Data Security


Two people using computer in office space

Five Ways to Keep Your Workplace Safe Online

Regardless of size or business type, companies must institute these basic practices to make sure their organizations are well protected from cybercriminals.

senate committtee

Senate Report: Federal Agencies Have Failed To Respond to Growing Cybersecurity Threats

Eight agencies, including the Department of Homeland Security and Education Department, are using outdated systems that have few security updates and have failed to protect Americans’ personal data.

Map of Delaware

Ten Percent of Delaware Population Affected by Nearly Nine-Year Security Breach at Insurance Provider

Dominion National discovered in April that its servers, containing the financial and personal data of 95,000 Delawareans, may have been accessed by an unauthorized party since 2010.

estonia data center

Estonia Creates World’s First-Ever ‘Data Embassy’ to Improve Information Security

The high-tech country’s decision to move highly sensitive databases to another country could be a model for other nations hoping to maintain their data security.

Google, University of Chicago Medical Center Accused of Sharing Patients’ Data

Google University of Chicago Medical Center Accused of Sharing Patients Data

Google and the University of Chicago Medical Center are being sued for allegedly sharing unauthorized data from their patients.

House of Representatives Passes Election Security Bill

House of Representatives Passes Election Security Bill

The House of Representatives passed an election security bill 225-184 on Thursday of last week. The Securing America’s Federal Elections (SAFE) Act is designed to prohibit cyberinterference.

Thousands of Potentially Counterfeit Apps Found in Google Play Store

Thousands of Potentially Counterfeit Apps Found in Google Play Store

Researchers have found over 2,000 apps that are potentially counterfeits, modeled after popular app downloads. These counterfeits contain harmful malware that could harm unsuspecting users.

Lake City to Pay Nearly $500,000 to Hackers

Lake City to Pay Nearly $500,000 to Hackers

Hackers have found a sweet spot in encrypting and attacking municipal computer systems. Lake City is the latest to suffer from these attacks, and after two weeks of inaccessible services, have agreed to pay the $460,000 ransom to hackers.



Experts Weigh In On New Cryptocurrency-Mining Botnet

Experts Weigh In On New Cryptocurrency Mining Botnet

A new cryptocurrency-mining botnet could severely affect unprotected Android users. Experts say while the unprotected devices are mostly phones in Asia, these issues are becoming a big problem for technology security.

WeTransfer Incident Shares Transferred Files with Unintended Users

WeTransfer Incident Shares Transferred Files with Unintended Users

WeTransfer files were transferred to unintended users on June 16 and 17. The scope of the incident is not clear, but the company promptly logged out affected accounts and disabled the transfer links.

Huawei Confident It Will Meet German 5G Standards

Huawei Confident It Will Meet German 5G Standards

Germany has decided to level the playing field and offer all foreign companies fair and equal chances to build the national 5G infrastructure. Huawei has responded, claiming that despite the warnings of the United States, they will be able to comply and meet these standards.

Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

While cloud services are becoming increasingly popular for business use, cyberattacks on cloud services are also growing. This has prompted a rise in cloud security software.

Insecure Data Storage in Mobile Applications Poses Security Issues

Insecure Data Storage in Mobile Applications Poses Security Issues

Users’ data might be more at risk than they realize. A new study shows that three quarters of mobile application have insecure data storage issues, putting passwords, financial information, personal data, and correspondence at risk.

Florida City Pays Almost $600,000 Ransom to Secure Records

Florida City Pays Almost $600,000 Ransom to Secure Records

After three weeks of city data being encrypted in Riviera Beach, Florida, city officials have unanimously voted to pay the hefty ransom to regain access.

Oregon Department of Human Services Breach Affects 645,000 Clients

Oregon Department of Human Services Breach Affects 645,000 Clients

In March, the department announced that 350,000 clients had been affected by a data breach in January 2019. On Tuesday, they updated the number and announced that 645,000 clients had been affected.

CISA Warns Microsoft Users to Patch Systems to Protect Against BlueKeep

CISA Warns Microsoft Users to Patch Systems to Protect Against BlueKeep

Through the BlueKeep vulnerability, it is possible to achieve remote code execution on vulnerable devices. Since the virus can spread, if it’s not contained, it could trigger a much bigger problem.

EatStreet Data Breach Risks Customers, Restaurants, Deliverers’ Information

EatStreet Data Breach Risks Customers' Information

In May, EatStreet experienced a data breach that compromised certain customers', restaurants', and deliverers' information. The service just recently disclosed the security breach.

Computer Science Student Shows Venmo Transactions Can Be Easily Acquired

Computer Science Student Shows Venmo Transactions Can Be Easily Acquired

A year after a privacy researcher showed the world that Venmo transactions could be easily accessed, a computer science student scraped seven million Venmo transactions to increase awareness of the issue.

Report reveals Russian Hackers May Be Responsible for $530 Million Cryptocurrency Hack

Report reveals Russian Hackers May Be Responsible for $530 Million Cryptocurrency Hack

It was previously believed that North Korean hackers were behind the January 2018 Coincheck hack, but recent developments in the investigation suggest that Russian actors may have been responsible.

Infusion Pump Vulnerabilities Could Offer Hackers Route To Control

Infusion Pump Vulnerabilities Could Offer Hackers Route To Control

Researchers at CyberMDX uncovered two vulnerabilities in older versions of an infusion pump that could allow hackers to gain control over the onboard computer.

Featured

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.