In a letter to those affected by the 2008 data breach, Yale said the breach was discovered on June 16, 2018, during a security review of its servers. After the university discovered the breach, it notified those affected and offered credit monitoring services and identity theft prevention tips.
- By Jessica Davis
- Oct 19, 2018
The information made vulnerable by the flaw would have let hackers obtain information they could use for phishing scams, harassment and other campaigns.
- By Jessica Davis
- Oct 19, 2018
Manufacturer’s Sales Rep Firms Combine Resources and Contacts to Increase Footprint in the Midwest
"Without the cameras, it presents a danger to officers who can't monitor the prisoners without direct contact,” said Lt. Alan Fiorilla in a report to City Manager Nick Villano. "This leaves the officers vulnerable."
- By Jessica Davis
- Oct 18, 2018
The Illinois National Guard is bringing in hundreds of cybersecurity experts to help ensure the integrity of the midterm elections and prevent the compromise of election results.
- By Jessica Davis
- Oct 18, 2018
If and how high-profile breaches have shifted the preferences and behaviors of U.S. consumers
- By Sydny Shepard
- Oct 17, 2018
All major browsers are dropping support for old TLS standards simultaneously.
- By Sydny Shepard
- Oct 17, 2018
The TSA Biometrics Roadmap focuses on four main goals: 1. Partnering with U.S. Customs and Border Protection on biometrics for international travelers, 2. Using biometrics provided by TSA PreCheck members to enhance the travel experience, 3. Expanding biometrics to additional domestic travelers and 4. Developing the infrastructure for biometric technology.
- By Jessica Davis
- Oct 17, 2018
FBI Cyber arrests hacker using fake advertisements.
- By Sydny Shepard
- Oct 17, 2018
Numerous PlayStation 4 users reported that a PlayStation Network message exploit is crashing their consoles, requiring a factory reset in order to function again.
- By Jessica Davis
- Oct 16, 2018
Eighteen payment processors from the U.S. and U.K. tested their systems for cyber attacks.
- By Sydny Shepard
- Oct 16, 2018
What can organizations do to protect against a cold boot attack?
- By Garry McCracken
- Oct 16, 2018
A security breach at a Wisconsin National Guard Unit prompted a lockdown and three arrests.
FBI Director Christopher Wray is convinced that terror groups will deploy drones to carry out attacks on American soil, and told a Senate committee that the threat of drones and other unmanned aircrafts is “steadily escalating.”
As many of you will have experienced, the planning, configuration, installation and reporting of a video security project involves multiple tools and extensive man hours to complete and document the process. Managing several projects efficiently through each phase can be a difficult task for system integrators.
Hotels and casinos on the Las Vegas Strip are increasing security with K-9 units and advanced technology.
- By Sydny Shepard
- Oct 15, 2018
In a voluntary recall, Medtronic has issued a software update to plug cybersecurity holes in programmers — which are kinds of software that physicians use to measure a connected device's performance, batter life and settings — for the company's implantable cardiac devices, according to the U.S. Food and Drug Administration.
- By Sydny Shepard
- Oct 15, 2018
Dahua Technology continues to focus on their commitment to introduce innovative and comprehensive solutions to the security industry.