Could Russia’s Ukraine Cyberattacks Clue Global Threat?
The Russian military-backed cyber operatives, Sandworm, are reportedly behind last year’s devastating attack on Ukraine’s power grid, according to a report by cyber defence company Mandiant. The firm suggests that Ukraine’s plight could signify a broader, global threat and warns critical infrastructure owners to stay vigilant. Sandworm’s techniques are reportedly hard to detect and the […]
Keep it secret: Cloud data storage security approach taps quantum physics
Chinese researchers have combined quantum physics with mature cryptography and storage techniques to develop a cost-effective solution for secure data storage on the cloud. The method uses quantum random numbers as encryption keys and disperses them through Shamir’s secret sharing algorithm for secure transmission to distributed clouds. Apart from quantum security, the solution provides fault […]
Two More Medical Entities Added to Leak Site by NoEscape Gang
Would you believe it? Two health centres in the USA have found themselves in a right pickle with a cyber crook group called NoEscape. To make matters worse, the culprits claim both parties haven’t even bothered to respond. Southeastern Orthopaedic Specialists, based in North Carolina, are one of the unlucky ones. The rogues reckon they’ve […]
Theseus Pharma Lays Off Staff, Explores Options Months After Toxicity Scuttles Lead Drug
Theseus Pharmaceuticals is laying off 72% of its staff and exploring potential deals after its lead cancer drug revealed dose-limiting toxicities. The firm anticipates $5.5m in severance costs to be incurred this quarter. Despite the layoffs, Theseus still plans to further develop its pipeline, which could include treatments for lung cancer and other forms of […]
Why So Many Accidental Pregnancies Happen in Your 40s
Accidental pregnancies among women in their 40s, including those perceiving to be in menopause, are surprisingly common. Women are often misinformed about their fertility in the 40s, thinking that the risk of unplanned pregnancies abates. However, during perimenopause, ovaries can continue to sporadically ovulate despite irregular hormonal fluctuations and therefore retain the potential for conception. […]
FBI takes down IPStorm malware botnet as hacker behind it pleads guilty
The FBI has dismantled the IPStorm botnet proxy network and its infrastructure, following a plea deal with the hacker, Sergei Makinin. The botnet, first sighted in 2019, had infected thousands of Linux, Mac, and Android devices worldwide. Makinin used it to turn infected devices into proxies for profit, selling illegitimate access to the devices to […]
61% of organizations store sensitive data in multiple locations
A recent report on zero trust and data protection found that one in six organizations suffered multiple data losses in the last year.
Views on sharing mental health data for research purposes: qualitative analysis of interviews with people with mental illness | BMC Medical Ethics
The articles explore the challenges and opportunities of big data in healthcare, particularly mental health. The research discusses the potential of using analytics for high-risk patient management and the importance of data sharing for health benefits. It also highlights the barriers to participation in mental health research, such as privacy concerns. Furthermore, it underscores the […]
Pierce College Sued in Wake of Cyber Attack
Personal data of over 155,000 former students and staff of Pierce College was leaked on the dark web after a cyber attack. The college is accused of negligence for failing to protect sensitive details, including social security numbers and bank details. A student has filed a lawsuit against the district, which lawyers hope will be […]
The alarming cyber hack at ICBC
Ransomware recently hit ICBC Financial Services, a financial services arm of Industrial and Commercial Bank of China, preventing it from settling transactions in the $25tn US Treasury market. This incident highlights the urgent need for financial corporations and regulators to enhance their efforts on cyber security. With financial systems becoming further digitised, the risks and […]