CyberSecurity


Researchers Warn 500,000 Consumer Routers Infected with Malware

Researchers Warn 500,000 Consumer Routers Infected with Malware

Researchers find nearly half a million routers have been infected by malware.



The GDPR is Nearly Here: Are you ready?

The GDPR is Nearly Here: Are you ready?

If your business has customers who live in the European Union, you have an important deadline approaching.

Report Finds Over 75 Percent of IT Breaches are Motivated by Money

Report Finds Over 75 Percent of IT Breaches are Motivated by Money

A report by Verizon has found that 76 percent of breaches are financially motivated, and 68 percent of those breaches took months or longer to discover.

Homeland Security Unveils New Cybersecurity Strategy

Homeland Security Unveils New Cybersecurity Strategy

DHS works to create cybersecurity plan that encompasses all data.

Data Breach at Chili

Data Breach at Chili's Restaurant Leaves Credit and Debit Card Information Exposed

Patrons of Chili's might have had their credit and debit card data hacked earlier this year.

How VPN Help Organizations to Strengthen their Cybersecurity

How VPN Help Organizations to Strengthen Cybersecurity

A VPN creates an encrypted connection between your device and the remote private network.

Twitter Asks All Users to Change Their Password

Twitter Asks All Users to Change Their Password

A bug in the Twitter system caused people's passwords to be kept unmasked in an internal log.

Cybersecurity Firm Researches Sonification of DDoS Attacks

Cybersecurity Firm Researches Sonification of DDoS Attacks

What if we could listen in on network traffic instead of just looking at it on graphs?

Vulnerabilities Could Give Hackers Remote Access to VW, Audi Models

Vulnerabilities Could Give Hackers Remote Access to VW, Audi Models

Security researchers found that certain models from Volkswagen could be hacked and remotely controlled.

Amazons Alexa Could be Tricked into Spying on Users

Amazon's Alexa Could be Tricked into Spying on Users

Researchers at Checkmarx were able to build an Alexa skill which could be used to spy on users within earshot. Amazon has now closed the loophole.

Nearly Half of U.K. Factories Admit to Falling Victim of Cyberattack

Nearly Half of U.K. Factories Admit to Falling Victim of Cyberattack

A new survey found that 48 percent of U.K. factories have been hit by a cyberattack.

Facebook Announces Data Security Measures that Comply with EUs GDPR

Facebook Announces Data Security Measures that Comply with EUs GDPR

The social media platform has announced new opt outs that allow users to choose how their data is being used.

Hackers Can Find Your Healthcare Data in Under an Hour

Hackers Can Find Your Healthcare Data in Under an Hour

A new survey found that 38 percent of hackers believe they can access any healthcare data they want to in under an hour.

Russia Blamed for Coordinated Cyberattacks

Russia Blamed for Coordinated Cyberattacks

The hackers have tried to breach routers, switches and firewalls in an effort to breach organizations across the globe, according to officials.

Major Credit Card Companies No Longer Requiring Signatures

Major Credit Card Companies No Longer Requiring Signatures

The adoption of chip-enabled cards has rendered credit card signatures useless.

Consumers’ Trust of Cardless ATMs Will Not Happen Without Strong Mobile Device Security

Consumers’ Trust of Cardless ATMs Will Not Happen Without Strong Mobile Device Security

One key to improving cardless ATM acceptance among consumers is to build trust and comfort by ensuring that best-in-class security measures are in place. Given the right security and layers of defense, the cardless ATM process can be secure.

Zuckerburg Admits Fault, Facebook Releases List of Fixes

Zuckerberg Admits Fault, Facebook Releases List of Fixes

Mark Zuckerberg released his remarks to Congress following the Cambridge Analytica scandal.

Delta Customer Payment Info Potentially Exposed in Cyberattack

Delta Customer Payment Info Potentially Exposed in Cyberattack

Delta has not said how many of its customers were involved in the breach, but Sears Holdings confirmed that as many as 100,000 customers could have been impacted.

Saks, Lord & Taylor: 5 Million Debit and Credit Card Details Stolen

Saks, Lord & Taylor: 5 Million Debit and Credit Card Details Stolen

Card information from charges in-store at Sakes Off 5th and Lord & Taylor have been found vulnerable online.

Under Armor Admits Huge Data Leak in MyFitnessPal App

Under Armor Admits Huge Data Leak in MyFitnessPal App

Under Armor has admitted that nearly 150 million users of the smartphone application "MyFitnessPal" were hacked.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3