Security News > 2021

Isotropic secures over $40M to develop its multi-beam antennas
2021-02-09 00:00

Isotropic Systems announces that is has fully secured funding of over $40 million providing the necessary capital required to develop its multi-beam antennas. With funding in place, Isotropic Systems plans to accelerate its production phase in time to support new constellations and satellites launching in all satellite orbits from 2022 onwards.

Tanium appoins Matt Thompson to its Board of Directors
2021-02-08 23:45

Tanium announced that Matt Thompson has joined the company's Board of Directors as an independent director. "Tanium's open endpoint management platform delivers exactly what business leaders working in a complex environment crave: a solution that easily plugs into the existing tech stack to give them real-time visibility and control across their endpoint landscape. I look forward to being a member of the Board of Directors and helping accelerate the next chapter of Tanium's growth."

Nomination Committee of Securitas proposes election of Jan Svensson as Chair of the Board of Directors
2021-02-08 23:30

The Nomination Committee of Securitas proposes the election of Jan Svensson as the new Chair of the Board of Directors at the Annual General Meeting on 5 May 2021. The Committee also proposes the election of Gunilla Fransson, Harry Klagsbrun and Johan Menckel as new members of the Board.

Hackers tried poisoning town after breaching its water facility
2021-02-08 22:50

A hacker gained access to the water treatment system for the city of Oldsmar, Florida, and attempted to increase the concentration of sodium hydroxide, also known as lye and caustic soda, to extremely dangerous levels. The attack on the computer system at Oldsmar water treatment system happened on Friday at 1:30 PM, through a remote desktop software that allowed authorized users to troubleshoot system problems remotely.

Hacker Tried Poisoning Water Supply After Breaking Into Florida's Treatment System
2021-02-08 22:49

Hackers successfully infiltrated the computer system controlling a water treatment facility in the U.S. state of Florida and remotely changed a setting that drastically altered the levels of sodium hydroxide in the water. "At no time was there a significant effect on the water being treated, and more importantly the public was never in danger," Sheriff Gualtieri said in a statement.

Remote Hacker Caught Poisoning Florida City Water Supply
2021-02-08 22:11

U.S. law enforcement agencies are investigating a remote compromise of a Florida city's water plant, warning that the hackers tried to poison the water supply serving approximately 15,000 residents. The hack was spotted on February 5th - and neutralized - in real time by staff at the plant that supplies water to Oldsmar, a small city close to Tampa, Florida.

Top 5 reasons not to use fear to encourage security compliance
2021-02-08 22:06

Security is important in any organization, but getting employees to follow protocol can be a challenge. Oh, these people who are using insecure passwords, clicking open phishing emails and installing malicious apps-why don't they understand? We'll show them, right? If you don't follow the security protocols, you're in for it.

Why you shouldn't use fear to encourage security compliance: 5 reasons
2021-02-08 22:03

Security is important in any organization, but getting employees to follow protocol can be a challenge. Tom Merritt offers five reasons why using fear-based motivation techniques is not ideal.

How to easily check if an email is legit or a scam, and protect yourself and your company
2021-02-08 21:41

Because my email address is public, most of these messages are unsolicited; a few might even be dangerous. Scam emails often look real; they're personalized and can be quite convincing.

Can your organization obtain reasonable cybersecurity? Yes, and here's how
2021-02-08 21:21

Cybersecurity expectations are vague, and that has to change if there is any chance of approaching a reasonable amount of cybersecurity. A good first step, they said, is to use the Center for Internet Security's Critical Security Controls as the authoritative source.