CyberSecurity


Justice Apologizes For Iowa Court System Authorizing Security Vulnerability Testing That Led To Break-Ins

Justice Apologizes For Iowa Court System Authorizing Security Vulnerability Testing That Led To Break-Ins

At a legislative hearing Friday, court administrators answered questions about their decision to hire “penetration testers” who were arrested for burglary last month.



Microsoft: Iranian Hackers Targeted Email Accounts of Presidential Campaign, U.S. Officials

Microsoft: Iranian Hackers Targeted Email Accounts of Presidential Campaign, U.S. Officials

Over 200 accounts were targeted by the group of hackers, but only four were compromised, according to Microsoft.

FBI Warns Businesses and Organizations of Rising “High-Impact” Ransomware Threat

FBI Warns Businesses and Organizations of Rising “High-Impact” Ransomware Threat

Even if an organization decides to pay a ransom against the FBI’s advice, they should report the crime to law enforcement, according to the FBI alert.

Ransomware Attack Causes Alabama Hospital System to Turn Patients Away

Ransomware Attack Causes Alabama Hospital System to Turn Patients Away

In the latest ransomware attack scourge, three hospitals in Alabama were able to continue serving existing patients but said they could not take new cases.

France Plans to Become First European Country to Use Facial Recognition for Digital Identity System

France Plans to Become First European Country to Use Facial Recognition for Digital Identity System

The French government plans to introduce a program called Alicem that will require residents to take a selfie video to compare to their passport photo.

FDA Warns Medical Device Manufacturers of “Urgent” Cybersecurity Flaws

FDA Warns Medical Device Manufacturers of “Urgent” Cybersecurity Flaws

Security researchers found 11 significant vulnerabilities in devices that use the IPnet software, though there are no confirmed incidents involving takeovers of the devices.

Government Renews Efforts to Find and Fix Cyber Vulnerabilities in Aviation Systems

Government Renews Efforts to Find and Fix Cyber Vulnerabilities in Aviation Systems

The Department of Homeland Security is refocusing its efforts on cyber threats to aircraft, and the Air Force is sponsoring “hacking villages” to discover hacking vulnerabilities.

Smart City Technologies

Smart City Technologies

Two of the biggest trends today, particularly in the security surveillance and IoT realms, are border security and the emergence of local governments transforming their communities into smart cities.

Are Contractors Ready for DOD’s Cybersecurity Framework?

Are Contractors Ready for DOD’s Cybersecurity Framework?

Contractors will face big changes and tight timelines next year when the Defense Department institutes its new Cyber Maturity Model Certification framework

Expanding Cybersecurity Solutions

Expanding Cybersecurity Solutions

Under GDPR, companies can be fined for not having their records in order, not notifying the supervising authority and those affected by a breach, or not conducting an impact assessment.

AI Beyond the Hype

AI Beyond the Hype

Today, there are in-depth discussions about what ‘might be’ possible with AI, machine and deep learning-based analytics products on the market.

Delivery App DoorDash Becomes Latest Company To Suffer Data Breach Affecting Millions

Delivery App DoorDash Becomes Latest Company To Suffer Data Breach Affecting Millions

4.9 million users have been affected by the data breach, which DoorDash discovered in the past month.

Senate Approves Legislation Dedicated To Assisting Governments, Private Sector With Cyber Attacks

Senate Approves Legislation Dedicated To Assisting Governments, Private Sector With Cyber Attacks

The chamber also approved funding for the Department of Homeland Security’s cyber arm, with $1 billion dedicated solely to cybersecurity.

House Lawmakers Introduce Bill Offering Refunds to Small Companies Moving Away From Huawei Tech

House Lawmakers Introduce Bill Offering Refunds to Small Companies Moving Away From Huawei Tech

The bill is part of an ongoing saga between China-based Huawei and the federal government, which believes Huawei is collaborating with Chinese spying efforts.

Chinese Scientists Develop Camera That Can Capture Thousands of Faces in

Chinese Scientists Develop Camera That Can Capture Thousands of Faces in 'Perfect Detail'

The new system may advance the country’s widespread use of surveillance technology in public spaces.

U.S. Soldier Arrested For Allegedly Threatening To Attack News Network, Distributing Instructions For Building Explosives

U.S. Soldier Arrested For Allegedly Threatening To Attack News Network, Distributing Instructions For Building Explosives

Jarrett William Smith gave detailed instructions about how to build an explosive device to an undercover FBI agent, according to a criminal complaint filed Monday.

Microsoft Now Plans To Offer Free Security Updates to Election Officials Using Windows 7

Microsoft Now Plans To Offer Free Security Updates to Election Officials Using Windows 7

The company originally planned to phase out security patches for Windows 7 in January. Now, Microsoft will continue issuing free updates for election systems around the world.

Senate Committee Allocates $250 Million To Bolster State Election Security

Senate Committee Allocates $250 Million To Bolster State Election Security

The fight over increased funding for election security is far from over, though: The House and Senate still need to agree on a number for the final version of the bill.

London Police Partner With Facebook to Prevent Live Streaming of Terrorist and Firearm Attacks

London Police Partner With Facebook to Prevent Live Streaming of Terrorist and Firearm Attacks

The issue gained renewed attention after a mass shooter used Facebook to live stream his murder of over 50 people at a mosque in Christchurch, New Zealand.

Colorado Becomes First State to Stop Using QR Codes, Barcodes to Count Ballots

Colorado Becomes First State to Stop Using QR Codes, Barcodes to Count Ballots

The state said it would redevelop its vote tallying system so that voting machines no longer print receipts with QR codes, which Secretary of State Jena Griswold says could be hacked.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3