The analyzed systems include Lobby Track Desktop (Jolly Technologies), EasyLobby Solo (HID Global), eVisitorPass (Threshold Security), Envoy Passport (Envoy), and The Receptionist (The Receptionist). A total of 19 vulnerabilities were discovered in these systems, and their successful exploitation could lead to exfiltration of data such as visitor logs, contact information, or corporate activities; complete takeover…

Barcelona – Mobile World Congress – February 27, 2019 – Cisco CEO Chuck Robbins and Telenor Group CEO Sigve Brekke met today to further strengthen the companies’ strategic collaboration by signing a Joint Purpose Agreement 2.0. Together, Cisco and Telenor Group will expand their joint innovation across cybersecurity, cloud and the digital workplace, and willexplore Open Virtualized RAN…

Launched in September 2018, Microsoft Threat Protection (MTP) integrates a number of Microsoft services to provide a fully integrated, end-to-end solution for securing the entire attack surface of enterprises: identities, endpoints, user data, cloud apps, and infrastructure. Since MTP’s launch, Microsoft has slowly been polishing the offering by adding new and improved features such as…

Luminate Delivers Private Secure Application Access to All Users, Regardless of Device, Location or Infrastructure; Significantly Extends Symantec’s Leadership in Cloud Security Beyond Alternative Approaches MOUNTAIN VIEW, Calif. – Feb. 12, 2019 – Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, today announced the acquisition of Luminate Security, a privately held company with pioneering…

Consumer concern about cybersecurity and privacy is very real but not evenly distributed, a new report shows: while passwords and financial information are worrying for everyone, concern about other information varies widely depending on the individual’s age, gender, and national origin. The RSA Data Privacy & Security Survey 2019 of more than 6,000 adults contains…

Application innovation is at the heart of the digital economy. A new era of apps is redefining what data centers are and need to be capable of supporting. Because today, the data center is no longer a fixed place. It exists wherever data is created, processed and used. That is why Cisco is announcing a…

Amid a maelstrom of cybersecurity threats and rampant hacking attempts that leverage the power of the IoT against itself, organizations are forced to realize that they are on the losing side of this war. As such, market vendors have no choice but to enhance their cybersecurity arsenal with more sophisticated tools which allow a deeper…

The vulnerabilities impact the Windows and macOS versions of Acrobat and Acrobat Reader DC (Continuous and Classic 2015 tracks), and Acrobat and Acrobat Reader 2017 products. The list of security holes includes various types of critical bugs that can lead to arbitrary code execution, including buffer errors, untrusted pointer dereference, use-after-free, and heap overflow. The…

BARCELONA, Spain, Nov. 06, 2018 (GLOBE NEWSWIRE) — Today at VMworld 2018 Europe, VMware, Inc. (NYSE: VMW) showcased how, in collaboration with its customers and partners, it is shaping the future of cloud, mobile, networking and security – as well as innovating in emerging areas like containers, IoT, edge computing, artificial intelligence and machine learning. On stage at VMworld…

Where there’s money, there has always been crime. Traditional bank robbery and physical assaults on ATMs are still a challenge, and now a new breed of cyber-enabled theft—using ATMs as the endpoint for cash-outs— has become a multibillion-dollar problem. One recent raid saw $13.5m stolen from India’s Cosmos Bank. Although the FBI issued a warning…