Top Stories


drivers license

Report: ICE Used Facial Recognition Technology To Search Multiple State Driver's License Databases

In states where undocumented immigrants can obtain driver’s licenses, ICE has asked agencies to search for matches in their databases. Two have complied.

Chinese Soldier

China Installs Secret App to Travelers’ Phones to Monitor For ‘Objectionable Material’

The application is the Chinese government’s latest escalation of its surveillance operation of Uighurs, a Muslim minority, for supposed terrorist activity.

Amazon building

Amazon Patent Shows Potential for Drones To Be Next Frontier in Home Security

The tech behemoth already plans to roll out delivery drones. It’s now considering offering a home surveillance service to customers.

Two people using computer in office space

Five Ways to Keep Your Workplace Safe Online

Regardless of size or business type, companies must institute these basic practices to make sure their organizations are well protected from cybercriminals.

senate committtee

Senate Report: Federal Agencies Have Failed To Respond to Growing Cybersecurity Threats

Eight agencies, including the Department of Homeland Security and Education Department, are using outdated systems that have few security updates and have failed to protect Americans’ personal data.

smart home lock

Major Security Vulnerabilities in Smart Home Devices Could Allow Hackers to Unlock Doors

A now-discontinued smart home hub had flaws that allowed researchers to hack into the device without even knowing the plain-text password put in place by the owner.

Map of Delaware

Ten Percent of Delaware Population Affected by Nearly Nine-Year Security Breach at Insurance Provider

Dominion National discovered in April that its servers, containing the financial and personal data of 95,000 Delawareans, may have been accessed by an unauthorized party since 2010.

georgia county courthouse

Georgia Court System Goes Offline After Ransomware Attack

The attack, which was discovered Monday, comes shortly after two Florida cities agreed to pay ransoms in order to recover their computer systems from hackers.



estonia data center

Estonia Creates World’s First-Ever ‘Data Embassy’ to Improve Information Security

The high-tech country’s decision to move highly sensitive databases to another country could be a model for other nations hoping to maintain their data security.

Workplace Violence Is Leading Companies To Adopt Stricter Security Measures

Workplace Violence Is Leading Companies To Adopt Stricter Security Measures

Employers are becoming more vigilant about workplace security, implementing intensive screenings for job candidates and electronic badge systems for employees.

Travelers with malicious intent could abuse global entry system

Travelers With 'Malicious Intent' Could Abuse Global Entry System, Report Finds

A system that allows international travelers to skip lines when entering the U.S. is ‘vulnerable to exploitation,’ according to a new report from the Department of Homeland Security.

mission 500 softball fundraiser

Save the Date for Mission 500's Annual Softball Game

Mission 500 has announced that its fifth annual security industry softball game fundraiser will take place on Sunday, September 15.

southwest microwave

Southwest Microwave Announces New Manufacturer's Representative for Northwest U.S., Alaska and Hawaii

This addition to the Southwest Microwave resource team will provide clients with security experts that are accustomed to the unique physical environment and perimeter protection needs of the region.

IDIS America Partners With The Salvation Army of North Texas For Enhanced Safety and Security

IDIS’s donation, in conjunction with KOTRA Dallas, will help to ensure security and peace of mind for staff, volunteers, and visitors.

House of Representatives Passes Election Security Bill

House of Representatives Passes Election Security Bill

The House of Representatives passed an election security bill 225-184 on Thursday of last week. The Securing America’s Federal Elections (SAFE) Act is designed to prohibit cyberinterference.

Google, University of Chicago Medical Center Accused of Sharing Patients’ Data

Google University of Chicago Medical Center Accused of Sharing Patients Data

Google and the University of Chicago Medical Center are being sued for allegedly sharing unauthorized data from their patients.

Insecurely Secure: A False Sense of Security

Insecurely Secure: A False Sense of Security

Security is an interesting subject that follows us from before our birth until the day we die. Our entire life is comprised of security, insecurity, and a false sense of security that often confuses the two.

