<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Deadly malware and other software</title>
	<atom:link href="http://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 08 Apr 2026 21:29:52 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/comment-page-1/#comment-1730353</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 22 Oct 2021 07:32:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186754#comment-1730353</guid>
		<description><![CDATA[Gartner predicts privacy law changes, consolidation of cybersecurity services and ransomware laws for next 4 years
Gartner analysts also think weaponized operational technology will result in human casualties by 2025.
https://www.zdnet.com/article/gartner-predicts-privacy-law-changes-consolidation-of-cybersecurity-services-and-ransomware-laws-for-next-4-years/

The predictions ranged from potential legislation to how the market for certain technologies will change from now until 2025. Gartner analysts predicted weaponized OT environments will result in human casualties by 2025 due to malware that they believe will spread at &quot;wirespeeds.&quot; The analysts say by that time, cybercriminals will shift from business disruption to physical harm, leading to regulations placing liability on CEOs. 

For 2023, Gartner expects 75% of the world to be covered under some kind of privacy law with built-in subject rights requests and consent. The key, they said, will be whether privacy management programs can be automated.]]></description>
		<content:encoded><![CDATA[<p>Gartner predicts privacy law changes, consolidation of cybersecurity services and ransomware laws for next 4 years<br />
Gartner analysts also think weaponized operational technology will result in human casualties by 2025.<br />
<a href="https://www.zdnet.com/article/gartner-predicts-privacy-law-changes-consolidation-of-cybersecurity-services-and-ransomware-laws-for-next-4-years/" rel="nofollow">https://www.zdnet.com/article/gartner-predicts-privacy-law-changes-consolidation-of-cybersecurity-services-and-ransomware-laws-for-next-4-years/</a></p>
<p>The predictions ranged from potential legislation to how the market for certain technologies will change from now until 2025. Gartner analysts predicted weaponized OT environments will result in human casualties by 2025 due to malware that they believe will spread at &#8220;wirespeeds.&#8221; The analysts say by that time, cybercriminals will shift from business disruption to physical harm, leading to regulations placing liability on CEOs. </p>
<p>For 2023, Gartner expects 75% of the world to be covered under some kind of privacy law with built-in subject rights requests and consent. The key, they said, will be whether privacy management programs can be automated.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/comment-page-1/#comment-1696106</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 29 Oct 2020 09:09:44 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186754#comment-1696106</guid>
		<description><![CDATA[Itäeurooppalaiset rikolliset sairaaloiden kimpussa kiristyshaittaohjelmilla – ”voi johtaa potilaiden kuolemiin”
https://www.tivi.fi/uutiset/tv/24196353-70a1-4a02-be4e-6e09c8b0fea9]]></description>
		<content:encoded><![CDATA[<p>Itäeurooppalaiset rikolliset sairaaloiden kimpussa kiristyshaittaohjelmilla – ”voi johtaa potilaiden kuolemiin”<br />
<a href="https://www.tivi.fi/uutiset/tv/24196353-70a1-4a02-be4e-6e09c8b0fea9" rel="nofollow">https://www.tivi.fi/uutiset/tv/24196353-70a1-4a02-be4e-6e09c8b0fea9</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/comment-page-1/#comment-1693902</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 05 Oct 2020 06:11:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186754#comment-1693902</guid>
		<description><![CDATA[Other hospitals get attached:

Hacked Hospital Chain Says All 250 US Facilities Affected
https://www.securityweek.com/hacked-hospital-chain-says-all-250-us-facilities-affected

The hospital chain Universal Health Services said Thursday that computer services at all 250 of its U.S. facilities were hobbled in last weekend’s malware attack and efforts to restore hospital networks were continuing.

Doctors and nurses at affected hospitals and clinics, many already burdened with coronavirus care, have had to rely on manual record-keeping, with lab work slowed. Employees have described chaotic conditions impeding patient care.

The chain has not commented on reports it was hit by ransomware, though its description of the attack in a statement Thursday was consistent with malware variety that encrypts data into gibberish that can only be restored with software keys after ransoms are paid.

