate. Perhaps even scarier is... (more)
 
 
 
Are You Ready to Comply with the New Massachusetts Data Security Regulations?
 
The Massachusetts data security regulations are coming. ARE YOU READY? Hear Massachusetts Attorney General Martha Coakley address the sweeping changes that are in store when the law goes into effect in January 2010. Register for a special IAPP preconference workshop, The New Massachusetts Privacy Law: What Does It Mean for You? on Wednesday, September 16. If this strikes a cord, you may want to stay for a special breakout session on Thursday, Massachusetts Data Security Regulations: ... (more)
 
 
 
What is Cloud Computing?
 
Cloud computing is the latest inflexion point that corporare CIOs must consider when planning how to develop and deploy new services and applications. This is important to SoftTree because database technology and administration processes must evolve as new computing models emerge, inevitably raising questions about selecting the right database technology to match the new requirements. In this first of serveral posts, I'll define what SoftTree understands the "the cloud" to represent. The clo... (more)
 
 
 
Security in the Cloud
 
I just read this week that the city of LA is considering the use of Google Apps for storing and processing government data rather than upgrading their internal IT infrastructure. Will data stored by the government at the cloud come back to bite us in the shorts? This is really an interesting announcement, especially in light of the recent Twitter incident and the breach at Network Solutions. Cloud services are slowly making their way into mainstream business. EMC, HP and IBM are aggressively ... (more)
 
 
 
Three Face Jail Time for HIPAA Violations
 
For years the HIPAA regulations have been criticized as “lacking any teeth” because no one had ever been sentenced to prison. That perception may change in the not too distant future. Two former hospital employees and a doctor plead guilty to misdemeanor violations of the Health Insurance Portability and Accountability Act (HIPAA) in a Little Rock federal court yesterday, reports ArkansasBusiness.com. They were accused of inappropriately accessing the medical files of Anne Press... (more)
 
 
 
New Biometrics Law Proposed
 
A law that would establish a database for storing the biometric data of all Israeli citizens was approved for second and third readings by a legislative committee yesterday, reports Israeli National News. The Biometric Documents Identification Law would require every Israeli to submit fingerprints and facial profiles to the government. The information would be stored in an Interior Ministry database and would also be embedded into Israelis' identity documents. Government offici... (more)
 
 
 
Another Medical Records Breach
 
A couple of weeks ago I wrote about medical identity theft. As Johns Hopkins is a DB Audit Expert customer, I was curious to understand the motivation for the rash of recent medical records breaches. It’s been a very busy summer for hackers targeting healthcare providers. All indications are that they’ve found a fertile hunting ground. The University of California-San Diego Moores Cancer Center is the latest victim to go public. Hackers broke into UCSD's Moores Cancer Center c... (more)
 
 
 
 
Category:  
 
 
      December 2012 (1)
      October 2009 (1)
      August 2009 (5)
      July 2009 (5)
      June 2009 (7)
      May 2009 (10)
      April 2009 (3)