CyberSecurity


Data Breach at Chili

Data Breach at Chili's Restaurant Leaves Credit and Debit Card Information Exposed

Patrons of Chili's might have had their credit and debit card data hacked earlier this year.



How VPN Help Organizations to Strengthen their Cybersecurity

How VPN Help Organizations to Strengthen Cybersecurity

A VPN creates an encrypted connection between your device and the remote private network.

Twitter Asks All Users to Change Their Password

Twitter Asks All Users to Change Their Password

A bug in the Twitter system caused people's passwords to be kept unmasked in an internal log.

Cybersecurity Firm Researches Sonification of DDoS Attacks

Cybersecurity Firm Researches Sonification of DDoS Attacks

What if we could listen in on network traffic instead of just looking at it on graphs?

Vulnerabilities Could Give Hackers Remote Access to VW, Audi Models

Vulnerabilities Could Give Hackers Remote Access to VW, Audi Models

Security researchers found that certain models from Volkswagen could be hacked and remotely controlled.

Amazons Alexa Could be Tricked into Spying on Users

Amazon's Alexa Could be Tricked into Spying on Users

Researchers at Checkmarx were able to build an Alexa skill which could be used to spy on users within earshot. Amazon has now closed the loophole.

Nearly Half of U.K. Factories Admit to Falling Victim of Cyberattack

Nearly Half of U.K. Factories Admit to Falling Victim of Cyberattack

A new survey found that 48 percent of U.K. factories have been hit by a cyberattack.

Facebook Announces Data Security Measures that Comply with EUs GDPR

Facebook Announces Data Security Measures that Comply with EUs GDPR

The social media platform has announced new opt outs that allow users to choose how their data is being used.

Hackers Can Find Your Healthcare Data in Under an Hour

Hackers Can Find Your Healthcare Data in Under an Hour

A new survey found that 38 percent of hackers believe they can access any healthcare data they want to in under an hour.

Russia Blamed for Coordinated Cyberattacks

Russia Blamed for Coordinated Cyberattacks

The hackers have tried to breach routers, switches and firewalls in an effort to breach organizations across the globe, according to officials.

Major Credit Card Companies No Longer Requiring Signatures

Major Credit Card Companies No Longer Requiring Signatures

The adoption of chip-enabled cards has rendered credit card signatures useless.

Consumers’ Trust of Cardless ATMs Will Not Happen Without Strong Mobile Device Security

Consumers’ Trust of Cardless ATMs Will Not Happen Without Strong Mobile Device Security

One key to improving cardless ATM acceptance among consumers is to build trust and comfort by ensuring that best-in-class security measures are in place. Given the right security and layers of defense, the cardless ATM process can be secure.

Zuckerburg Admits Fault, Facebook Releases List of Fixes

Zuckerberg Admits Fault, Facebook Releases List of Fixes

Mark Zuckerberg released his remarks to Congress following the Cambridge Analytica scandal.

Delta Customer Payment Info Potentially Exposed in Cyberattack

Delta Customer Payment Info Potentially Exposed in Cyberattack

Delta has not said how many of its customers were involved in the breach, but Sears Holdings confirmed that as many as 100,000 customers could have been impacted.

Saks, Lord & Taylor: 5 Million Debit and Credit Card Details Stolen

Saks, Lord & Taylor: 5 Million Debit and Credit Card Details Stolen

Card information from charges in-store at Sakes Off 5th and Lord & Taylor have been found vulnerable online.

Under Armor Admits Huge Data Leak in MyFitnessPal App

Under Armor Admits Huge Data Leak in MyFitnessPal App

Under Armor has admitted that nearly 150 million users of the smartphone application "MyFitnessPal" were hacked.

A Privacy Balancing Act

A Privacy Balancing Act

Privacy. It’s gone beyond buzzword into a class of its own: basically, privacy of the individual is of the ultimate importance, and all else must fall away in our efforts to preserve it.

Cyberattack Continues to Plague the City of Atlanta

Cyberattack Continues to Plague the City of Atlanta

It is one of the largest cyberattacks against a major U.S. city.

Facebook Confirms Android Text and Call Histories are Recorded

Facebook Confirms Android Text and Call Histories are Recorded

Users are downloading their Facebook data to see just how much Facebook is recording.

Justice Department Announces Charges in $3.4 Billion Cyber Theft Campaign

Justice Department Announces Charges in $3.4 Billion Cyber Theft Campaign

The cyber theft campaign was targeting American universities, companies and government entities.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.