What is malvertising?

Posted on January 11, 2017 by

Malvertising, a portmanteau of “malicious” and “advertising” has quickly become popular with bad guys everywhere. Its first appearance was detected in 2007, and it’s been on the rise ever since. What makes this form of malware so popular? Malvertising is more dangerous than typical malware because as an end user, you could be a victim without knowing it. According to Elad Sharf of Websense, malvertising attracts hackers because “they can easily spread across a large number of legitimate websites without …

We’ve already talked about the need to invest in an IT security budget as a best practice for business. Whether that’s an alarm for the door, a safe to guard money, or a firewall behind its network systems, security helps people and organizations sleep better at night. But even with a lock on the door, burglars can still find a way to get in. The same goes for the security of your data. We’ve all heard of the data breaches of Target, …

What is social engineering? It’s the art of manipulation that relies heavily on human interaction and psychology to trick people into revealing sensitive information about themselves or others. Social engineering works to exploit the human inclination to trust others, and for that reason, it’s one of the most dangerous and murky threats facing organizations today. Think about it—why waste time trying to crack a password that could take hours or days, when you could get someone at the company to …

Mark Stanislav’s title is “Security Evangelist.” Online Tech has previously provided him a virtual pulpit from which to preach and his barnstorming tour continued last week in Las Vegas, where he spoke at the recently concluded DEF CON 22 Hacker Conference. Stanislav and Duo Security colleague Zach Lanier presented “The Internet of Fails: Where IoT Has Gone Wrong and How We’re Making it Right,” described as a dive into research, outcomes and recommendations regarding information security for the “Internet of …

In contrast to the unseasonably cold weather Columbus, Ohio, has experienced of late, this week’s InfoSec Summit kicked off in bright purple ‘Aloha’ style with Jim Manico’s recommendations for improving web application security. Only one other attendee could match his shirt color, but none were equal to the energy with which Jim highlighted some serious software security concerns. No, this wasn’t a dig on the software developers who face an incredibly daunting tempest of deadlines, budget constraints and requirements as …

More and more healthcare organizations are allowing employees to connect their own mobile devices to their network, but more than half are not confident those devices are secure. According to the Ponemon Institute’s fourth annual Benchmark Study on Patient Privacy and Data Security, Bring Your Own Device (BYOD) programs usage continues to rise despite concerns about employee negligence and the use of insecure mobile devices. According to the study: “…88 percent of organizations permit employees and medical staff to use …

BY TATIANA MELNIK Health IT Attorney As the clock struck midnight on New Year’s Eve, it was already clear that 2014 was shaping up to be an exciting year for all things healthcare IT. With enforcement actions squarely on the heels of the new year, the on-going healthcare-related data breach litigation (and a renewed focus on data breaches from federal legislators because of the Target incident), the upcoming ICD-10 conversion deadline, the continued move to BYOD, and the growth of …

There’s much to talk about here at the mHealth summit in National Harbor, MD. Here’s a peek at what we’ve been hearing thus far today: Opening Remarks: Sharon D. Agostino, VP Corporate Citizenship, Johnson & Johnson. Sharon spoke about Johnson & Johnson’s participation in MAMA (Mobile Alliance for Maternal Action), a mobile health initiative that sends expecting mothers mobile information throughout their pregnancy and the first year after childbirth to help bolster confidence and have the right conversations with their …

Breakout Session 11-12 Monday: The Role of Patient Privacy & Security Innovations Kenneth A. Kleinberg, Managing Director, Research & Insights Ed Ricks (Beauford Memorial Hospital) There’s always a question of the tipping point, and with EMR, we’ve reached this point. Mobile health is transitioning from an optional thing to integrated and mandatory. With new technologies, the applications and the promise lead, and the management lags, and I think in this space it’s true. 5 categories of mobile health use: Access/interaction …

Good morning from chilly National Harbor! Around 5,000 people are expected to be here today for the 5th annual mHealth Summit. Today’s morning keynote was given by Rick Valencia, VP of Qualcomm Life: Mobile is the largest health and wellness platform today. Many of the conversations at these summits in previous years were more focused on many of the problems revolving around mobile health; the fears and dangers. Now people are talking more about solutions for these issues, which is …

Get started now. Exceptional service awaits.

Live Chat