Top Stories


IoT Cybersecurity Bill Advances to Full Senate

IoT Cybersecurity Bill Advances to Full Senate

The IoT Cybersecurity bill, which was introduced in March, passed through the Senate Homeland Security and Governmental Affairs last week and is now headed to the full Senate for a vote.

Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

While cloud services are becoming increasingly popular for business use, cyberattacks on cloud services are also growing. This has prompted a rise in cloud security software.

Police Forces Take the Streets After Netherlands Telephone Outage

Police Forces Take the Streets After Netherlands Telephone Outage

After a major telephone outage in the Netherlands took down the nation’s emergency phone number yesterday, police forces took the streets to ensure people could contact emergency services through them.

Google Fixes Nest Security Issue

Google Fixes Nest Security Issue

After a Facebook user discovered that the old Nest owners were able to see screenshots from their Nest’s new home, even after factory resets, Google quickly stepped in to resolve the security issue.

Insecure Data Storage in Mobile Applications Poses Security Issues

Insecure Data Storage in Mobile Applications Poses Security Issues

Users’ data might be more at risk than they realize. A new study shows that three quarters of mobile application have insecure data storage issues, putting passwords, financial information, personal data, and correspondence at risk.

5-Port Switch

5-Port Switch

California Police Forces Use

California Police Use 'HP RoboCop' to Help Patrol

Police use new autonomous data machine with 360-degree HD video as an extra set of eyes for areas where police are not consistently present.

Florida City Pays Almost $600,000 Ransom to Secure Records

Florida City Pays Almost $600,000 Ransom to Secure Records

After three weeks of city data being encrypted in Riviera Beach, Florida, city officials have unanimously voted to pay the hefty ransom to regain access.



Security Scare Causes Panic in Honolulu Airport

Security Scare Causes Panic in Honolulu Airport

Two laptops overheated while being screened Tuesday at the Daniel K. Inouye International Airport. The overheating caused popping sounds and smoke, bringing about false reports of an active shooter.

CISA Warns Microsoft Users to Patch Systems to Protect Against BlueKeep

CISA Warns Microsoft Users to Patch Systems to Protect Against BlueKeep

Through the BlueKeep vulnerability, it is possible to achieve remote code execution on vulnerable devices. Since the virus can spread, if it’s not contained, it could trigger a much bigger problem.

Oregon Department of Human Services Breach Affects 645,000 Clients

Oregon Department of Human Services Breach Affects 645,000 Clients

In March, the department announced that 350,000 clients had been affected by a data breach in January 2019. On Tuesday, they updated the number and announced that 645,000 clients had been affected.

Man Arrested for Attempting to Rush Through Phoenix Security Checkpoint

Man Arrested for Attempting to Rush Through Phoenix Security Checkpoint

After attempting to rush through a security checkpoint at the Phoenix Sky Harbor International Airport, a man was arrested and booked on multiple charges, including five counts of misdemeanor assault.

HID Global Brings High-Assurance Authentication to Broader Markets with New Cloud-Based Credential Management Solution

The HID Credential Management Service includes everything needed to issue and manage the lifecycle of digital identity and high-assurance credentials using a cloud delivery model.

EatStreet Data Breach Risks Customers, Restaurants, Deliverers’ Information

EatStreet Data Breach Risks Customers' Information

In May, EatStreet experienced a data breach that compromised certain customers', restaurants', and deliverers' information. The service just recently disclosed the security breach.

Computer Science Student Shows Venmo Transactions Can Be Easily Acquired

Computer Science Student Shows Venmo Transactions Can Be Easily Acquired

A year after a privacy researcher showed the world that Venmo transactions could be easily accessed, a computer science student scraped seven million Venmo transactions to increase awareness of the issue.

Global Stadium Security Market to Rise to 16057 USD by 2025

Global Stadium Security Market to Rise to US$ 16057.6 Mn by 2025

A report by Fortune Business Insights projects the global stadium security to grow rapidly over the next few years. The analysis estimates that the United States and Canada will lead the charge, with the Asia Pacific experiencing high growth as well.

