by: Steve Bowcut




Kaspersky Lab researchers have found a new crypto-currency miner – PowerGhost – which has hit corporate networks in several regions Kaspersky Lab reported yesterday, “Recently, an interesting miner implementation appeared on Kaspersky Lab’s radar. The malware, which we dubbed PowerGhost, is capable of stealthily establishing itself in a system and […]

PowerGhost Cryptominer Targets Business PCs and Servers





As readers of this online security magazine largely understand, Cryptocurrency mining is the process by which transactions are verified and tallied to the public ledger, known as the blockchain, and also the means through which new currency is released. Anyone with access to the internet and suitable computer processing power […]

Malicious Cryptocurrency Miners Gaining Momentum, Poised for Continued Growth



Findings were reported today by HelpNet Security that  3,000+ mobile iOS and Android apps are potentially leaking PII data from unsecured Firebase databases.  So far, affected apps have been downloaded 620 million times for Android devices (the iOS download rate is unknown). Researchers with Appthority say 62% of enterprises are likely impacted by […]

3,000+ mobile apps leaking data from unsecured Firebase databases – ...


Business continuity is a concept that refers to the planning and preparation to make sure a company overcomes serious incidents or disasters and resumes its normal operations within a short period of time. This concept includes the following key elements: Resilience: critical business functions and the supporting infrastructure must be […]

Business Continuity Plans for Banks


Big business loves big data.  Data is the fuel needed for today’s enterprise to move forward or to change direction.  Video is simply more data.  As security video has moved away from analog streams stored on tapes toward the ones and zeros more familiar to data analysts, businesses have been eyeing video […]

Cloud Video as a Service for Visibility into your Connected ...





Electronic access control systems do a great job of restricting access through openings that are designed to be used by your employees and vendors.  No valid card, no entry.  But, for many organizations, that is not where most people enter their facility.  It’s the main lobby or other public entrances […]

From Access Control to Visitor Management – What Super Enterprises ...