Search Results for: Smart technology Blog Post DO NOT Leave Your Smart Homes Vulnerable to Hackers February 7, 2020 The smart home can really enhance the quality of life. Imagine that you can operate the TV, dishwasher, and sweeping... Blog Post APT32 in the Networks of BMW and Hyundai December 21, 2019 APT32 in the Networks of BMW and Hyundai Car as transportation has involved a lot since it was applied in... Blog Post Facial Recognition Technology Causes Fear to 79% of Chinese Citizens December 25, 2019 In a survey of 6,100 Chinese citizens reported this month, 79% of the citizens had responded that they were worried... Blog Post Mobile Security Issues Affecting Organizations March 25, 2020 Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of... Blog Post China Ahead of Russia as the ‘Biggest State Sponsor’ of Cyberattacks on the West October 10, 2018 China has overtaken Russia as the biggest state sponsor of cyber-attacks targeting the West, according to a report from one... Blog Post What Are the Steps Towards Implementing the Zero Trust Model? January 21, 2021 Zero Trust Model is a security concept that is massively different from conventional network security. In simple words, it acknowledges... Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow.... Blog Post Cybersecurity in Smart Cities February 11, 2020 What Is Smart City? A smart city can effectively integrate and utilize the city’s resources and further improve the city’s... Blog Post LIFARS’ GARGAMEL Selected as SC Media 2021 Trust Award Finalist April 26, 2021 New York, NY – April 23, 2021 – LIFARS LLC, a leader in cybersecurity services, including incident response, digital forensics,... Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an... Blog Post Is Your Remote Work Infrastructure Secure? February 10, 2021 The pandemic situation has driven radical change in businesses. It has compelled enterprises to adapt to new working models rapidly.... Blog Post Understanding Authentication April 29, 2020 Authentication is the process of recognizing a user’s identity. It is the mechanism of associating an incoming request with a... Blog Post Be Aware of Bluetooth Attack May 1, 2020 Nowadays, there are various Bluetooth headsets, Bluetooth bracelets, car Bluetooth and so on. Since the advent of Bluetooth technology, it... Blog Post Security Flaws In Smart Buildings February 9, 2020 Smart buildings equipped with a large number of networked devices and relying on Internet control are considered easy targets for... Blog Post What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,...
Blog Post DO NOT Leave Your Smart Homes Vulnerable to Hackers February 7, 2020 The smart home can really enhance the quality of life. Imagine that you can operate the TV, dishwasher, and sweeping...
Blog Post APT32 in the Networks of BMW and Hyundai December 21, 2019 APT32 in the Networks of BMW and Hyundai Car as transportation has involved a lot since it was applied in...
Blog Post Facial Recognition Technology Causes Fear to 79% of Chinese Citizens December 25, 2019 In a survey of 6,100 Chinese citizens reported this month, 79% of the citizens had responded that they were worried...
Blog Post Mobile Security Issues Affecting Organizations March 25, 2020 Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of...
Blog Post China Ahead of Russia as the ‘Biggest State Sponsor’ of Cyberattacks on the West October 10, 2018 China has overtaken Russia as the biggest state sponsor of cyber-attacks targeting the West, according to a report from one...
Blog Post What Are the Steps Towards Implementing the Zero Trust Model? January 21, 2021 Zero Trust Model is a security concept that is massively different from conventional network security. In simple words, it acknowledges...
Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow....
Blog Post Cybersecurity in Smart Cities February 11, 2020 What Is Smart City? A smart city can effectively integrate and utilize the city’s resources and further improve the city’s...
Blog Post LIFARS’ GARGAMEL Selected as SC Media 2021 Trust Award Finalist April 26, 2021 New York, NY – April 23, 2021 – LIFARS LLC, a leader in cybersecurity services, including incident response, digital forensics,...
Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an...
Blog Post Is Your Remote Work Infrastructure Secure? February 10, 2021 The pandemic situation has driven radical change in businesses. It has compelled enterprises to adapt to new working models rapidly....
Blog Post Understanding Authentication April 29, 2020 Authentication is the process of recognizing a user’s identity. It is the mechanism of associating an incoming request with a...
Blog Post Be Aware of Bluetooth Attack May 1, 2020 Nowadays, there are various Bluetooth headsets, Bluetooth bracelets, car Bluetooth and so on. Since the advent of Bluetooth technology, it...
Blog Post Security Flaws In Smart Buildings February 9, 2020 Smart buildings equipped with a large number of networked devices and relying on Internet control are considered easy targets for...
Blog Post What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,...