Milestone Systems and Optex,Inc.are expanding integration development with dedicated support of IP sensors and detectors for Milestone XProtect video management software(VMS).The detector scan and video data are configured and displayed ...
Tags: XProtect, Redscan IP laser, IR detectors, video management software
Nearly two-thirds of UK citizens back pre-emptive cyber strikes on foreign states that pose a credible threat to national security,a survey has revealed. However,46%of those believe it depends on the level of threat posed,according to a ...
Tags: UK citizens, cyber strikes, security information event management firm
Cybercriminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB. The zero-day ...
Tags: PDF, Cybercriminals, Adobe Reader, Group-IB
Hackers are distributing rogue email notifications about changes in Microsoft's Services Agreement to trick people into visiting malicious pages that use a recently circulated Java exploit to infect their computers with malware. "We're ...
Tags: Malware, Vulnerabilitie, rogue email notification, malicious email
Facebook is to expand its reward scheme for hackers who uncover vulnerabilities in its products to include network vulnerabilities. Details of the expanded scheme are to be announced this week at the DefCon Hacking Conference in Las ...
Tags: Facebook, network vulnerabilities, hackers, DefCon Hacking Conference
Australian telecommunications company AAPT has confirmed some business customer data was compromised in a breach of computer systems at an external service provider. The telco began investigating after hacktivist group Anonymous ...
Tags: AAPT, business customer data, computer systems, external service
Table of contents Public Wi-Fi hotspot dangers Security of 3G and 4G-based hotspots Network access requires careful management Educating users about security risks Network security controls and practices are among the most mature,but can ...
Tags: Public Wi-Fi hotspot, 3G and 4G-based hotspots, security risks