King of Prussia, Pennsylvania-based UHS said its “systems were quickly disconnected and the network was shut down in order to prevent further propagation.”

The company, with 90,000 employees, said electronic medical records systems were not impacted by the attack and it was making steady progress restoring and reconnecting systems.

UHS Shuts Down Systems in U.S. Hospitals Following Cyberattack
https://www.securityweek.com/uhs-shuts-down-systems-us-hospitals-following-cyberattack

Universal Health Services (UHS) over the weekend shut down the IT networks at multiple hospitals in the United States, after being hit with a cyberattack.

A Fortune 500 company operating more than 400 facilities in the United States, Puerto Rico, and the United Kingdom, the healthcare services provider has approximately 90,000 employees and claimed an annual revenue of $11.4 billion for 2019.]]></description>
		<content:encoded><![CDATA[<p>Other hospitals get attached:</p>
<p>Hacked Hospital Chain Says All 250 US Facilities Affected<br />
<a href="https://www.securityweek.com/hacked-hospital-chain-says-all-250-us-facilities-affected" rel="nofollow">https://www.securityweek.com/hacked-hospital-chain-says-all-250-us-facilities-affected</a></p>
<p>The hospital chain Universal Health Services said Thursday that computer services at all 250 of its U.S. facilities were hobbled in last weekend’s malware attack and efforts to restore hospital networks were continuing.</p>
<p>Doctors and nurses at affected hospitals and clinics, many already burdened with coronavirus care, have had to rely on manual record-keeping, with lab work slowed. Employees have described chaotic conditions impeding patient care.</p>
<p>The chain has not commented on reports it was hit by ransomware, though its description of the attack in a statement Thursday was consistent with malware variety that encrypts data into gibberish that can only be restored with software keys after ransoms are paid.</p>
<p>King of Prussia, Pennsylvania-based UHS said its “systems were quickly disconnected and the network was shut down in order to prevent further propagation.”</p>
<p>The company, with 90,000 employees, said electronic medical records systems were not impacted by the attack and it was making steady progress restoring and reconnecting systems.</p>
<p>UHS Shuts Down Systems in U.S. Hospitals Following Cyberattack<br />
<a href="https://www.securityweek.com/uhs-shuts-down-systems-us-hospitals-following-cyberattack" rel="nofollow">https://www.securityweek.com/uhs-shuts-down-systems-us-hospitals-following-cyberattack</a></p>
<p>Universal Health Services (UHS) over the weekend shut down the IT networks at multiple hospitals in the United States, after being hit with a cyberattack.</p>
<p>A Fortune 500 company operating more than 400 facilities in the United States, Puerto Rico, and the United Kingdom, the healthcare services provider has approximately 90,000 employees and claimed an annual revenue of $11.4 billion for 2019.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/comment-page-1/#comment-1693817</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 03 Oct 2020 17:08:55 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186754#comment-1693817</guid>
		<description><![CDATA[UK, US hospital computers are down, early unofficial diagnosis is a suspected outbreak of Ryuk ransomware
We&#039;ve switched to back-up offline procedures, says Universal Health Services
https://www.theregister.com/2020/09/28/united_health_services_ransomware/]]></description>
		<content:encoded><![CDATA[<p>UK, US hospital computers are down, early unofficial diagnosis is a suspected outbreak of Ryuk ransomware<br />
We&#8217;ve switched to back-up offline procedures, says Universal Health Services<br />
<a href="https://www.theregister.com/2020/09/28/united_health_services_ransomware/" rel="nofollow">https://www.theregister.com/2020/09/28/united_health_services_ransomware/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/comment-page-1/#comment-1693416</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 05:50:09 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186754#comment-1693416</guid>
		<description><![CDATA[UK, US hospital computers are down, early unofficial diagnosis is a
suspected outbreak of Ryuk ransomware
https://www.theregister.com/2020/09/28/united_health_services_ransomware/
We&#039;ve switched to back-up offline procedures, says Universal Health
Services. Universal Health Services, which operates over 400 hospitals
and healthcare facilities in the US, Puerto Rico, and the UK, said on
Monday that its IT network was offline due to an unspecified
cybersecurity issue.]]></description>
		<content:encoded><![CDATA[<p>UK, US hospital computers are down, early unofficial diagnosis is a<br />
suspected outbreak of Ryuk ransomware<br />
<a href="https://www.theregister.com/2020/09/28/united_health_services_ransomware/" rel="nofollow">https://www.theregister.com/2020/09/28/united_health_services_ransomware/</a><br />
We&#8217;ve switched to back-up offline procedures, says Universal Health<br />
Services. Universal Health Services, which operates over 400 hospitals<br />
and healthcare facilities in the US, Puerto Rico, and the UK, said on<br />
Monday that its IT network was offline due to an unspecified<br />
cybersecurity issue.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/comment-page-1/#comment-1693415</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 05:49:50 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186754#comment-1693415</guid>
		<description><![CDATA[UHS hospitals hit by reported country-wide Ryuk ransomware attack
https://www.bleepingcomputer.com/news/security/uhs-hospitals-hit-by-reported-country-wide-ryuk-ransomware-attack/
Universal Health Services (UHS), a Fortune 500 hospital and healthcare
services provider, has reportedly shut down systems at healthcare
facilities around the US after a cyber-attack that hit its network
during early Sunday morning. UHS operates over 400 healthcare
facilities in the US and the UK, has more than 90, 000 employees and
provides healthcare services to approximately 3.5 million patients
each year.]]></description>
		<content:encoded><![CDATA[<p>UHS hospitals hit by reported country-wide Ryuk ransomware attack<br />
<a href="https://www.bleepingcomputer.com/news/security/uhs-hospitals-hit-by-reported-country-wide-ryuk-ransomware-attack/" rel="nofollow">https://www.bleepingcomputer.com/news/security/uhs-hospitals-hit-by-reported-country-wide-ryuk-ransomware-attack/</a><br />
Universal Health Services (UHS), a Fortune 500 hospital and healthcare<br />
services provider, has reportedly shut down systems at healthcare<br />
facilities around the US after a cyber-attack that hit its network<br />
during early Sunday morning. UHS operates over 400 healthcare<br />
facilities in the US and the UK, has more than 90, 000 employees and<br />
provides healthcare services to approximately 3.5 million patients<br />
each year.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/comment-page-1/#comment-1693268</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 18:59:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186754#comment-1693268</guid>
		<description><![CDATA[Major hospital system hit with cyberattack, potentially largest in U.S. history
https://www.nbcnews.com/tech/security/cyberattack-hits-major-u-s-hospital-system-n1241254?utm_source=facebook&amp;utm_medium=news_tab&amp;utm_content=algorithm

