1(630)802-8605 Ravi.das@bn-inc.net

Other Security News

Read On to See What Things Are Happening in the World of Security

Security Magazine

Check out the latest posts from Security Magazine here!

  • Designed for Easy Installation
    on February 14, 2019 at 5:00 am

    With a scan and set-up QR code, the VERA Thermal camera from 3xLOGIC enables integrators to set up cameras faster and more effectively, saving enterprises money on installation cost. […]

  • Eliminates the Need for IR LEDs
    on February 14, 2019 at 5:00 am

    These Ultra Intensifier Cameras from Speco Technologies eliminate the need for infrared LED lighting by taking the light available and amplifying it to provide color images in day and night. […]

  • Provides Budget-Friendly, Privacy-Minded Monitoring
    on February 14, 2019 at 5:00 am

    The low-cost P1290-E thermal camera from Axis Communications can be used as a sensor to avoid compromising privacy – like in schools, healthcare settings or care homes – since thermal imaging detects incidents without revealing personal details about the people in the scene. […]

  • Adds Analytics to Robust Surveillance Solution
    on February 14, 2019 at 5:00 am

    The MIC IP camera series from Bosch can withstand high winds, rain, fog, 100-percent humidity, temperatures as low as -40 degrees F and as high as 149 degrees F, extreme vibrations and more. […]

  • Offers Long-Range Thermal Detection
    on February 14, 2019 at 5:00 am

    Requiring no ambient light and providing excellent image quality in darkness, smoke or fog, Hanwha Techwin’s IP-based Wisenet thermal cameras are capable of long-range detection. […]

  • Addresses Challenging Lighting Indoors and Out
    on February 14, 2019 at 5:00 am

    Designed to support challenging lighting conditions typical in city surveillance, airports, traffic, gaming facilities, corrections, hospitality and more, the GFC Professional 4K camera from Pelco by Schneider Electric delivers 8MP resolution detail for demanding surveillance applications with heavy foot and vehicular traffic. […]

Cyber Security Case Studies

Read up on the Cyber case studies from Security Magazine here!

  • How Unified Device Management Is Critical to BYOD Enterprises
    on November 1, 2014 at 4:00 am

     Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway. &nbs […]

  • Security Implications of the Electric Smart Grid
    on September 4, 2014 at 5:00 am

    As critical infrastructure in the United States becomes more dependent on networked systems, such as the smart grid, the electricity industry is at risk for new avenues of attack.&nbs […]

  • Automating Security Incident Respons
    by ritcheyd@bnpmedia.com (Diane Ritchey) on September 1, 2014 at 4:00 am

    It allows them to coordinate all aspects of a response: what's going on in the network, what information is available from threat intelligence feeds, what the regulations are, what the best practices are, and how to ensure that everything is getting done quickly and effectively. […]

  • Defense in Depth: A Layered Approach to Network Security
    on September 1, 2014 at 4:00 am

    Network and security components must be able to communicate so that if an attacker penetrates one system, others can respond immediately to take preventative measures. IF-MAP is a robust protocol that enables information sharing between disparate systems. […]

  • How Much Would a Cyberattack Cost Your Enterprise?
    on June 1, 2014 at 4:00 am

    Tool users, including information-security, risk, financial and other senior executives, can input a range of expenses and estimated costs for either a specific scenario or actual breach, and the app, sponsored by Booz Allen Hamilton, would generate a comprehensive report explaining the total cost and enabling a cost-benefit analysis of security strategies. […]

Krebs on Security News

Read the latest security news from Krebs on Security

  • Bomb Threat Hoaxer Exposed by Hacked Gaming Site
    by BrianKrebs on February 14, 2019 at 5:37 am

    Federal authorities this week arrested a North Carolina man who allegedly ran with a group of online hooligans that attacked Web sites (including this one), took requests on Twitter to call in bomb threats to thousands of schools, and tried to frame various online gaming sites as the culprits. In an ironic twist, the accused -- who had fairly well separated his real life identity from his online personas -- appears to have been caught after a gaming Web site he frequented got hacked. […]

  • Patch Tuesday, February 2019 Edition
    by BrianKrebs on February 13, 2019 at 3:31 am

    Microsoft on Tuesday issued a bevy of patches to correct at least 70 distinct security vulnerabilities in Windows and software designed to interact with various flavors of the operating system. This month's patch batch tackles some notable threats to enterprises -- including multiple flaws that were publicly disclosed prior to Patch Tuesday. It also bundles fixes to quash threats relevant to end users, including critical updates for Adobe Flash Player and Microsoft Office, as well as a zero-day bug in Internet Explorer. […]

  • Email Provider VFEmail Suffers ‘Catastrophic’ Hack
    by BrianKrebs on February 12, 2019 at 1:33 pm

    Email provider VFEmail has suffered what the company is calling "catastrophic destruction" at the hands of an as-yet unknown intruder who trashed all of the company's primary and backup data in the United States. The firm's founder says he now fears some 18 years' worth of customer email may be gone forever. […]

  • Phishers Target Anti-Money Laundering Officers at U.S. Credit Unions
    by BrianKrebs on February 8, 2019 at 12:58 pm

    A highly targeted, malware-laced phishing campaign landed in the inboxes of multiple credit unions last week. The missives are raising eyebrows because they were sent only to specific anti-money laundering contacts at the credit unions, and many credit union sources say they suspect the non-public data may have been somehow obtained from the National Credit Union Administration (NCUA), an independent federal agency that insures deposits at federally insured credit unions. […]

  • More Alleged SIM Swappers Face Justice
    by BrianKrebs on February 6, 2019 at 5:50 am

    Prosecutors in Northern California have charged two men with using unauthorized SIM swaps to steal and extort money from victims. One of the individuals charged allegedly used a hacker nickname belonging to a key figure in the underground who's built a solid reputation hijacking mobile phone numbers for profit. According to indictments unsealed this week, Tucson, Ariz. resident Ahmad Wagaafe Hared and Matthew Gene Ditman of Las Vegas were part of a group that specialized in tricking or bribing representatives at the major wireless providers into giving them control over phone numbers belonging to people they later targeted for extortion and theft. […]