CyberSecurity


Action Steps for Parents to Do Today to Protect Student Data

Action Steps for Parents to Do Today to Protect Student Data

These actions will help put you back in control of your child's data.



How Schools Use Private Student Data

How Schools Use Private Student Data

Non-educators want access to student data to apply principles of big data analysis to it.

Twitter Bomb Threat Diverts John Smedley

Twitter Bomb Threat Diverts John Smedley's Plane

Sony Online Entertainment president responds via Twitter to American Airline's plane diversion.

POS Systems in Terrible State of Security

POS Systems in Terrible State of Security

Same malware used in Target attack also targeted more than a thousand other U.S. businesses.

UPS Confirms Data Breach

UPS Confirms Data Breach

The shipping company found that 51 stores have been hacked

New Website Publicly Shames Apps and Services without Encryption

New Website Publicly Shames Apps and Services without Encryption

Companies called out for jeopardizing the security and privacy of their users.

Hospital Security Breach Steals Data from 4.5 Million Patients

Hospital Security Breach Steals Data from 4.5 Million Patients

Community Health Systems in Central Florida hospitals are affected by the breach

Nuclear Regulatory Commission Computers Hacked

Nuclear Regulatory Commission Computers Hacked

Internal investigation reveals three breaches in past three years, twice foreign related and once unidentifiable.

Symantec Combines Nine Norton Products to Create One Service

Symantec Combines Nine Norton Products to Create One Service

The product can be used on Windows, OS X, Android, and iOS

Security Fears Restricting Mobile Commerce in the US

Almost half of consumers would never use mobile payment and banking apps due to fears about the level of security on their devices, with suspicions highest in the over 55 age group.

7 Things Security Professionals Can Learn from Robin Williams

7 Things Security Professionals Can Learn from Robin Williams

Movie quotes offer great insights and knowledge to enhance the security industry.

Security Holes Found in some DLP Products

Security Holes Found in some DLP Products

Two researchers planned to reveal their findings at Black Hat USA.

Voltage SecureData z/Protect Provides Reliable, Standards-based Protection

Breakthrough encryption and tokenization technologies deliver a new level of safety in today’s risk-prone, online transactional world.

U.S. Homeland Security Contractor Acknowledges Computer Breach

US Homeland Security Contractor Acknowledges Computer Breach

The company says it has all the markings of a state-sponsored attack.

Facebook Follows its Users across Cyberspace

Facebook Follows its Users across Cyberspace

4 ways to battle this social media giant to beat them at their own game.

Hackers steal 1.2 billion Usernames and Passwords

Hackers Steal 1.2 Billion Usernames and Passwords

Russian hackers stole 1.2 billion passwords resulting in the largest collection of stolen internet information.

Google Turns in Man with Child Porn

Google Turns in Man with Child Porn

The internet company found illegal images in his Gmail account.

Government Websites in Israel Hacked by Anonymous

Government Websites in Israel Hacked by Anonymous

In wake of recent bombings, activist group feels need to hack.

Your Biometric Accepted Here

Your Biometric Accepted Here

While the adoption of biometrics has never been more widespread, highly-successful security- and privacy-enhancing applications have been deployed worldwide across all industries; yet, the general public narrative remains focused more on the risks rather than the benefits.

Featured

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.