IT Brief UK - Technology news for CIOs & IT decision-makers

HID stories - Page 43

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Thinkstockphotos 587802732

The rise of ransomware in Southeast Asia

Fri, 12th May 2017
#
malware
#
ddos
#
ransomware
It is likely that cybercriminals will target on internet of things (IOT) devices in technologically, advanced economies throughout Southeast Asia.
Thinkstockphotos 501362758

Avast joins watchdog ranks as No More Ransom partner

Wed, 10th May 2017
#
malware
#
ransomware
#
cybersecurity
Avast is one of the latest security providers to join the No More Ransom campaign, alongside law enforcement agencies and the private security sector.
Thinkstockphotos 638053528

What makes Locky and Cerber ransomware so good - and what about CradleCore?

Wed, 10th May 2017
#
malware
#
ransomware
#
cybersecurity
Trend Micro details the evolution of Locky and Cerber, ransomware outsmarting defences, as CradleCore's source code sale potentially marks a worrying shift.
Thinkstockphotos 637380670

LogRhythm's Network Monitor Freemium an impressive winner when put to the test

Tue, 2nd May 2017
#
storage
#
siem
#
dlp
Not all security tools have to come with a price tag. The SANS Institute takes at a look at LogRhythm's NetMon Freemium Version 3.2.3.
Thinkstockphotos 510691579

Around 17 million websites are already powered by WordPress - are they secure?

Thu, 20th Apr 2017
#
mfa
#
iam
#
cybersecurity
WordPress, the most popular and most used content management system, is also a great tool for businesses and individuals.
Thinkstockphotos 122399430

The top scams you should watch out for when travelling abroad

Tue, 18th Apr 2017
#
email security
#
cybersecurity
#
scams
Stay vigilant abroad: Concur unveils top nine travel scams targeting tourists, from dodgy ATMs to fake hotel charges.
Thinkstockphotos 545279224

Honeywell launches USB security solution for industrial control systems

Tue, 18th Apr 2017
#
malware
#
cybersecurity
#
honeywell
USB devices and the malware hiding within them pose a major threat to industrial control systems, according to research by BSI publications.
Thinkstockphotos 519335432

Dridex banking trojan targets Australian organisations

Tue, 11th Apr 2017
#
email
#
trojan
#
proofpoint
Proofpoint has detected a massive spike in Dridex banking trojans that are targeting Australian organisations.
Thinkstockphotos 469918032

Strategy for cyber crime: own the routers, own the Internet

Mon, 10th Apr 2017
#
router
#
carbon black
#
opinion
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.
Thinkstockphotos 524725976

Hancitor climbs its way to the top of 'world's most wanted' malware families

Tue, 14th Mar 2017
#
malware
#
ransomware
#
cybersecurity
The Hancitor/Chanitor malware has rapidly climbed to be one of the top five 'world's most wanted' malware families for the first time.
Thinkstockphotos 650151708

Ransomware was 2016's hottest ticket as attacks spiked to whopping 752%

Mon, 13th Mar 2017
#
malware
#
ransomware
#
cybersecurity
Ransomware has seen a 752% increase in use over 2016, resulting in $1 billion in losses for enterprises worldwide.
Thinkstockphotos 502936404

Trustwave exposes backdoor in DblTek devices; vendor issues poor patch & goes silent

Mon, 6th Mar 2017
#
uc
#
voip
#
contact centre
DblTek left vulnerabilities in its IoT devices, tried to hide the vulnerability, issued shoddy patches and cut off all contact with Trustwave.
Fallback

The cyber threats you'll face in 2017 - and tips for defending against them

Thu, 23rd Feb 2017
#
ai security
#
ai
#
cybersecurity
Experts warn against polymorphic malware in 2017, with Webroot's latest report offering defence strategies for emerging cyber threats.
Thinkstockphotos 641082874

User behaviour may be the hidden secret to security, says Forcepoint

Wed, 22nd Feb 2017
#
data analytics
#
martech
#
planning
80% of cybersecurity professionals believe it's important to understand people's behaviours when it comes to intellectual property & critical data.
Thinkstockphotos 614979272

Dangerous Android Trojan masquerades as Flash Player update

Wed, 22nd Feb 2017
#
malware
#
cybersecurity
#
trojan
A new Android Trojan has been lurking under a fake app that tries to mimic a Flash Player update, ESET discovered this week.
Thinkstockphotos 637534982

NordVPN's top tips to help you stay savvy about your internet privacy

Mon, 13th Feb 2017
#
data protection
#
vpns
#
data privacy
Most internet users are unaware of the extent to which their private data is being tracked and shared with advertisers, according to a study by iSchool.
Thinkstockphotos 200484500 001

Ransomware: Key insights from infosec experts

Tue, 7th Feb 2017
#
malware
#
ransomware
#
cybersecurity
Take ransomware. What does it entail? Does it even matter – will it ever actually affect you? It'll vanish as quickly as it appeared, right? Wrong.
Screen shot 2017 02 07 at 12

Facebook ups the ante on security

Tue, 7th Feb 2017
#
data privacy
#
cybersecurity
#
facebook
Facebook introduces a Security Key feature, enhancing user protection with a physical device that ensures easier, faster, and more secure logins.
Thinkstockphotos 611749952

Unstoppable: Ransomware will evolve – here's what you need to know

Thu, 26th Jan 2017
#
malware
#
ransomware
#
ai security
Endpoint protection company CrowdStrike says that ransomware attacks are going to evolve rapidly, making it difficult for organisations to defend.
Thinkstockphotos 185848552

Notorious cybercrime gang targeting Google Apps for C&C attacks

Thu, 26th Jan 2017
#
casb
#
google
#
forcepoint
Carbanak cybercrime gang now using Google infrastructure to act as Command and Control for weaponized documents.