TelcoNews New Zealand - Telecommunications news for ICT decision-makers

HID stories - Page 59

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Screen shot 2018 03 19 at 12

Cryptomining malware affected 42% organisations worldwide in Feb

Tue, 20th Mar 2018
#
malware
#
cybersecurity
#
cybercrime
This persistent threat not only continues to chip away at enterprise CPU power, but once inside a network can carry out other malicious acts.
Bayonetta  2 00

Bayonetta 2 comes to Switch

Mon, 19th Mar 2018
#
gaming
#
network infrastructure
#
digital entertainment
Nintendo Switch users can now enjoy Bayonetta 2, a former Wii U exclusive, which includes a download code for the original game in boxed copies.
Xr500 launch 03

Netgear launches their first gaming router

Sat, 17th Mar 2018
#
netgear
#
router
#
xr500
Netgear launched their new XR500 gaming router at a special event in Sydney. FutureFive was there to check it out.
Thinkstockphotos 469225644

Cybercriminals laundering $200b in ill-gotten gains – here's how

Sat, 17th Mar 2018
#
gaming
#
crypto
#
blockchain
​A new report from Bromium has landed with a number of startling findings, including the confirmation of a bustling cybercrime laundry market.
Thinkstockphotos 924555558

Pegasystems: Making the art of selling smarter with AI

Thu, 15th Mar 2018
#
data analytics
#
martech
#
planning
Pegasystems launches AI-powered Pega Sales Coach to help sales managers develop better salespeople in real time.
Thinkstockphotos 679955692

Avaya brings AI on board with acquisition of Spoken Communications

Thu, 15th Mar 2018
#
uc
#
blockchain
#
ai
Avaya has closed its acquisition of Spoken Communications, boosting its cloud-based solutions and customer experience management.
Screen shot 2018 03 14 at 11

New study details how easy it is for hackers to steal your data

Thu, 15th Mar 2018
#
malware
#
cybersecurity
#
hackers
It's no secret that web browsers store a substantial amount of sensitive information about their users - hackers are taking advantage of this.
Test 940 530

Hands-on Review: ASUS ROG STRIX XG35V curved gaming monitor

Wed, 14th Mar 2018
#
gaming
#
digital signage
#
digital entertainment
ASUS's ROG STRIX XG35V offers gamers a stunning ultra-wide display with a 100Hz refresh rate and AMD's FreeSync.
Thinkstockphotos 585147856

Check Point expands portfolio to continue fight against Gen V cyber attacks

Tue, 13th Mar 2018
#
cybersecurity
#
cyber attacks
#
ipsec
Check Point partners with IPSec to offer 24x7 SOC services, expanding its security portfolio against Gen V cyber attacks and enhancing enterprise protection.
Screen shot 2018 03 12 at 10

New research finds China tampering with public vulnerability data

Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
Linksys wrt32x 01

Hands-on Review: Linksys WRT32X Gaming Router

Mon, 12th Mar 2018
#
gaming
#
digital entertainment
#
router
Linksys' WRT32X Gaming Router boasts superior performance for discerning gamers. FutureFive's Darren Price takes a look.
Ashish   new3

Interview: Exposing the dark web, its secrets and why it's a major concern for businesses

Wed, 7th Mar 2018
#
malware
#
crypto
#
blockchain
The dark web is often touted as the place cybercriminals sell their malware, but what is the fuss all about? Verizon's Ashish Thapar explains.
Screen shot 2018 03 06 at 12

REPORT: Ransomware decreasing in quantity but increasing in potency

Wed, 7th Mar 2018
#
malware
#
ransomware
#
supply chain
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
Commerce commition

NZ Commerce Commission warns consumers to stay away from dodgy ticket site

Tue, 6th Mar 2018
#
cybersecurity
#
google
#
commerce commission
The NZ Commerce Commission warns consumers against using Viagogo following 228 complaints about fake tickets, hidden fees, and misleading claims.
Thinkstockphotos 696067380

Criminals abuse email attachments to cash in on 'booming' black market for stolen passwords

Fri, 2nd Mar 2018
#
firewalls
#
email security
#
breach prevention
Barracuda warns of a 'booming black market' for stolen passwords as cybercriminals increasingly use phishing emails to distribute malware.
Thinkstockphotos 529747065

Insights on industrial vulnerability: How secure is your OT infrastructure?

Mon, 26th Feb 2018
#
firewalls
#
network infrastructure
#
encryption
Addressing the requirements of an OT network is now more important than ever and requires an integrated approach.
Thinkstockphotos 519829270

Q4 malvertising levels drop; but scammers aren't finished yet

Fri, 23rd Feb 2018
#
mssp
#
riskiq
#
malvertising
Malvertising may be going out of fashion for cyberattackers across the board, but it doesn't mean web users can rest easy.
Thinkstockphotos 903182690

Hackers exploit Tesla's AWS servers to mine cryptocurrency

Thu, 22nd Feb 2018
#
devops
#
datacentre infrastructure
#
hyperscale
Tesla is reassuring customers that a recent cryptojacking has not compromised vehicle safety of customer privacy.
Screen shot 2018 02 21 at 11

Check Point releases January's 'most wanted' malware

Wed, 21st Feb 2018
#
malware
#
crypto
#
blockchain
23% of organisations around the world were affected by Check Point's 'most wanted' malware in January, a 'lucrative' revenue stream for criminals.
Thinkstockphotos 533557042

Assessing the rising threat of encrypted tunnels

Wed, 21st Feb 2018
#
endpoint protection
#
encryption
#
edr
Venafi senior technical manager Nick Hunter takes a look at five key threats posed by encrypted tunnel attacks.