CyberSecurity


small plane flying

Department of Homeland Security Issues Cybersecurity Warning for Small Planes

Planes using networked communication systems are particularly vulnerable to cyberattacks, according to a flaw discovered by researchers.



siri app

Apple Contractors Regularly Overhear ‘Confidential’ Conversations Through Siri, Whistleblower Says

An employee spoke out due to their concerns about the potential misuse of information by firms working for Apple.

voter line

Senate Committee Releases Bipartisan Report on Election Security Threats

The report comes as Senate Republicans move to block election security legislation, arguing that election officials have already fixed the security issues they experienced in 2016.

Using Zero Trust and Conditional Access Policies to Reshape Cybersecurity

Using Zero Trust and Conditional Access Policies to Reshape Cybersecurity

Eliminate trust based on location, such as within a company network, and always verify users at every access request.

medical data

Researchers: Your ‘Anonymous Data’ May Not Be As Anonymous After All

Americans could be signing over the keys to their identity when filling out medical forms that promise to “anonymize” their information, according to a new algorithm developed by scientists.

william barr

Attorney General Revives Feud With Tech Companies Over 'Warrant Proof' Encryption

Security experts and lawmakers say that creating a “backdoor” to unlock devices and messages would make those products vulnerable to hackers.

equifax logo

Equifax Will Pay At Least $650 Million In Settlement Over 2017 Data Breach

The credit-reporting agency will pay at least $300 million to victims. But it may be difficult for consumers to prove direct losses from identity theft.

healthcare working using tablet

Healthcare Industry at Highest Risk of Cybersecurity Breaches, Study Finds

While healthcare organizations are confidently moving sensitive patient data to the cloud, less than half are encrypting that information.

people using voting machines

Use of Aging Software on Voting Machines Raises Cybersecurity Concerns

Lawmakers are concerned about the use of out-of-date software on voting systems across the United States, but no new legislation has been passed in both chambers.

maryland capitol building

Sensitive Information of Over 1.4 Million Students 'Improperly Stored' by Maryland Government

A state audit found that the personal information of over 1 million students and more than 200,000 teachers was at risk of identity theft.

capitol hill

House Passes Two Bills Aimed at Improving Cybersecurity for Small Businesses

Both measures, which aim to improve the Small Business Administration and resources for business owners, were adopted with bipartisan support.

FTC’s $5 Billion Fine On Facebook Should Serve As ‘Warning’ For Companies Concerned About Data Security

FTC’s $5 Billion Fine On Facebook Should Serve As ‘Warning’ For Companies Concerned About Data Security

While the penalty will have little effect on Facebook’s bottom line, the massive fine could be indicative of the commission’s willingness to punish companies for data security issues.

Federal Election Commission

Cybersecurity Company Can Offer Discounted Services to Campaigns, FEC Rules

A California-based company has been given the OK to offer its services to campaigns for a discounted rate ⁠— as long as that rate is the same for other clients.

Committee on small business sign

Senators Introduce Bill to Help Small Businesses Improve Cybersecurity Protections

The legislation would require the Department of Homeland Security to develop educational resources for business owners and train counselors on higher-level cybersecurity information.

Employees Still Struggle to Identify Phishing Threats and Properly Protect Their Data, Report Finds

Respondents, who answered 22 percent of questions incorrectly, struggled most with assessments about mobile device encryption and protections for personally identifiable information.

Zoom headquarters

Flaw in Video Conferencing App Could Have Given Hackers Immediate Access to Webcam Feeds

The company, Zoom, is now taking action to update its software after a security researcher discovered several serious security vulnerabilities in the popular video chat app.

Two people using computer in office space

Five Ways to Keep Your Workplace Safe Online

Regardless of size or business type, companies must institute these basic practices to make sure their organizations are well protected from cybercriminals.

Map of Delaware

Ten Percent of Delaware Population Affected by Nearly Nine-Year Security Breach at Insurance Provider

Dominion National discovered in April that its servers, containing the financial and personal data of 95,000 Delawareans, may have been accessed by an unauthorized party since 2010.

georgia county courthouse

Georgia Court System Goes Offline After Ransomware Attack

The attack, which was discovered Monday, comes shortly after two Florida cities agreed to pay ransoms in order to recover their computer systems from hackers.

Thousands of Potentially Counterfeit Apps Found in Google Play Store

Thousands of Potentially Counterfeit Apps Found in Google Play Store

Researchers have found over 2,000 apps that are potentially counterfeits, modeled after popular app downloads. These counterfeits contain harmful malware that could harm unsuspecting users.

Featured

  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3