Aeroturn Expands Its Footprint With New Installation On West Coast & Significant Investments in Internal Resources

Leading Connecticut-based turnstile manufacturer Aeroturn continues to expand its horizons with new turnstile project on west coast & investments in internal resources.

Four Shot, Three Arrested at Toronto Raptors Rally, Police Say

4 Shot, 3 Arrested at Toronto Raptors Rally, Police Say

Following the shooting of four people at the Toronto Raptors rally, three suspects were arrested. The suspects are to appear in court today.

Gunman Opens Fire on Dallas Courthouse

Gunman Opens Fire on Dallas Courthouse

According to the police, the suspect, a 22-year-old male has died after exchanging gunfire with federal officers. The suspect opened fire outside the Earle Cabell Federal Courthouse in Downtown Dallas.

Report reveals Russian Hackers May Be Responsible for $530 Million Cryptocurrency Hack

Report reveals Russian Hackers May Be Responsible for $530 Million Cryptocurrency Hack

It was previously believed that North Korean hackers were behind the January 2018 Coincheck hack, but recent developments in the investigation suggest that Russian actors may have been responsible.

Mission 500 Announces New Board of Director Members

The new members have established security industry experience.

Yubico Replaces Security Keys Due to Hardware Flaws

Yubico Replaces FIPS Series Security Keys Due to Hardware Flaws

Yubico discovered a hardware flaw in YubiKey FIPS Series devices in mid-March and since then, has updated the firmware version to one that does not contain the bug, as well as replaced the majority of affected devices.

Infusion Pump Vulnerabilities Could Offer Hackers Route To Control

Infusion Pump Vulnerabilities Could Offer Hackers Route To Control

Researchers at CyberMDX uncovered two vulnerabilities in older versions of an infusion pump that could allow hackers to gain control over the onboard computer.

Security researcher discovers bug within SymCrypt

Google vulnerability researcher discovers bug within SymCrypt

Tavis Ormandy, one of Google’s “Project Zero” team’s security researchers discovered a vulnerability that could effectively perform a denial-of-service attack on Windows servers. There is a 90-day disclosure deadline associated with Project Zero, and since it was day 91, Ormandy released the information.

The Internet of Things and the security challenges it creates for small business

The Internet of Things and the security challenges it creates for small business

Managing the traditional limitations of time and resources means that running a small business on a budget is a challenge, but these difficulties become more pronounced when resources are stretched even further by the increased security demands of new technology.

Telegram App Targeted in DDoS Cyberattack

Telegram App Targeted in DDoS Cyberattack

An DDoS attack aimed at slowing connectivity for the Telegram app took place this week. The cyberattack coincided with large protests in Hong Kong, and with most of the IP addresses coming from China, it is speculated that they were involved in the attack.

Kapersky Researchers Warn Google Calendar Users Against New Phishing Attacks

Kapersky Researchers Warn Google Calendar Users Against New Phishing Attacks

Kapersky security researchers have identified a new phishing attack that takes place in Google Calendar. Threat actors send a Google Calendar invitation to a user that contains a malicious link hosting a phishing URL.

Global Perimeter Security Market Expected to Experience Large Growth

Global Perimeter Security Market Expected to Experience Large Growth

According to research done by Grand View Research, the global perimeter security market is projected to reach USD 29.6 billion by 2025.

Study Findings Show Dark Net Poses Great Risk to Large Enterprises

Study Findings Show Dark Net Poses Great Risk to Large Enterprises

Bromium®, Inc. has announced the findings of ‘Behind the Dark Net Black Mirror,’ a study that showed the growing risk posed by the dark net to the enterprise.

More than One in Five Americans Have Cancelled or Considered Cancelling Plans to Attend Large-Scale Sporting Events and Concert Festivals Due to Concerns About Their Physical and Cyber Safety – New Unisys Security Index™

Security barometer shows 83% of Americans are concerned about a criminal attack causing physical harm at large-scale events, with half of respondents extremely or very concerned.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3