CyberSecurity


For the second time in a month, HBO has fallen victim to cyber criminals.

HBO Social Media Accounts Compromised in Second Hack

For the second time in a month, HBO has fallen victim to cyber criminals.



Drone Maker Steps Up Security after U.S. Army Ban

Drone Maker Steps Up Security after U.S. Army Ban

The U.S. Army banned the drones after they detected “cyber vulnerabilities.”

DHS to Boost Cybersecurity of First Responders

DHS to Boost Cybersecurity of First Responders' Tech

The Department of Homeland Security is looking to boost cybersecurity of advanced first responder technology.

Ransomware: How to Stop It Once and for All

Ransomware: How to Stop It Once and for All

Businesses can effectively close the market for ransomware attacks by implementing these three strategies.

Poor Cybersecurity Could Lead to Fines

Poor Cybersecurity Could Lead to Fines

UK firms could face up to £17 million in fines if they fail to protect themselves from hackers.

UK Issues Strict Security Guidelines for Connected Vehicles

UK Issues Strict Security Guidelines for Connected Vehicles

The UK, nervous about hackers gaining access to moving vehicles, has added strict guidelines to connected cars.

Four Ways Malware Sneaks on to Mobile Devices

Four Ways Malware Sneaks on to Mobile Devices

Fraudsters cast their nets wide in the hopes of snagging unaware and unsuspecting consumers who will unwittingly download malicious applications on to their mobile devices which can then be exploited for short or long-term financial gain by cybercriminals.

What Businesses Need to Consider When Preparing for IoT

What Businesses Need to Consider When Preparing for IoT

Internet of Things (IoT) technologies are empowering consumers with products and services they simply couldn’t have imagined a few years ago.

White House Officials Fooled by ‘Email Prankster’

White House Officials Fooled by ‘Email Prankster’

Can your employees spot a fake email?

Being Connected

The security of corporate data is critical to the integrity of operations. Yet, everywhere we turn, it seems like another company has become victim to some form of cyber threat, malware or ransomware attack.

The First Rule, Encrypt

It used to be that the most important aspect of implementing an electronic access control system was the simple control of who went where when. Today, the requirements of these sophisticated systems go beyond.

HBO Victim in Latest Cyberattack

HBO Victim in Latest Cyberattack

Unreleased episodes of HBO shows and Game of Thrones scripts have been leaked as a result of the attack.

Facebook CSO: We Need More People-Centric Security

Facebook CSO: We Need More People-Centric Security

At the Annual Black Hat conference, Facebook Chief Security Officer Alex Stamos told the crowd that something needs to change in the security industry.

Swedish PM: 2015 Security Leak Made Citizens Vulnerable

Swedish PM: 2015 Security Leak Made Citizens Vulnerable

Prime Minister Stefan Lofven said the lead was a “disaster” and it exposed the nation to harm.

Smart Appliances should have Cybersecurity Rating

Smart Appliances should have Cybersecurity Rating

Televisions, fridges and other internet-connected home appliances should carry a security rating, a police chief suggested.

The Human Side of Security:  Security Threats and Considerations For Today’s Mobile Workforce

The Human Side of Security: Security Threats and Considerations For Today’s Mobile Workforce

While flexibility is empowering the workforce, it is also complicating data security.

Preventing a “Fleet-wide” Hack is Tesla’s Top Security Priority

Preventing a “Fleet-wide” Hack is Tesla’s Top Security Priority

Elon Musk commented on Tesla’s cybsersecurity during his talk at the National Governor’s Association this weekend.

14 Trump Properties Breached by Hackers

14 Trump Properties Breached by Hackers

Guests at 14 properties bearing the name of Trump might have their credit card information breached by hackers.

Apple Sets Up China Data Center to Meet New Cybersecurity Rules

Apple Sets Up China Data Center to Meet New Cybersecurity Rules

China has passed a cybersecurity law that requires foreign firms to store data within the country.

University of New Haven Cyber Forensics Team Launches Digital Forensics Database

First Time Cases, Investigators Linked Globally

Featured

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.