eCommerceNews UK - Technology news for digital commerce decision-makers

HID stories - Page 40

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Thinkstockphotos 469225644

Cybercriminals laundering $200b in ill-gotten gains – here's how

Sat, 17th Mar 2018
#
gaming
#
crypto
#
blockchain
​A new report from Bromium has landed with a number of startling findings, including the confirmation of a bustling cybercrime laundry market.
Screen shot 2018 03 14 at 11

New study details how easy it is for hackers to steal your data

Thu, 15th Mar 2018
#
malware
#
cybersecurity
#
hackers
It's no secret that web browsers store a substantial amount of sensitive information about their users - hackers are taking advantage of this.
Screen shot 2018 03 12 at 10

New research finds China tampering with public vulnerability data

Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
Screen shot 2018 03 06 at 12

REPORT: Ransomware decreasing in quantity but increasing in potency

Wed, 7th Mar 2018
#
malware
#
ransomware
#
supply chain
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
Thinkstockphotos 696067380

Criminals abuse email attachments to cash in on 'booming' black market for stolen passwords

Fri, 2nd Mar 2018
#
firewalls
#
email security
#
breach prevention
Barracuda warns of a 'booming black market' for stolen passwords as cybercriminals increasingly use phishing emails to distribute malware.
Thinkstockphotos 845260736

Chinese websites targeted in drive-by download attack that drops DDoS bot

Tue, 27th Feb 2018
#
ddos
#
botnet
#
malwarebytes
Chinese websites are under siege by a drive-by download campaign planting the decade-old Avzhan DDoS bot, Malwarebytes Labs reveals.
Thinkstockphotos 519829270

Q4 malvertising levels drop; but scammers aren't finished yet

Fri, 23rd Feb 2018
#
mssp
#
riskiq
#
malvertising
Malvertising may be going out of fashion for cyberattackers across the board, but it doesn't mean web users can rest easy.
Thinkstockphotos 903182690

Hackers exploit Tesla's AWS servers to mine cryptocurrency

Thu, 22nd Feb 2018
#
devops
#
datacentre infrastructure
#
hyperscale
Tesla is reassuring customers that a recent cryptojacking has not compromised vehicle safety of customer privacy.
Screen shot 2018 02 21 at 11

Check Point releases January's 'most wanted' malware

Wed, 21st Feb 2018
#
malware
#
crypto
#
blockchain
23% of organisations around the world were affected by Check Point's 'most wanted' malware in January, a 'lucrative' revenue stream for criminals.
Thinkstockphotos 641517852

United States hot on heels of North Korea's Hidden Cobra malware

Mon, 19th Feb 2018
#
malware
#
ddos
#
cybersecurity
The United States Computer Emergency Readiness Team (US-CERT) is honing in on the North Korean Government's activities known as HIDDEN COBRA.
Thinkstockphotos 880737456

New email spam campaign ditches traditional Office macro infection tactic

Mon, 19th Feb 2018
#
malware
#
email security
#
cybersecurity
A new wave of spam emails use Microsoft Office documents to download password stealers without having to activate Macros.
Thinkstockphotos 532528931

CSU to explore Dark Web's underbelly after unprecedented interest from students

Fri, 16th Feb 2018
#
education, learning & training
#
it masters
#
dark web
IT Masters and Charles Sturt University (CSU) will plunge headfirst into the Dark Web this year, and it appears IT professionals are curious.
Screen shot 2018 02 15 at 12

New advisory platform finds 41m PDFs part of a cyberattack in last 3 months

Fri, 16th Feb 2018
#
malware
#
firewalls
#
ransomware
Barracuda announced the availability of its new platform that provides advanced threat trends in real time - along with some shocking findings.
Thinkstockphotos 846400236 1

Uptime Institute to start testing hybrid IT resiliency

Thu, 15th Feb 2018
#
hybrid cloud
#
hyperscale
#
cloud services
The number of organizations with complex infrastructures comprised of multiple data centers, colocation facilities and the cloud is on the rise.
Thinkstockphotos 481086900

Attackers unleash Lokibot malware on unpatched Windows systems

Tue, 13th Feb 2018
#
malware
#
cybersecurity
#
microsoft
Lokibot malware targets unpatched Windows systems exploiting CVE-2017-11882; researchers urge timely updates and restricted installer access to combat threats.
Thinkstockphotos 689019766

Criminals exploit SSL encryption & free certificates in malware attacks

Mon, 12th Feb 2018
#
encryption
#
zscaler
#
ssl certificate
Firms may not inspect SSL traffic because they assume it comes from trusted sources. That has now changed and SSL is now a 'significant' blind spot'.
Screen shot 2018 02 09 at 10

Survey finds businesses stung with $16m hidden cybersecurity costs every year

Fri, 9th Feb 2018
#
malware
#
endpoint protection
#
edr
New research from Bromium has found the hidden costs of 'detect-to-protect' security are immense with businesses being blindsided every year.
Thinkstockphotos 613026810

Japan firm Nihon Cornet to deliver BlackRidge next-gen cybersecurity

Wed, 7th Feb 2018
#
cybersecurity
#
healthtech
#
resellers
Japan-based network & cybersecurity provider Nihon Cornet Technology is working with defense provider BlackRidge Technology to deliver the solutions.
Thinkstockphotos 507567848

Why trusted identities will create more intelligent experiences this year

Mon, 5th Feb 2018
#
iam
#
cybersecurity
#
hid global
This year, identity tech, driven by trusted identities, will create more intelligent experiences through IoT, cloud and data analytics, predicts HID Global.
Saas

Probax empowers partners to move away from legacy tape

Thu, 1st Feb 2018
#
virtualisation
#
partner programmes
#
veeam
Probax is setting out to address the challenges MSPs and system integrators face in delivering secure long-term storage as a service.