CyberSecurity


WhatsApp Discovers Major Security Loophole

WhatsApp Discovers Major Security Loophole

Here's what you need to know about WhatsApp's major security flaw.



Location Data of Some Twitter Users Leaked

Location Data of Some Twitter Users Leaked

A bug in the iOS Twitter app impacted the privacy of its users.

Crypto Exchange Service to Revamp Security Measures Following Hack

Crypto Exchange Service to Revamp Security Measures Following Hack

Binance is making significant security changes after 7,000 Bitcoins were stolen.

Microsoft Introduces ElectionGuard to Boost Election Security and Verifiability

Microsoft Introduces ElectionGuard to Boost Election Security and Verifiability

Microsoft has announced a new platform called ElectionGuard, which aims to increase election security and transparency.

Technology Companies’ Role in the Adoption of Total Cyber Protection for SMBs

Technology Companies’ Role in the Adoption of Total Cyber Protection for SMBs

Technology is providing small and medium-sized businesses (SMBs) of all industries a tremendous opportunity to grow and better manage their business.

Younger Generations May Be Overconfident About Cybersecurity, Survey Suggests

Younger Generations May Be Overconfident About Cybersecurity, Survey Suggests

People who belong to Generation Z may be overconfident about their online account security, suggests a recent survey commissioned by Google

Can Your Business Survive Being Hacked?

Can Your Business Survive Being Hacked?

Find out how you should respond to being hacked.

U.K. Reveals New Law to Improve IoT Security

U.K. Reveals New Law to Improve IoT Security

The U.K. government is looking to step up IoT security against cybercriminals.

D.C. Metro Vulnerable to Cyber Attacks

D.C. Metro Vulnerable to Cyber Attacks

The inspector general believes D.C.'s transportation system is at a higher risk of cybersecurity attacks.

Security at Scale—With Great Success Often Comes Great Security Problems

Security at Scale—With Great Success Often Comes Great Security Problems

Some common areas and issues to keep growing your business, not your security risk.

Army Considers More Multi-Factor Authentication Measures

Army Considers More Multi-Factor Authentication Measures

The U.S. Army is working toward adding more authentication measures to provide more options to access Army online resources while maintaining information technology system security.

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Hospitals are often in the news due to data breaches, and email hacks are often the cause.

How to Execute a SOC 2 Report — From Planning to Distribution

How to Execute a SOC 2 Report — From Planning to Distribution

Many companies are employing System and Organization Controls reports before procuring vendors' services.

This California Health Network Was Just Hacked for the Third Time

This California Health Network Was Just Hacked for the Third Time

What went wrong?

Six Updates Companies Need to Make to Modernize Their Cybersecurity

Six Updates Companies Need to Make to Modernize Their Cybersecurity

Six things you can do to be proactive against potential cyber crimes.

Are Voice-Enabled Devices Prioritizing Convenience Over Security?

Are Voice-Enabled Devices Prioritizing Convenience Over Security?

Are voice-enabled devices making you more vulnerable to cyberattack?

Airlines Are The Next Big Targets For Cybercrime

Airlines Are The Next Big Targets For Cybercrime

No one really knows why airlines have become a target as of late but with the rate of attacks this high, something is definitely going on.

Data Exposed on Amazon Cloud Service: Facebook Has Messed Up Again

Data Exposed on Amazon Cloud Service: Facebook Has Messed Up Again

Facebook is in trouble again.

10 Tips for Keeping Your Personal Data Safe on Social Media

10 Tips for Keeping Your Personal Data Safe on Social Media

Strong passwords, two-factor authentication and good cyber hygiene will keep your personal information protected while browsing popular social media accounts.

Toyota and Lexus Dealerships Hacked, Millions Left Vulnerable

Toyota and Lexus Dealerships Hacked, Millions Left Vulnerable

Toyota's servers in Japan have been hacked, leaving millions of pieces of data left vulnerable.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

  • Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

    Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines. Read Now

  • Survey: 79 Percent of U.S. Business Leaders Using AI to Enhance Fraud Prevention Efforts

    The US economy is facing a significant surge in online fraud, with nearly 90% of business leaders reporting it costs them up to 9% of their annual revenue. This is a key finding from the Veriff Fraud Industry Pulse Survey 2024, which surveyed hundreds of senior decision-makers and fraud leaders across various sectors in the US. Read Now

Webinars

Whitepapers

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3