EFF Urges FTC to Address American Resellers of Malware on Android TV Set-Top Boxes

The Electronic Frontier Foundation (EFF) has asked the Federal Trade Commission (FTC) to halt sales of Android TV boxes and mobile devices pre-infected with malware by AllWinner and RockChip. Resold by Amazon and AliExpress, the devices pose deceptive conduct risks and connect to a click-fraud network upon internet connection. Furthermore, the malware uses buyers’ internet […]

How one gastroenterology practice uses hybrid virtual care to improve patient experience

Gastroenterology Associates of New Jersey is addressing increasing patient demand and decreasing reimbursement by implementing virtual care. CEO Dr. George Pavlou highlighted the value of patient management beyond in-person consultations, such as dietary changes and behavioral interventions. Virtual consultations facilitate this continuous care, enabling frequent touchpoints with dietitians or psychologists, which are central to managing […]

Providence implements FHIR to support value-based care

Providence Health System has become the first US health system to use the Clinical Data Exchange specifications by the Da Vinci Project HL7 to build a data-as-a-service platform. The platform uses national data exchange standards to enable health systems, payers, and patients to exchange treatment plans, patient records and other relevant information. Providence worked with […]

Data Ethics: Balancing Privacy and Innovation in the Digital Age | by HitaRasa | Nov, 2023

Data and innovation go hand-in-hand, with data-driven advancements seen in healthcare, transportation, and more. However, as data collection grows, so does concerns about privacy and data safety. To address these worries, businesses are prioritizing privacy, with a Cisco survey revealing 94% of 4700 security professionals indicating their customers would not buy from them if their […]

Pro-Palestinian TA402 APT Using IronWind Malware in New Attack

Middle Eastern hacker group TA402, also known as Molerats and Gaza Cybergang, has launched a phishing campaign against Israeli entities, distributing malware via disguised email attachments. The group has been using IronWind, a sophisticated malware downloader, to sneak past security measures. It allows attackers to load additional malware such as keyloggers to steal data. TA402 is […]

Pro-Palestinian APT Using IronWind Malware in New Attack

An advanced persistent threat (APT) group, known as TA402 and supported by pro-Palestinian entities, has been conducting a phishing campaign against Israeli individuals and organizations. The group has been distributing IronWind malware through official-looking email attachments related to the Gulf Cooperation Council’s Economic Cooperation Program. The malware, which allows for the loading of additional malware […]

Google suing scammers for fake Bard AI downloading malware

Google has filed a lawsuit against scammers using advertising related to artificial intelligence (AI) to steal social media passwords from small businesses. The ad campaigns ask users to download the AI chatbot, Bard, which is actually malware that compromises their social media accounts. The company aims to stop these scammers from setting up malicious domains […]

A Look at Medicaid Enrollment and Spending Trends and an Array of Policy Issues Amid Unwinding of the Continuous Enrollment Provision

A webinar was held to discuss Medicaid trends, challenges, policies and the unwinding of pandemic measures. Organized by KFF and the National Association of Medicaid Directors (NAMD), it looked at expected changes in Medicaid enrollment and spending. Topics included provider reimbursement rates, workforce challenges, behavioral health coverage and health disparities.

Businesses worry more about reputational damage than financial loss following a breach

A report by Illumio found that nearly half of all data breaches in the last year originated in the cloud, resulting in businesses losing an average of $4.1M per breach. The survey revealed businesses are most concerned about reputational damage, loss of sensitive data, and disruption to revenue-generating services. Meanwhile, threats to cloud security primarily […]