CyberSecurity


Data Exposed on Amazon Cloud Service: Facebook Has Messed Up Again

Data Exposed on Amazon Cloud Service: Facebook Has Messed Up Again

Facebook is in trouble again.



10 Tips for Keeping Your Personal Data Safe on Social Media

10 Tips for Keeping Your Personal Data Safe on Social Media

Strong passwords, two-factor authentication and good cyber hygiene will keep your personal information protected while browsing popular social media accounts.

Toyota and Lexus Dealerships Hacked, Millions Left Vulnerable

Toyota and Lexus Dealerships Hacked, Millions Left Vulnerable

Toyota's servers in Japan have been hacked, leaving millions of pieces of data left vulnerable.

Automation Can Close the Gap on Cyber Exposures

Automation Can Close the Gap on Cyber Exposures

See no evil, hear no evil, speak no evil: It is tempting for physical security professionals to take this passive approach to cybersecurity.

An Iron Solution

An Iron Solution

One of the primary criteria for any surveillance, access or security system is the requirement for a consistent and reliable power source, as even the most complex and expensive system solutions will be rendered useless if power is interrupted.

Managed Firewall Services

Managed Firewall Services

As cybercrime continues to plague companies of all sizes, across all industries both public and private, we wanted to take this opportunity to explore options that can help protect your data and your business.

Data Breach Exposes Data of Thousands of Medical Marijuana Patients

Data Breach Exposes Data of Thousands of Medical Marijuana Patients

The breach exposed diagnostic results, healthcare numbers and personal contact information.

Change Your Facebook Password Now

Change Your Facebook Password Now

Everyone should be changing their Facebook passwords after it was discovered all use passwords have been left unencrypted and searchable in plaintext.

2FA Immune Phishing Attacks Are on the Rise

2FA Immune Phishing Attacks Are on the Rise

2FA is more secure than single-factor methods only requiring a password, but it's not an impenetrable method.

How to Troubleshoot a DNS Leak

How to Troubleshoot a DNS Leak

DNS leaks can be a surprisingly common issue and are often only noticed when actively looked for.

Facebook Stored Hundreds of Millions of Passwords Unencrypted

Facebook Stored Hundreds of Millions of Passwords Unencrypted

Facebook stored “hundreds of millions” of account passwords unencrypted and viewable as plain text to tens of thousands of company employees, KrebsonSecurity reported Thursday.

Insider Threats: How to Stop the Most Common and Damaging Security Risk You Face

Insider Threats: How to Stop the Most Common and Damaging Security Risk You Face

Since each insider threat is very different, preventing them is challenging.

Being Unprepared is Not an Option

Being Unprepared is Not an Option

What does the future hold for audit and compliance?

Equifax Tells Canadians to do More to Protect their Data

Equifax Tells Canadians to do More to Protect their Data

Despite their new image as a failed cybersecurity company, Equifax is warning Canadians to do more to protect their data.

Security Staff Are Adopting Biometrics But Can Do More to Eliminate the Password

Security Staff Are Adopting Biometrics But Can Do More to Eliminate the Password

A survey found that security professionals are making the move to biometrics, but that they could be doing more to protect data.

Congress Introduces Bill to Improve IoT Security

Congress Introduces Bill to Improve IoT Security

The Internet of Things Cybersecurity Improvement Act aims to establish a bare minimum of security standards for IoT devices used by the federal government

Three Million Vehicles Vulnerable After Security Flaw Found in Car Alarms

Three Million Vehicles Vulnerable After Security Flaw Found in Car Alarms

Vulnerabilities found in two different car alarms left three million vehicles susceptible to hijack globally.

New System Uses Machine Learning to Scan Tweets for Security Flaws

New System Uses Machine Learning to Scan Tweets for Security Flaws

Machine learning and Twitter could be the future of catching security flaws and vulnerabilities early.

Facebook Announces Plans to Pivot toward Privacy

Facebook Announces Plans to Pivot toward Privacy

“I believe the future of communication will increasingly shift to private, encrypted services where people can be confident what they say to each other stays secure and their messages and content won't stick around forever. This is the future I hope we will help bring about,” Zuckerberg wrote.

Google Chrome Vulnerability: Here

Google Chrome Vulnerability: Here's How to Fix It

Google has discovered a Zero-Day Vulnerability [CVE-2019-5786] that is being exploited by bad actors. If you are a Chrome user, you are at risk. Make sure your browser has been updated to the latest patched version [72.0.3626.121], which fixes the vulnerability.

Featured

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West
  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.