A burglary suspect was shot by a security guard after forcefully making his way inside the lobby of a news station.
- By Sydny Shepard
- Oct 24, 2018
Students at three universities can now access their student ID cards on their iPhone.
- By Sydny Shepard
- Oct 23, 2018
Facebook has seen some data breaches in the last few months, leading the company to look into acquiring a cybersecurity company.
- By Sydny Shepard
- Oct 23, 2018
More than $1.41 million in civil claims were levied against air travelers who broke firearms laws at airports last year.
- By Sydny Shepard
- Oct 23, 2018
These days, it’s a standard requirement of security devices to perform smarter in the way they think as the importance of data capture and the opportunities provided by connected infrastructures and the IoT become more prevalent.
Encryption apps are only as secure as you make them.
- By Sydny Shepard
- Oct 22, 2018
Massachusetts city works to improve security with surveillance cameras.
- By Sydny Shepard
- Oct 22, 2018
Amazon’s facial recognition software, called Rekognition, analyzes footage from video surveillance and works to identify the people in it by scanning their faces and searching databases.
- By Jessica Davis
- Oct 22, 2018
The barriers were added as part of the newspaper’s efforts to increase security amid heightened hostility toward the media.
- By Jessica Davis
- Oct 19, 2018
Henneberry said he wants to increase video surveillance in Asbury because private security camera footage was used by investigators in the Tibbetts case.
- By Jessica Davis
- Oct 19, 2018
In a letter to those affected by the 2008 data breach, Yale said the breach was discovered on June 16, 2018, during a security review of its servers. After the university discovered the breach, it notified those affected and offered credit monitoring services and identity theft prevention tips.
- By Jessica Davis
- Oct 19, 2018
The information made vulnerable by the flaw would have let hackers obtain information they could use for phishing scams, harassment and other campaigns.
- By Jessica Davis
- Oct 19, 2018
Manufacturer’s Sales Rep Firms Combine Resources and Contacts to Increase Footprint in the Midwest
"Without the cameras, it presents a danger to officers who can't monitor the prisoners without direct contact,” said Lt. Alan Fiorilla in a report to City Manager Nick Villano. "This leaves the officers vulnerable."
- By Jessica Davis
- Oct 18, 2018
The Illinois National Guard is bringing in hundreds of cybersecurity experts to help ensure the integrity of the midterm elections and prevent the compromise of election results.
- By Jessica Davis
- Oct 18, 2018
If and how high-profile breaches have shifted the preferences and behaviors of U.S. consumers
- By Sydny Shepard
- Oct 17, 2018
All major browsers are dropping support for old TLS standards simultaneously.
- By Sydny Shepard
- Oct 17, 2018
The TSA Biometrics Roadmap focuses on four main goals: 1. Partnering with U.S. Customs and Border Protection on biometrics for international travelers, 2. Using biometrics provided by TSA PreCheck members to enhance the travel experience, 3. Expanding biometrics to additional domestic travelers and 4. Developing the infrastructure for biometric technology.
- By Jessica Davis
- Oct 17, 2018
FBI Cyber arrests hacker using fake advertisements.
- By Sydny Shepard
- Oct 17, 2018
Numerous PlayStation 4 users reported that a PlayStation Network message exploit is crashing their consoles, requiring a factory reset in order to function again.
- By Jessica Davis
- Oct 16, 2018
Eighteen payment processors from the U.S. and U.K. tested their systems for cyber attacks.
- By Sydny Shepard
- Oct 16, 2018
What can organizations do to protect against a cold boot attack?
- By Garry McCracken
- Oct 16, 2018
A security breach at a Wisconsin National Guard Unit prompted a lockdown and three arrests.
FBI Director Christopher Wray is convinced that terror groups will deploy drones to carry out attacks on American soil, and told a Senate committee that the threat of drones and other unmanned aircrafts is “steadily escalating.”
As many of you will have experienced, the planning, configuration, installation and reporting of a video security project involves multiple tools and extensive man hours to complete and document the process. Managing several projects efficiently through each phase can be a difficult task for system integrators.
Hotels and casinos on the Las Vegas Strip are increasing security with K-9 units and advanced technology.
- By Sydny Shepard
- Oct 15, 2018
In a voluntary recall, Medtronic has issued a software update to plug cybersecurity holes in programmers — which are kinds of software that physicians use to measure a connected device's performance, batter life and settings — for the company's implantable cardiac devices, according to the U.S. Food and Drug Administration.
- By Sydny Shepard
- Oct 15, 2018
Dahua Technology continues to focus on their commitment to introduce innovative and comprehensive solutions to the security industry.