Malware

Hiding in Plain Sight: Post-Breach

Gunter Ollmann writes: The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they’re frequently compiled from third-hand reports,...

Computer breach exposes personal records of Living Healthy Clinic patients

The names and other confidential information of about 3,000 clients of the Living Healthy Clinic were exposed as a result of a computer security breach In July. The clinic, operated by the University of Wisconsin-Oshkosh College of Nursing provides health services for uninsured Winnebago County residents. The university on Friday said an investigation determined...

Maine voter registration system breached

Kevin Miller reports: The Maine Secretary of State’s Office said Wednesday it is investigating a potential security breach in the computer system that contains records on Maine’s registered voters. The state was notified Wednesday afternoon by the cybersecurity monitoring arm of the U.S. Department of Homeland Security that Maine’s Central Voter Registration system had...