News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

When hackers exploit unsecured video conferences 
When hackers exploit unsecured video conferences - Image by Alexandra_Koch on Pixabay

German companies and municipalities risk enormous damage from cyber attacks in the near future. Highly secure video conferences, certified by the BSI, are one aspect that can ward off hacker attacks. Many video platforms have security gaps and make companies vulnerable. The economy currently lacks more than 100.000 specialists for cybersecurity - a need that cannot be met in the foreseeable future. The good news is that companies cannot only increase the security of their IT infrastructure by hiring cybersecurity experts. When securing your own video conferences, for example, it already helps to switch to highly secure software to make life difficult for criminals.

Read more

ALPHV claims to have hacked camera manufacturer Ring
B2B Cyber ​​Security ShortNews

In addition to many private users, the provider Ring also supplies small companies with cameras, surveillance systems and video doorbells. Now the Amazon subsidiary Ring can be found as a victim on the ALPHV or BlackCat leak page. As soon as the APT group ALPHV or BlackCat has hacked a company, it is publicly exposed on its leak page. Normally, it always says when and how much data was stolen. Because the goal of the group is always multiple blackmail. First the company is hacked and then the data is encrypted using ransomware. But before that, the group still transports a…

Read more

Messages, video and phone with end-to-end encryption
Messages, video and phone with end-to-end encryption

Ring Central wants to offer more communication security and fewer compliance risks with end-to-end encryption (E2EE) in its products. E2EE was already integrated in video communication. Now also for message and telephone to be GDPR compliant. RingCentral introduces End-to-End Encryption (E2EE) support to RingCentral MVP, which in the future will include not only video but also message and phone. E2EE technology prevents unauthorized third parties from gaining access to users' communication content. For security-conscious companies, the solution offers an even higher level of security and data protection for confidential communication as well as protection against...

Read more

Teslas as a dangerous data source?
Teslas as a dangerous data source?

Tesla's Model 3 have a so-called Sentry Mode. Cameras record the surroundings, film processes and determine the position. Tesla collects all data in a Dutch headquarters and stores it there. Is this a dangerous data source if Tesla's properties are recording secret services or military areas? The data stored by Tesla on the Model 3 is certainly interesting for data thieves, as many Teslas film in sentry mode and note the position. Even the Munich police are said to have used the data in one case to arrest a con artist. Many official…

Read more

Cloud video surveillance: local display stations
B2B Cyber ​​Security ShortNews

Eagle Eye Networks integrates local display stations into its cloud-based video management system. The local display stations stream up to 164 live video images simultaneously for a wide range of video usage. Up to 32 cameras on each standard TV screen, up to 164 cameras on multiple screen pages, low-latency, razor-sharp and clear video display with customizable layouts that are controlled and managed from the cloud: this is how the profile of the Local Display Station reads , newly introduced by Eagle Eye Networks, the global leader in cloud video surveillance. The network appliance is available in two versions - as a single display model DS100 and as a double display model DS200. Both…

Read more