Data Security


885 Million Mortgage Documents Exposed Thanks to Website Vulnerability

885 Million Mortgage Documents Exposed Thanks to Website Vulnerability

First American Financial Corporation was made aware of a flaw that exposed their client's mortgage documents.

City Recovers Slowly Following Ransomeware Attack

City Recovers Slowly Following Ransomeware Attack

Baltimore has been inching closer to restoring computer systems after a ransomeware attack on May 7.

Six Top Information Security Risks to Be Aware of in 2019

Six Top Information Security Risks to Be Aware of in 2019

While companies and individuals embrace innovation, cybercriminals make use of the new backdoors to improve the scope of their hacking.

Moving from DevOps to DevSecOps: The Path to Security

Moving from DevOps to DevSecOps: The Path to Security

Security is now being analyzed during the development process to account for every variable.

Google Replaces Titan Security Keys Due to Vulnerability

Google Replaces Titan Security Keys Due to Vulnerability

Google announced its Bluetooth security keys could be vulnerable to attack.

WhatsApp Discovers Major Security Loophole

WhatsApp Discovers Major Security Loophole

Here's what you need to know about WhatsApp's major security flaw.

Location Data of Some Twitter Users Leaked

Location Data of Some Twitter Users Leaked

A bug in the iOS Twitter app impacted the privacy of its users.

Crypto Exchange Service to Revamp Security Measures Following Hack

Crypto Exchange Service to Revamp Security Measures Following Hack

Binance is making significant security changes after 7,000 Bitcoins were stolen.



Photo Storage App Reportedly Used Customers

Photo Storage App Reportedly Used Customers' Images to Train a Facial Recognition System

Ever, a photo storage and backup app, reportedly trained a commercial facial recognition system using millions of images uploaded to the service without notifying users.

Technology Companies’ Role in the Adoption of Total Cyber Protection for SMBs

Technology Companies’ Role in the Adoption of Total Cyber Protection for SMBs

Technology is providing small and medium-sized businesses (SMBs) of all industries a tremendous opportunity to grow and better manage their business.

Android Q Will Focus on Security and Privacy, Google Says

Android Q Will Focus on Security and Privacy, Google Says

The tenth version of Android will include finer control over privacy and improvements to Android security updates, Google announced Tuesday at its I/O 2019 event

Can Your Business Survive Being Hacked?

Can Your Business Survive Being Hacked?

Find out how you should respond to being hacked.

U.K. Reveals New Law to Improve IoT Security

U.K. Reveals New Law to Improve IoT Security

The U.K. government is looking to step up IoT security against cybercriminals.

Five Biggest Security Myths Busted

Five Biggest Security Myths Busted

There are a number of common misconceptions about endpoint security.

Reasons to Implement a Zero Trust Security Model

Reasons to Implement a Zero Trust Security Model

Six reasons companies should implement a Zero Trust Security Mode.

Security at Scale—With Great Success Often Comes Great Security Problems

Security at Scale—With Great Success Often Comes Great Security Problems

Some common areas and issues to keep growing your business, not your security risk.

GDPR

GDPR's Impact on Incident Response

Beyond user privacy, we’ve seen GDPR impact companies in other ways.

Physician-Staffing Company Data Breach Exposes Personal Data for About 31,000 Patients

Physician-Staffing Company Data Breach Exposes Personal Info of About 31,000 Patients

EmCare Inc., a physician-staffing company, says a data breach has exposed personal information for about 31,000 patients

How to Stay Safe on Public Wi-Fi Networks: A Detailed Guide

How to Stay Safe on Public Wi-Fi Networks: A Detailed Guide

All of your personal data can be easily accessible and vulnerable to hackers.

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Hospitals are often in the news due to data breaches, and email hacks are often the cause.

Featured

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.