eCommerceNews UK - Technology news for digital commerce decision-makers

HID stories - Page 44

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Thinkstockphotos 513132262

Ransomware is getting worse. Here's how to stop it

Fri, 13th Jan 2017
#
malware
#
ransomware
#
ai security
Sometimes victims pay the ransom and don't receive the decryption key, or find that the key doesn't work, or even find another demand for even more.
Deaf man

Exclusive - IoT: Are we deaf to the machines?

Thu, 12th Jan 2017
#
data analytics
#
martech
#
iot
From the devices in our homes, our cars, our work and even to the devices we wear, they are all talking - why are we wasting this useful information?.
Thinkstockphotos 483978146 drgt1rp

Internet privacy – can it get any worse?

Tue, 10th Jan 2017
#
ddos
#
vpns
#
data privacy
In a digital quagmire, NordVPN reveals 2016 as the grim nadir for online privacy, with prospects for 2017 looking equally dire.
Thinkstockphotos 491345218

Global cyber security highs and lows of 2016

Tue, 10th Jan 2017
#
symantec
#
adware
#
firmware
Before the close of 2016, Symantec discovered a number of new cyber security trends, helping banish a number of old and new threats.
Thinkstockphotos 160426839

'Avalanche Network' botnet hideout busted; ESET offers cleanup help

Tue, 13th Dec 2016
#
malware
#
cybersecurity
#
botnet
Cybercriminal activity hub Avalanche Network has been busted by law enforcement agencies, ending a long reign of protection for botnet operators.
Thinkstockphotos 499096877

Webroot sheds light on the short, sharp lifecycle of phishing websites

Mon, 12th Dec 2016
#
phishing
#
email security
#
ai security
84% of phishing sites exist for less than 24 hours. The average life cycle is less than 15 hours. But 400,000 phishing sites are appearing each month.
Thinkstockphotos 488314626

Speak like a data center geek: Virtualization

Fri, 9th Dec 2016
#
virtualisation
#
hyperscale
#
dc
Virtualization is, in some sense, about illusion, though not the kind that involves, um, spitting out live frogs.
Thinkstockphotos 488874360

ESET discovers a new decryption tool for Crysis ransomware

Tue, 6th Dec 2016
#
malware
#
ransomware
#
cybersecurity
ESET has launched a free decryption tool for victims of Crysis ransomware, offering a solution to recover encrypted files without paying a ransom.
Shield platform

Salesforce Shield offers superior level of data security

Tue, 6th Dec 2016
#
data protection
#
data analytics
#
martech
Introducing Salesforce Shield. Launched in July, it was built to help customers see the who, what and where information about sensitive data access.
Thinkstockphotos 511068126

Healthcare organisations in the crosshairs of Gatak

Mon, 28th Nov 2016
#
malware
#
advanced persistent threat protection
#
cybersecurity
The group behind the Gatak Trojan (Trojan.Gatak) continues to pose a threat with the healthcare sector heavily affected by attacks.
Thinkstockphotos 484125606

DDoS: A decoy to the back door, survey finds

Wed, 23rd Nov 2016
#
ddos
#
kaspersky
#
threat landscape
Survey finds DDoS attacks are often a cover for more nefarious cyber activities, with over half of firms targeted.
Digital globe8

What the U.S election means for the tech sector

Wed, 9th Nov 2016
#
healthtech
#
apple
#
facebook
As the U.S. election looms, the tech sector braces for the impact of policies by future POTUS on innovation and growth.
Thinkstockphotos 519824594

Bad customer service as a tool to distract from bad business

Wed, 9th Nov 2016
#
crm
#
cx
#
martech
Bad customer service may not just be poor training, but a deliberate shield for systemic business flaws, a troubling report suggests.
Thinkstockphotos 609064938

Smart home vulnerability: Tips for staying internet secure

Wed, 2nd Nov 2016
#
surveillance
#
smart home
#
cybersecurity
Security is only as effective as the weakest link. Therefore, it is important to secure you entire home network and the devices that connect to it.
Thinkstockphotos 472704268

Tech support scams now hide code to mask malicious intent

Fri, 28th Oct 2016
#
email security
#
cybersecurity
#
symantec
Symantec discovers another tech support scam that uses scare tactics to fool users into believing they're infected with a virus.
Plane

The dangers of in-flight Wi-Fi: Airplanes 'unique' hacking grounds

Wed, 19th Oct 2016
#
uc
#
vpns
#
wireless networks
In-flight Wi-Fi poses security risks as hackers can easily access passenger data, according to cybersecurity firm NordVPN.
Thinkstockphotos 605956402

Ransomware: Expert advice on how to keep safe and secure

Tue, 11th Oct 2016
#
malware
#
ransomware
#
cybersecurity
Paying criminals is never a good idea, even when it seems expedient. Ransomware authors are under no obligation to give you back what you pay.
Download

10 cybersecurity lessons learned from Season 2 of Mr. Robot

Mon, 26th Sep 2016
#
robots
#
cybersecurity
#
mr.robot
Cybersecurity and hacking are just plot devices the series uses to achieve its goals, but they play a major role in the series.
Thinkstockphotos 101131042

The incredible system that every IT department needs

Sat, 24th Sep 2016
#
uc
#
network infrastructure
#
sdn
Discover Netscout, the hidden gem revolutionising IT monitoring with InfiniStream, the 'big data device' essential for any tech department.
Thinkstockphotos 146925361

'Modern cities' may be smarter, but they're not much safer

Wed, 21st Sep 2016
#
smart cities
#
kaspersky
#
cyber attacks
'Modern cities' may make up thousands of different components that keep people safe and convenient, but they also come with huge vulnerabilities.