CyberSecurity


Equifax Confirms Another

Equifax Confirms Another 'Security Incident'

Equifax says the two breaches are unrelated.



Hidden Backdoor in CCleaner Security App Has Infected 2.3 Million People

Hidden Backdoor in CCleaner Security App Has Infected 2.3 Million People

Hackers have hidden a backdoor in a security application called CCleaner. So far it has 2 billion downloads and has infected 2.3 million people and counting.

Connected Cars: Security Challenges in the Automotive Industry

Connected Cars: Security Challenges in the Automotive Industry

Breakthroughs in technology mean that connected cars are shunning physical keys in favor of digital, smartphone-based entry systems.

U.S. Blacklists Kaspersky Software in Federal Agencies

U.S. Blacklists Kaspersky Software in Federal Agencies

The US government has officially banned the use of Kaspersky security software in all of its federal agencies.

Bluetooth Security Flaw Puts Billions at Risk

Bluetooth Security Flaws Puts Billions at Risk

A set of vulnerabilities present in "almost every" device with Bluetooth capabilities has been revealed by researchers at security firm Armis.

How Apples New iOS Could Give You Better Data Security

How Apple's New iOS Could Give You Better Data Security

The iOS 11 has been in beta testing for a few weeks now and many users are reporting a new discovered security feature that could boost a user's data security and make it harder for police to find information.

New York Police Department Communication System Hacked

New York Police Department Communication System Hacked

A recent incident in upstate New York has shown that even police departments aren't immune from hacking.

Equifax Cyberattack to Affect 143 Million Customers

Equifax Cyberattack to Affect 143 Million Customers

The Atlanta-based company announced the hack on Thursday, and said that intruders were able to access customers' Social Security numbers, addresses, names, birthdays, driver’s license numbers and more.

Vulnerabilities Revealed in AT&T Modems

Vulnerabilities Revealed in AT&T Modems

Gaping security holes have been discovered in most AT&T U-verse cable modems that would allow remote cyber criminals to access a household’s internet connection as well as any devices connected to it.

High Assurance Credentialing

High Assurance Credentialing

Moving to higher ground within the commercial enterprise space.

Instagram Alerts High-Profile Users of Possible Hack

Instagram Alerts High-Profile Users of Possible Hack

The Facebook-owned social media company sent an email to high-profile users on Wednesday alerting them that a bug in its software may have allowed users’ account data to be accessed.

The IoT and Security: 3 Strategies Every Pro Must Know

The IoT and Security: 3 Strategies Every Pro Must Know

Law enforcement and security professionals can benefit from the IoT — and not just to watch people more closely. Follow these three steps to prepare for the IoT reality, protect your own vulnerabilities, and find creative solutions to your investigative problems.

Hacked Off

Hacked Off

While our industry is fairly good at anticipating and reacting to new physical security threats, we’ve been very slow to react to the clear and present danger from cybersecurity attacks.

FDA Issues Recall on Pacemakers Due to Security Vulnerabilities

FDA Issues Recall on Pacemakers Due to Security Vulnerabilities

The FDA issued a security advisory, warning that the pacemakers must be recalled on a voluntary basis. The devices are much “smarter” than previous models, opening up the possibilities of being tampered with by cyber criminals.

Drone Maker to Pay Hackers to Find Vulnerabilities

Drone Maker to Pay Hackers to Find Vulnerabilities

DJI is not happy with companies denying their products based on security fears.

A Logical Defense Against Attacks on Mobile Devices

A Logical Defense Against Attacks on Mobile Devices

When it comes to mobile security, pairing biometrics with device authentication is a logical defense against attacks.

Google to Unveil New Titan Computer Chip

Google to Unveil New Titan Computer Chip

In an effort to better compete against Amazon and Microsoft in the cloud computing space, Google will reveal the technical details of its new security feature, the Titan computer chip.

Industrial Robots IoT Cybersecurity Nightmare

Industrial Robots IoT Cybersecurity Nightmare

Nearly 50 vulnerabilities have been found in industrial collaborative robots which can be configured enable the robots to spy on their surroundings or cause physical harm to workers

For the second time in a month, HBO has fallen victim to cyber criminals.

HBO Social Media Accounts Compromised in Second Hack

For the second time in a month, HBO has fallen victim to cyber criminals.

DHS to Boost Cybersecurity of First Responders

DHS to Boost Cybersecurity of First Responders' Tech

The Department of Homeland Security is looking to boost cybersecurity of advanced first responder technology.

Featured

  • 2024 Security Today New Product of the Year Award Winners Announced

    More than 20 companies are being recognized this year for products that help keep us safe. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3