This message was sent to ##Email##
|
November 12, 2019 |
| | | |
|
|
IAPSC
If you participated in the recent IAPSC member survey, we thank you. Every response will help us enhance your membership’s value, make decisions on locations for future conferences and much more.
As promised, there was a random drawing of all survey participants, and… the winner is: Jim Townzen. Congratulations, Jim, you will hear from us soon on how to claim your prize!
If you forgot to send in your feedback, don’t worry, there will be more chances to do so in the future.
|
ONVIF conformant products allow you to create a flexible, cost-effective and future-proof system. ONVIF enables you to choose optimal products from different vendors. The
conformant products allow you to be confident in their interoperability and makes integration of products from different vendors easier.
Read more
|
|
|
|
|
Reach Your Prospects Every Week
Thousands of industry professionals subscribe to association news briefs, which allows your company to push messaging directly to their inboxes and take advantage of the association's brand affinity.
Connect with Highly Defined Buyers and Maximize Your Brand Exposure
|
|
|
|
|
IAPSC
Earning the Certified Security Consultant designation demonstrates your depth of knowledge, professional objectivity, integrity, and skills as a security consultant. The CSC requires a combination of experience, education, independence, ethics, and successfully passing an online examination. The exam is open to both members and non-members as well as independent (external) and internal consultants. IAPSC members are pre-qualified to sit for the exam and receive a discount on the certification fee. Learn more here and apply today!
ZDNet
An open database exposing records containing the sensitive data of hotel customers as well as U.S. military personnel and officials has been disclosed by researchers.
Recently, vpnMentor's cybersecurity team, led by Noam Rotem and Ran Locar, said the database belonged to Autoclerk, a service owned by Best Western Hotels and Resorts group.
READ MORE
Cyware
Researchers noted that the ransom letter used in this campaign is almost similar to the one used in 2017 by another DDoS ransom gang that also posed as the Fancy Bear group.
READ MORE
Tripwire
Digital fraudsters have launched a new phishing campaign that uses a salary increase scam to trick employees into handing over their credentials.
Spotted by the Cofense Phishing Defense Center, the campaign used spoofing techniques to trick recipients into thinking that the attack emails came from their HR department.
READ MORE
Symantec
Apple iOS and macOS are prone to multiple security vulnerabilities. Attackers can exploit these issues to gain sensitive information or execute arbitrary code. This may aid in further attacks.
READ MORE
Dark Reading
An unprotected Elasticsearch database left the account details of 7.5 million Adobe Creative Cloud customers exposed to anyone with a Web browser. The open database, since closed, could have provided information such as names, email addresses and Creative Cloud applications used to any curious individual.
READ MORE
ZDNet
A form of trojan malware which has been used by cyber criminals to steal login credentials and other information from victims for over five years has been updated with the ability to hide in plain sight by using legitimate Java commands to mask its malicious behaviour.
The Adwind remote access trojan (RAT) – also known as AlienSpy and jRAT – first emerged in 2013 and is available 'as-a-service' to criminals who want to use its credential, keylogging, audio recording and other trojan malware capabilities against victims.
READ MORE
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|