Computer systems for Universal Health Services, which has more than 400 locations, primarily in the U.S., began to fail over the weekend.

A major hospital chain has been hit by what appears to be one of the largest medical cyberattacks in United States history.

Computer systems for Universal Health Services, which has more than 400 locations, primarily in the U.S., began to fail over the weekend, and some hospitals have had to resort to filing patient information with pen and paper, according to multiple people familiar with the situation.]]></description>
		<content:encoded><![CDATA[<p>Major hospital system hit with cyberattack, potentially largest in U.S. history<br />
<a href="https://www.nbcnews.com/tech/security/cyberattack-hits-major-u-s-hospital-system-n1241254?utm_source=facebook&#038;utm_medium=news_tab&#038;utm_content=algorithm" rel="nofollow">https://www.nbcnews.com/tech/security/cyberattack-hits-major-u-s-hospital-system-n1241254?utm_source=facebook&#038;utm_medium=news_tab&#038;utm_content=algorithm</a></p>
<p>Computer systems for Universal Health Services, which has more than 400 locations, primarily in the U.S., began to fail over the weekend.</p>
<p>A major hospital chain has been hit by what appears to be one of the largest medical cyberattacks in United States history.</p>
<p>Computer systems for Universal Health Services, which has more than 400 locations, primarily in the U.S., began to fail over the weekend, and some hospitals have had to resort to filing patient information with pen and paper, according to multiple people familiar with the situation.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/comment-page-1/#comment-1692873</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 16:50:02 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186754#comment-1692873</guid>
		<description><![CDATA[Bentsi Ben-Atar, a prominent cybersecurity expert, and chief marketing officer at Sepio Systems, says that it “only takes a number of highly publicized attacks” to drive significant budget increases in cybersecurity.

