Wireless Networks


Report: Rise Of “Conversation-Hijacking” Phishing Attacks Threatens Businesses

Because the technique involves impersonating a trusted employee, the hacking method has the potential to be unusually effective.

brain scan

More Than One Billion Medical Images Remain Unprotected On The Web

Some security experts and lawmakers have criticized the Department of Health and Human Services for failing to enforce privacy laws and fine organizations that did not protect patient records.

2020 computing

The IoT Rundown For 2020: Stats, Risks, and Solutions

Weak passwords, insecure network services and a lack of secure update mechanisms top the list of risks for companies utilizing IoT technology.

ring doorbell camera

Hackers Have Developed Software To Break Into Ring Security Camera Accounts, And It’s Working

A Mississippi family had their Ring account hacked, allowing a man to speak to their eight-year-old daughter through the speaker.

smart thermostat

Tips for Increasing Security in Your Smart Home

On their own, smart home devices do not protect themselves. Users must take action to protect their privacy and data security.

auto manufacturer

FBI: Auto Industry Has Been Key Target of Cyber Attacks Since 2018

Auto companies are set to face a wider range of threats thanks to the rise of internet-connected vehicles, the FBI said in a recent report.

Research: 5G Networks Still Vulnerable to Location Tracking, Downgrading Attacks

A group of researchers found 11 flaws, several of which would expose a device’s location and when a user calls or sends texts.

Huawei Sign

Commerce Secretary: Licenses For Companies to Sell Exports to Huawei Are Coming “Very Shortly”

The government has received over 200 requests from American companies to continue doing business with Huawei.



computer at work

Why CEOs of Small Businesses Are Prime Target for Hackers

Cyberattacks are targeting corporations and individuals alike. Here’s how companies can stay more secure on the web.

How These Web Application Security Vulnerabilities Could Be Affecting Your Business

How These Web Application Security Vulnerabilities Could Be Affecting Your Business

When companies don’t follow basic security practices, they leave themselves vulnerable.

Incident Response in the Age of Intelligent Bots

Incident Response in the Age of Intelligent Bots

How security teams can improve their defense strategy by integrating bots

Study: 66 Percent of Small Businesses Worldwide Have Faced Cyberattacks in The Past Year

Study: 66 Percent of Small Businesses Worldwide Have Faced Cyberattacks in The Past Year

For the third year in a row, SMBs are reporting big increases in the frequency of cybersecurity attacks.

One Year After Pledge, More Than 5,000 Hotel Properties Have Deployed Safety Devices For Employees

One Year After Pledge, More Than 5,000 Hotel Properties Have Deployed Safety Devices For Employees

Large hotel chains adopted new measures to combat sexual harassment and increase safety for workers in the wake of the #MeToo movement.

5 Common Phishing Attacks and How To Protect Yourself Against Them

5 Common Phishing Attacks and How To Protect Yourself Against Them

Phishing scams continues to be a widespread problem for businesses and individuals alike. But there are several ways to recognize that you could be getting scammed.

Democratic National Committee Rejects Plans To Hold ‘Virtual Caucuses’ in Iowa and Nevada, Citing Security Concerns

Democratic National Committee Rejects Plans To Hold ‘Virtual Caucuses’ in Iowa and Nevada, Citing Security Concerns

Facing criticism over low voter turnout and barriers to caucusing, party officials planned for remote caucuses in 2020. But the national Democratic Party said the methods would expose the process to high cybersecurity risks.

3 Major Internet Privacy Issues and How to Avoid Them

3 Major Internet Privacy Issues and How to Avoid Them

Information mishandling, snooping and location tracking are often the ways in which users find their privacy violated online.

open source vulnerability hacking

The Dangers of Open-Source Vulnerabilities, and What You Can Do About It

Neglecting basic security practices exposes companies to long-standing security threats.

secure tablet

How Deception Technology Can Help You Detect Threats Early

Deploying automated decoys can help protect your network and reduce IT costs.

Rebuilding Trust After Cybersecurity Lapses

Rebuilding Trust After Cybersecurity Lapses

Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone.

Featured

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.