Account takeover incidents, where attackers steal employee credentials and use them to send e-mails from the user’s real account, are increasing in frequency and magnitude. In this report, we take a closer look at the motives and demographics behind these attacks.
This cyberattack might seem like a long shot, but for those working in industries with sensitive data or valuable IP, threat actors could have another tool to nab your password: a thermal imaging camera. According to a report by University of California Irvine Computer Science PhD students Tyler Kaczmarek and Ercan Ozturk and Professor Gene […]
Information sharing is a big part of—and logically supports—incorporating cybersecurity into other critical infrastructure risks. It makes sense to put all risk mitigation practices into one comprehensive program.
Although it is nearly impossible to remain completely anonymous while using the internet, there are certain steps you can take to better protect your accounts against a cyberattack or security breach. For instance, while you’re using a web browser to search the internet, whether that be Chrome, Safari or Firefox, are you aware that it […]
Cybercriminals are in a constant search for new, innovative ways to profit from their ventures. In efforts to better leverage their illicit activities, more and more are beginning to move away from ransomware attacks, which attract a great deal of attention. It seems the new weapon of choice lies in quietly putting hacked IT infrastructure […]
The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) issued a joint alert on March 15. The statement provides details on Russian government actions that targeted not only “U.S. Government entities” but also “organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.”
Artificial intelligence (AI) is an interrupter that will have a major impact on the security industry when it hooks up with the analytic data generated from security devices. These physical security devices are becoming more commonly found in a variety of vertical markets.
A new protocol for designing a video surveillance system with camera placement on the outside perimeter facing inward is being deployed by the Compton Unified School District (USD) Police Department.
Advances in security technology are being realized thanks to the development of smart sensors. But what exactly is a “smart” sensor?
The need for continuous protection across all areas of attack is bringing together information technology (IT), physical security, and cybersecurity working as one team. By using security systems, integrated network electronic technology is proving to be a valuable tool in business operations as well.