• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: password

Cloudflare Phishing

How One Large Tech Company Thwarted a Highly Sophisticated Phishing Attack

Cloudflare says a reliance on physical security keys, robust cybersecurity tools and awareness helped stop a sophisticated phishing attack.

August 11, 2022 Zachary Comeau Leave a Comment

Phishing attacks are becoming all too common, and they are becoming increasingly sophisticated, leveraging text messages to trick employees not clicking links. However, the use of multi-factor security keys, robust security practices and a strong culture of security can help thwart them, as evidenced by a recent attack against Cloudflare. The web performance and security […]

Read More

Vulnerability Dahua ONVIF

Vulnerability Discovered in Dahua’s ONVIF Implementation

The vulnerability could be abused by attackers to access Dahua cameras with full privileges, including watching live video footage.

August 5, 2022 TD Staff Leave a Comment

Cybersecurity firm Nozomi Networks recently revealed it had discovered a new vulnerability affecting the implementation of an Open Network Video Interface Forum (ONVIF) authentication mechanism in some IP cameras developed by Dahua Technology. According to a blog post by the cyber experts, this vulnerability could be abused by attackers to compromise Dahua network cameras by sniffing a […]

Read More

3CX Hack Supply Chain attack compromise

These are the Top 11 Malware Strains Observed in 2021

These are the top malware strains that IT and security professionals should protect against, according to U.S., Australian cybersecurity officials.

August 5, 2022 Zachary Comeau Leave a Comment

A new joint cybersecurity advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) details the 11 most-observed malware strains from the last year, including remote access Trojans, banking Trojans, information stealers and ransomware. In the advisory, CISA along with the ACSC says most of these top malware […]

Read More

SolarWinds IT Pro Day

This Week in IT: Teams and Apple Silicon, Cloud Leaders, VMware and Cisco Patches

Better Teams performance on Macs, cloud infrastructure market data, critical patches and cyber threats highlight this week's IT news.

August 4, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. Microsoft Teams on Macs with Apple silicon Microsoft will be rolling out […]

Read More

router vulnerabilities security flaws

Router Security Flaws Surge to Record Heights

Router security flaws may expose individuals and corporate networks to cybersecurity dangers. Here's how to secure your home WiFI network.

August 4, 2022 TD Staff Leave a Comment

With the rise of remote work, routers are gaining more attention. Remote work opens the possibility for hackers to breach corporate security by abusing old and unpatched home routers, according to Atlas VPN. Router flaws may expose individuals and corporate networks to cybersecurity dangers such as hacking, data breaches, financial fraud, industrial espionage and others. […]

Read More

Digital Workflow

How to Win at Cybersecurity: Become a “Sneaker” CISO

Too many security pros today are so deep into the technology that they don’t pay enough attention to the people and processes.

August 4, 2022 Tony Carothers Leave a Comment

To protect against cybercrime, every organization needs to build a culture of information security. To do that, infosec leaders need to become “sneaker CISOs.” There are three elements to security: Technology, people and processes. Sneaker CISOs are more focused on people and process than on technology. Too many security professionals today are so deep into […]

Read More

Home Office Cybersecurity security

5 Tech Security Ideas for Creating a Safe Home Office

When working from home, the heightened cybersecurity risks that come with working outside of a secure corporate network must be addressed.

August 2, 2022 Kate Jones Leave a Comment

Working from home can create a great sense of freedom and flexibility, but it comes with its challenges. When working from home, the heightened cybersecurity risks that come with working outside of a secure corporate network must be addressed for optimal protection. Should someone hack into your home office or Wi-Fi network, your computer and […]

Read More

IT news, This Week in IT

This Week in IT: macOS Bug, New Google Cloud Offerings, Phishing Attacks, Autopatch, and More

Security research, threat trends and the general availability of Microsoft's AutoPatch highlight this week's IT news.

July 14, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. Microsoft Discovers macOS App Sandbox escape bug Microsoft says it […]

Read More

McAfee and Telstra Partner to Bring Privacy, Identity and Security Solutions to Customers Across Australia

July 10, 2022 TechDecisions Staff Leave a Comment

The partnership brings added protection to Telstra’s millions of customers and their devices via McAfee’s intuitive and integrated consumer security platform SAN JOSE, Calif.–(BUSINESS WIRE)–Today, McAfee Corp., a global leader in online protection, announced a multi-year partnership with Telstra, Australia’s leading telecommunications and technology company, to deliver comprehensive protection to safeguard the privacy and identity […]

Read More

PowerShell Cybersecurity

How to Secure PowerShell and Use it for Cybersecurity Defense

Cybersecurity agencies say organizations should take several steps to secure PowerShell and keep it from being used in cyberattacks.

July 6, 2022 Zachary Comeau Leave a Comment

PowerShell is an incredibly effective tool that allows IT administrators to automate repetitive tasks and is particularly useful in helping to protect and manage the cybersecurity of Windows operating systems. However, those same capabilities are just as useful for hackers after gaining initial access to a network,  with PowerShell scripts being used to weaken intrusion […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Interim pages omitted …
  • Page 53
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.