CyberSecurity


google classroom

Google Facing Lawsuit Over Collection of Facial Scans, Personal Data From Children

School districts are increasingly turning to Google for online classroom tools during the coronavirus pandemic, but the company has faced scrutiny for the data it collects on students.



zoom building

Zoom CEO Vows To Improve Privacy, Cybersecurity Issues After User Criticisms

After experiencing an unprecedented growth in users over the course of a month, the video conferencing app is hoping to address complaints of “Zoombombing” and improper data collection.

zoom phone

Video Conferencing Software Zoom Faces Scrutiny Over Hacks, Abusive Behavior During Meetings

The spread of “Zoombombing,” or hijacking a meeting room with abusive images or speech, has grown in scope as more Americans turn to teleconferencing for classroom instruction and workplace meetings.

marriott sign

Marriott Discloses Second Security Breach, Affecting Millions, In Two Years

The hack took place through Marriott Bonvoy, the company's loyalty app, and affected up to 5.2 million guests.

spam email inbox

Research: Americans Should Watch Out For Hacking Campaigns Related to Stimulus Bill, Economic Recovery

Cyber attackers have already attempted to profit off of spam websites selling fake coronavirus cures. Now, hackers will turn toward Americans’ thirst for information about stimulus checks and financial aid.

who flag

World Health Organization Facing Cyber Attacks During Coronavirus Response

A malicious site imitating the WHO’s email system was created to collect the account information of the organization’s employees.

justice department

Justice Department Takes First Legal Action Against Coronavirus Scam Websites

A federal judge granted a temporary restraining order to have a website selling fake vaccine kits shut down immediately.

cybersecurity map

Facing Down Cybersecurity and Operational Challenges Caused By Coronavirus Crisis

Businesses will have to tackle issues with supply chains and staffing in the coming months. Here’s how to make sure your organization can withstand the COVID-19 crisis.

nutribullet pic

Hackers Steal Credit Card Data From NutriBullet Customers Through Magecart Attacks

The attacks, which targeted NutriBullet’s official website, were acknowledged by the company but it’s not clear whether affected customers will be notified.

people using phones

Israel Moves to Track Cell Phone Location Data To Prevent Spread of Coronavirus

The U.S. and tech companies are contemplating a similar step, though the American version of cell phone tracking would likely include aggregated data and more privacy protections.

HHS website

Cyber Attack Hits Department of Health and Human Services Amid Government Coronavirus Response

HHS officials said no personal data was accessed and the attack was not successful. But it could be a sign of things to come during the coronavirus pandemic.

Attorney General Directs Department of Justice to Crack Down on Coronavirus Scammers, Cyber Criminals

In a memo to attorney’s offices across the country, William Barr said that federal law enforcement should prioritize investigating and prosecuting crimes related to the pandemic.

drone in field

Trump Administration Preparing Executive Order to Ban Use of Foreign-Made Drones by Government Agencies

Chinese manufacturer DJI, which accounts for about 70 percent of the global drone market, stands to lose the most from a ban, which is based on national security concerns.

coronavirus illustration

High Number of Recently Created Coronavirus Websites Linked to Scamming Operations

Americans need to be on the lookout for malicious domains created by scammers as well as widespread disinformation and conspiracy theories being spread online.

Despite Technical Issues, DHS Claims Victory on Super Tuesday With No Foreign Hacking Attempts

There was no significant increase in disinformation campaigns or hacking attempts like there were in 2016, according to top Homeland Security officials.

walgreens store

Flaw in Walgreens App Exposes Prescription Data for Some Mobile Users

The pharmacy would not say how many people had been affected by the error, but said that prescription data and customers’ names were part of the leaked information.

Trucking fleets may be the next targets of ransomware

The Next Victims

Among the common types of cybersecurity attacks perpetrated on enterprises, arguably none are as sophisticated, effective or lucrative as ransomware is today.

Secure Your Containers

Development and deployment of container-based software has become a popular movement in technology.

Validate Your Security Model

Validate Your Security Model

As security threats grow in complexity and scale, organizations are spending major resources to address the threats and minimize risk, including hiring top security talent and purchasing sevenfigure security solutions.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities