CyberSecurity


Report: Rise Of “Conversation-Hijacking” Phishing Attacks Threatens Businesses

Because the technique involves impersonating a trusted employee, the hacking method has the potential to be unusually effective.



brain scan

More Than One Billion Medical Images Remain Unprotected On The Web

Some security experts and lawmakers have criticized the Department of Health and Human Services for failing to enforce privacy laws and fine organizations that did not protect patient records.

2020 computing

The IoT Rundown For 2020: Stats, Risks, and Solutions

Weak passwords, insecure network services and a lack of secure update mechanisms top the list of risks for companies utilizing IoT technology.

capitol hill

New Bill Would Update Children’s Online Privacy Law In Wake Of YouTube, TikTok Controversies

The bipartisan measure would allow parents to delete information collected by companies about their kids and raise the age of parental consent protection from 13 to 16.

TikTok app

TikTok Fixes Cybersecurity Flaws That Could Have Allowed Hackers to Upload, Delete Videos

Following the disclosure of several security issues, TikTok issued a patch to ensure that user privacy was protected.

fbi seal

FBI Warns U.S. Companies About Recent Scourge of “Maze” Ransomware Attacks

The advisory warned businesses about cyber attacks featuring cryptocurrency sites and spam campaigns impersonating government agencies.

cloud computing

Leverage the Cloud for Event Security

Technology advances have made security and access management more efficient.

department of homeland security flag

DHS Warns of Iran’s Potential To Retaliate With Cyber Attacks, Terrorist Acts After Soleimani Killing

The department warned in an alert that Iran has a “robust cyber program” and can carry out attacks to temporarily disrupt critical infrastructure.

ring doorbell camera

Ring Responds to Hacking Reports With New Privacy Options In Mobile App

The company has faced complaints, and a lawsuit, from customers that hackers were able to take over accounts and speak to children through the doorbell camera’s speaker.

2020 logo

A New Decade Means A New Frontier in Technology and Security

Can we imagine a new decade in which we protect our privacy and security while still maintaining innovation and freedom online?

facial recognition system

Majority of Facial Recognition Systems Are Less Accurate For People of Color, Federal Study Finds

Native Americans had the highest rates of false positives, while African-American women were most likely to be misidentified in a law enforcement database.

ring doorbell camera

Ring Faces Intense Scrutiny After Reports That Thousands of Users’ Information Was Leaked Online

The security camera company owned by Amazon says that there was not a breach of its servers and blame the issue on lax cybersecurity practices by users.

child smart watch

Millions of Children-Tracking Smartwatches Are At Risk Of Being Hacked

New findings by security firm Pen Test Partners reveal that 47 million devices worldwide could be exposed and tracked thanks to a strikingly insecure cloud platform.

dark twitter screen

Hackers Targeted Epilepsy Foundation With Strobe Lights Aiming to Induce Seizures

The foundation has reported at least 30 incidents that targeted their Twitter account and followers last month with GIFs and videos of harmful strobe lights.

christmas shopping

Don’t Let ‘Christmas Phishing’ Ruin Your Holiday Season

As shoppers try to find deals in time to put presents under the tree, phishing campaigns are making it more difficult for consumers to tell if a website is naughty or nice.

orbitz site

Orbitz and Expedia Reach $110,000 Settlement with Pennsylvania AG Over 2017 Data Breach

The travel companies were fined for lax data security practices that potentially led to a breach affecting 880,000 payment cards globally.

New Orleans Becomes Latest City To Suffer Ransomware Attack

The cyberattack caused the city to completely shut down its network for several days, but did not affect emergency services.

Lindsey Graham

Senators to Big Tech Companies: Build A Back Door For Law Enforcement To Access Encrypted Messages, Or Else

The ongoing debate over Apple and Facebook’s decision to not build “backdoors” for law enforcement to obtain encrypted messages continued to rage during a Senate hearing on Tuesday.

cyber attack

Pensacola Government Faces Cyber Attack Hours After Shooting at Naval Base

The government has not linked the attack to the shooting, which is being investigated as an act of terrorism.

Huawei Files Second Lawsuit Against U.S. Government Over Ban

After the FCC voted to ban telecommunications companies from using subsidies to buy equipment from Huawei, the Chinese company filed suit.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3