Application security

Secure, Pinpoint Location with UWB-Enabled Indoor Positioning

Indoor positioning is, in many ways, an inside version of the satellite-navigation apps we rely on for outdoor navigation, but with an added twist – it can also be used to help locate people and things. Let’s say you’re at home and misplaced your car keys, or you’re in a grocery store and can’t find your favorite brand of coffee. Or maybe you’re working in a factory and need a particular tool from a storage bin, or you’re a site manager dealing with an...

EyeLock Launches ID Logical Access System With myris Solution To Enhance Work From Home Security

EyeLock LLC, the provider of iris-based identity authentication solutions, announces the release of its highly anticipated EyeLock ID® logical access system for connected workers. Recognizing that passwords and usernames are things of the past, EyeLock ID combines its myris® iris authentication device and an easy-to-use software application to enable individuals to securely logon to computers, networks, and apps. myris is handheld, USB connected, and the ideal biometric solution to faci...

Check Point Researchers Unraveled A Surveillance Operation Run By Iran-Based Threat Actors Against Regime Dissidents

Security researchers at Check Point have unraveled a six-year, ongoing surveillance operation apparently run by Iran-based threat actors against regime dissidents. Going back as far as 2014, the attackers used multiple attack vectors to spy on their victims, including hijacking victims’ Telegram accounts, extracting two-factor authentication codes from SMS messages, recording a phone's audio surroundings, accessing KeePass password manager account information, and distributing malicious T...

Check Point Software Technologies Acquires Odo Security To Provide Secure Remote Access Solutions For Enterprises

Check Point® Software Technologies Ltd., a provider of cyber security solutions globally, announces the acquisition of a new cloud-based technology that delivers secure remote access created by Odo Security. This technology will integrate with Check Point´s Infinity architecture, and become the easiest and most secure solution for enterprises need to enable employees´ secure remote access to any application. The COVID-19 pandemic has driven enterprise adoption of mass remote wor...

Check Point Research Publishes The Global Threat Index For August 2020

Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd, a provider of cyber security solutions globally, publishes its latest Global Threat Index for August 2020. Researchers found that the Qbot trojan, also known as Qakbot and Pinkslipbot, has entered the top ten malware index for the first time, ranking as the 10th most prevalent malware in August, while the Emotet trojan remains in 1st place for a second month, impacting 14% of organizations globally....

IDS To Integrate IMX541 CMOS Sensor To The UEye SE Camera Family To Deliver Outstanding Image Quality

IDS integrates the high-performance, extremely high-resolution sensor IMX541 from the Pregius S series into the versatile uEye SE camera family. Thanks to its compact 1.1" format, the 20.35 MP CMOS sensor is compatible with C-mount lenses. The industrial cameras feature a practical USB3 Vision interface, deliver 20 fps and will be available from September either as board-level models or with a robust metal housing. Improved quantum efficiency Pregius S – the fourth generation of extreme...