Medical data is slowly but surely migrating from paper mediums to the digital infrastructure of medical institutions. Today, the data is “scattered” across databases, portals, medical equipment, etc. In some cases, the security of the network infrastructure of such organizations is neglected, and resources that process medical information are accessible from outside sources.
Tag:
vulnerability
0day #vulnerability in Tor Browser, that allows to deanonymize #Tor users https://t.co/V4kw60XhBO
— Denis Makrushin (@difezza) 30 ноября 2016 г.
In Q2 2016, Attempted infections by financial #malware were registered on 1.1M user computers #KLreport #banking https://t.co/CrghHfIgCC
— Denis Makrushin (@difezza) 11 августа 2016 г.