CyberSecurity


Cybersecurity around the World

Cybersecurity around the World

Cybersecurity isn’t just a trending topic in the United States. See how countries around the world are responding to cyber breaches.



The Scary Wi-Fi Name that Delayed a Flight

The Scary Wi-Fi Name that Delayed a Flight

An Australian-based airline was forced to delay a flight after someone decided to take Wi-Fi naming to a threatening level.

Blackberry

Despite Data Security Fears, One in Six Android Users Don’t Even Know About Android Security Patches: BlackBerry Survey

There are currently 1.4 billion active Android devices worldwide, but what about the users behind them? Do they know about security patches and who is responsible for securing their device? How do they feel about privacy?

Facebook Pays 10-Year Boy $10,000 for Exposing Instagram Flaw

Facebook Pays 10-Year Boy $10,000 for Exposing Instagram Flaw

A 10-year old boy was paid $10,000 by Facebook for exposing their vulnerability in Instagram.

Passwords Extinct as Authentication Goes Mobile

Passwords Extinct as Authentication Goes Mobile

AT&T hopes to inform the public on authentication processes using World Password Day.

Millions of Stolen Email Credentials Shared Online

Millions of Stolen Email Credentials Shared Online

A Russian hacker has exposed email credentials from several email services including Gmail, Yahoo and Microsoft Outlook.

Fraudsters Steal Tax Data from ADP

Fraudsters Steal Tax Data from ADP

ADP has confirmed that identity thieves have accessed W-2 data of its customers, but says it isn’t their fault.

Researchers Uncover Connected Home Security Flaws

Researchers Uncover Connected Home Security Flaws

Multiple vulnerabilities have been discovered in Samsung SmartThings, which could give attackers the virtual key to your home.

German Nuclear Plan Suffers from Cyber Attack

German Nuclear Power Plant Suffers from Cyber Attack

The cyber attack was designed to give hackers remote access to the facilities.

Security Concerns Raised Over Presidential Campaign Apps

Security Concerns Raised Over Presidential Campaign Apps

A computer-security firm has raised concerns over the campaign apps of presidential candidates Ted Cruz and John Kasich.

IoT Security Spending to Skyrocket in 2016

IoT Security Spending to Skyrocket in 2016

Gartner predicts worldwide security spending on the Internet of Things to reach high amounts this year.

FBI Paid Over $1 Million to Break into iPhone

FBI Paid Over $1 Million to Break into iPhone

The FBI was finally able to extract the data from the San Bernardino attacker’s iPhone, but was it worth the price?

Visa Wants to Make your Chip Credit Card Purchase Faster

Visa Wants to Make your Chip Credit Card Purchase Faster

Visa is working on a solution to trim seconds off the time it takes to purchase something using the new chip-enabled credit cards.

U.S. and Russia Meet on Cybersecurity

U.S. and Russia Meet on Cybersecurity

The United States and Russia are meeting to discuss cybersecurity, and hopefully prevent a cyber war.

Businesses Need Education on Cloud Security

Businesses Need Education on Cloud Security

Based on research done by Intel Security, there is a c-level blind spot when it comes to the vulnerabilities of the cloud.

CBS Sports App Left User Data Vulnerable During March Madness

CBS Sports App Left User Data Vulnerable During March Madness

Fans of the college basketball tournament, March Madness, may need to pay special attention to the information they shared on the CBS Sports app and website during the popular event.

Forget Apple vs. FBI: WhatsApp Encrypts Messages for All Users

Forget Apple vs. FBI: WhatsApp Encrypts Messages for All Users

Messaging app, WhatsApp, has made a move to encrypt all messages sent and received on their platform.

The Biggest Data Leak in History

The Biggest Data Leak in History

The Panama Papers, recently leaked by an anonymous source, is the biggest data breach in history.

IoT At ISC

IoT At ISC

There going to be a ton of new products at this year’s ISC West show, especially internet driven devices.

Dovetailing Cybersecurity into an IoT World

Dovetailing Cybersecurity into an IoT World

When it comes to cybersecurity the world falls into two camps: those focused on securing their hardware and applications as a closed system, and those who recognize that converging technologies calls for a more ecosystem-centric approach.

Featured

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

  • Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

    Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines. Read Now

Webinars

Whitepapers

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3