IDIS Dynamic Privacy Masking Delivers Enhanced Anonymization and Privacy Tools

Provided free of charge, IDIS privacy software enhances the ability of end-users to obscure protected or non-relevant parties in a quick and efficient manner when utilizing or turning over surveillance footage

New High-Tech Riverbank Surveillance Cameras Go Beyond Capturing Footage

New High Tech Riverbank Surviellance Cameras Go Beyond Capturing Footage

Remote Surveillance Units have been installed in Riverbank, Calif., and they have the power to do much more than just capture footage. These high-tech surveillance cameras can detect when a crime is being committed, and even allow police officers to communicate with the offender.

Thousands of Potentially Counterfeit Apps Found in Google Play Store

Thousands of Potentially Counterfeit Apps Found in Google Play Store

Researchers have found over 2,000 apps that are potentially counterfeits, modeled after popular app downloads. These counterfeits contain harmful malware that could harm unsuspecting users.

ONVIF Hosts 20th Developers’ Plugfest

ONVIF Hosts 20th Developers’ Plugfest

Developers and engineers from 22 ONVIF member companies gathered at the three-day event to test their implementations of ONVIF Profiles with other ONVIF Profile-conformant products.

Lake City to Pay Nearly $500,000 to Hackers

Lake City to Pay Nearly $500,000 to Hackers

Hackers have found a sweet spot in encrypting and attacking municipal computer systems. Lake City is the latest to suffer from these attacks, and after two weeks of inaccessible services, have agreed to pay the $460,000 ransom to hackers.

Shreveport to Potentially Require High-End Security Systems in Liquor Stores

Shreveport to Potentially Require High-End Security Systems in Liquor Stores

Restaurants and stores that sell liquor are suffering from theft in Shreveport, Louisiana. In response, a city councilman is now pushing an amendment that requires restaurants and stores that sell liquor to obtain state-of-the-art surveillance systems before they acquire a liquor license.

Cobalt Robotics Secures Series B Funding with Coatue

Cobalt Robotics Secures Series B Funding with Coatue

Cobalt Robotics announced it has raised $35 million in Series B financing. The financing was led by global technology investment firm, Coatue, and is intended for geographic expansion of services throughout the domestic United States.

WeTransfer Incident Shares Transferred Files with Unintended Users

WeTransfer Incident Shares Transferred Files with Unintended Users

WeTransfer files were transferred to unintended users on June 16 and 17. The scope of the incident is not clear, but the company promptly logged out affected accounts and disabled the transfer links.

Huawei Confident It Will Meet German 5G Standards

Huawei Confident It Will Meet German 5G Standards

Germany has decided to level the playing field and offer all foreign companies fair and equal chances to build the national 5G infrastructure. Huawei has responded, claiming that despite the warnings of the United States, they will be able to comply and meet these standards.

Experts Weigh In On New Cryptocurrency-Mining Botnet

Experts Weigh In On New Cryptocurrency Mining Botnet

A new cryptocurrency-mining botnet could severely affect unprotected Android users. Experts say while the unprotected devices are mostly phones in Asia, these issues are becoming a big problem for technology security.

IoT Cybersecurity Bill Advances to Full Senate

IoT Cybersecurity Bill Advances to Full Senate

The IoT Cybersecurity bill, which was introduced in March, passed through the Senate Homeland Security and Governmental Affairs last week and is now headed to the full Senate for a vote.

Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

While cloud services are becoming increasingly popular for business use, cyberattacks on cloud services are also growing. This has prompted a rise in cloud security software.

Police Forces Take the Streets After Netherlands Telephone Outage

Police Forces Take the Streets After Netherlands Telephone Outage

After a major telephone outage in the Netherlands took down the nation’s emergency phone number yesterday, police forces took the streets to ensure people could contact emergency services through them.

Featured

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3