Cloud Computing: The Fall of Hospital Datacenters

Hospital datacenters could go the way of rotary phones and VCRs in the very near future, as brick and mortar make way for the cheaper and more convenient cloud.

John Halamka, MD, CIO of Count Beth Israel Deaconess Medical Center predicts that the centers could become obsolete within the next five years, stating that the healthcare industry is “going to go out to the cloud to find EHRs, clinical decision support, analytics.”  And the shift has already begun.  

Read More

A Cybersecurity Storm Is Hammering Your Roof. Will You Find The Leaks Before It’s Too Late?

There’s a cybersecurity storm hammering your roof, will you find and fix the leaks in your network before they cause major damage?

If you’re a homeowner, then you know that leaks are inevitable. No matter what you do your roof is going to have some soft spots due to simple wear and tear. If there’s a storm and one of those spots begins leaking, you better hope that you spot it soon, because if you don’t you’ll be pulling your hair out down the road. Let’s say that the leak opens up and water begins dripping into your attic insulation.

Read More

New Kind Ransomware, Scareware, on Safari

Have you ever gotten a popup window while using Safari on your iPhone or iPad, telling you that you have to pay a fee to regain access to your browser? Leaving aside any judgment on the kinds of websites or online activities you that are usually involved that result in getting it, if you’ve seen that, your device has been infected with ransomware.

Read More

Updated Ransomware Plays Hide and Seek

Cerber is one of the more popular variations of ransomware. A new version has been detected, and it has a few new tricks up its sleeve.

The latest version of Cerber extracts itself from a hacker-owned Dropbox account. The self-extraction makes it look safe to machine-learning tools, which is one way it avoids detection. It also checks to see if it’s installing itself onto a virtual machine, which cybersecurity companies use to detect and study malware. If Cerber sees that it is being installed on a virtual machine, it stops the installation, making it harder for the good guys to fight it.

Read More
  • 1
  • 2