Why is your personal health information worth 350 dollars on the black market?
https://cybernews.com/editorial/why-is-your-personal-health-information-worth-350-dollars-on-the-black-market/?utm_source=facebook&amp;utm_medium=cpc&amp;utm_campaign=rm&amp;utm_content=health_information_350_dollars

A woman who died in Duesseldorf University Hospital during a ransomware attack might be the first victim linked to a cyberattack on a hospital. Bentsi Ben-Atar, a prominent cybersecurity expert, and chief marketing officer at Sepio Systems, says that it “only takes a number of highly publicized attacks” to drive significant budget increases in cybersecurity. At the moment, the healthcare system worldwide doesn’t invest enough to shield themselves from cyberattacks.]]></description>
		<content:encoded><![CDATA[<p>Bentsi Ben-Atar, a prominent cybersecurity expert, and chief marketing officer at Sepio Systems, says that it “only takes a number of highly publicized attacks” to drive significant budget increases in cybersecurity.</p>
<p>Why is your personal health information worth 350 dollars on the black market?<br />
<a href="https://cybernews.com/editorial/why-is-your-personal-health-information-worth-350-dollars-on-the-black-market/?utm_source=facebook&#038;utm_medium=cpc&#038;utm_campaign=rm&#038;utm_content=health_information_350_dollars" rel="nofollow">https://cybernews.com/editorial/why-is-your-personal-health-information-worth-350-dollars-on-the-black-market/?utm_source=facebook&#038;utm_medium=cpc&#038;utm_campaign=rm&#038;utm_content=health_information_350_dollars</a></p>
<p>A woman who died in Duesseldorf University Hospital during a ransomware attack might be the first victim linked to a cyberattack on a hospital. Bentsi Ben-Atar, a prominent cybersecurity expert, and chief marketing officer at Sepio Systems, says that it “only takes a number of highly publicized attacks” to drive significant budget increases in cybersecurity. At the moment, the healthcare system worldwide doesn’t invest enough to shield themselves from cyberattacks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/comment-page-1/#comment-1692628</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 23 Sep 2020 13:06:06 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186754#comment-1692628</guid>
		<description><![CDATA[A Brief History of: The killer Therac-25 Radiotherapy machine (Short Documentary)
https://www.youtube.com/watch?v=-7gVqBY52MY

Today we are looking at the Therac-25 Radiotherapy unit and its victims, however unlike other radiotherapy units on this channel the death toll was equated to a fault with the units software giving dangerous doses of radiation.]]></description>
		<content:encoded><![CDATA[<p>A Brief History of: The killer Therac-25 Radiotherapy machine (Short Documentary)<br />
<a href="https://www.youtube.com/watch?v=-7gVqBY52MY" rel="nofollow">https://www.youtube.com/watch?v=-7gVqBY52MY</a></p>
<p>Today we are looking at the Therac-25 Radiotherapy unit and its victims, however unlike other radiotherapy units on this channel the death toll was equated to a fault with the units software giving dangerous doses of radiation.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/18/deadly-malware-and-other-software/comment-page-1/#comment-1692611</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 23 Sep 2020 09:15:50 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186754#comment-1692611</guid>
		<description><![CDATA[https://fortune.com/2020/09/18/ransomware-police-investigating-hospital-cyber-attack-death/]]></description>
		<content:encoded><![CDATA[<p><a href="https://fortune.com/2020/09/18/ransomware-police-investigating-hospital-cyber-attack-death/" rel="nofollow">https://fortune.com/2020/09/18/ransomware-police-investigating-hospital-cyber-attack-death/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
