CyberSecurity


Nasty New Hybrid Strain of Ransomware

True self-replicating parasitic virus, VirRansom, demands 0.619 Bitcoin to let you back into your PC.



FBI in Danger of “Going Dark” if not able to Tap Devices

FBI in Danger of “Going Dark” if not able to Tap Devices

Government agency attempts to stand its ground against political leader.

Sony Hack Exposes Social Security Numbers

Sony Hack Exposes Social Security Numbers

Social Security numbers appeared more than 1.1 million times in 601 publicly-posted files stolen by hackers.

NYPD Twitter Fail

NYPD Twitter Fail

Critics attack NYPD after on social media after "wehearyou Tweet comes out soon after Eric Garner decision.

80 Percent of Patients Worry for Health Data Security

80 Percent of Patients Worry for Health Data Security

A new report indicates consumers remain concerned about medical technology and the security of their health information and data.

Social Engineering Threats Soaring

Watch out for cybercriminals looking to make some extra cash during scam season - its a social engineering bonanza with threats on multiple fronts.

Sony Pictures Recovering from Computer Attack

Sony Pictures Recovering from Computer Attack

Business operations are coming back online after crippling attack.

U.S. Military Warned about ISIS Threat within America’s Borders

U.S. Military Warned about ISIS Threat within America’s Borders

FBI gains fresh intelligence and issues a security bulletin last night.

Embracing the Internet of Things

Embracing the Internet of Things

The machine-to-machine (M2M) movement. The Internet of Things (IoT). The Internet of Everything (IoE). Each term may have its subtle differences, but at their core, they all involve connected devices that share information to enhance their intelligence, capabilities and operation.

Survey Says 90 Percent of Americans Feel They Have Lost Control of Their Personal Information on the Web

Survey Says 90 Percent of Americans Feel They Have Lost Control of Their Personal Information on the Web

The survey was conducted by the Pew Research Center.

Cyberespionage Group Targets Execs through Hotel Networks

Cyberespionage Group Targets Execs through Hotel Networks

Luxury hotels have been the target of malware attacks.

Home Depot Says Hackers Stole 53 Million Customer Email Addresses

Home Depot Says Hackers Stole 53 Million Customer Email Addresses

The company also says the hackers got access via a vendor.

Apple Gets First Real Virus Scare

Apple Gets First Real Virus Scare

Wirelurker sneaks onto computers using unauthorized Chinese apps.

Survey Says Security Chiefs Expect Boost in Cloud Spending

Survey Says Security Chiefs Expect Boost in Cloud Spending

IBM conducted a survey of nearly 150 security chiefs.

European Union Holds Largest-Ever Cyber-Security Exercise

European Union Holds Largest-Ever Cyber-Security Exercise

The European Network and Information Security Agency coordinated an exercise based in Athens.

BadUSB is Haunting Cyber Space

Howling about Halloween Safety

Security Today and Protect America have partnered to bring you a fun and festive Halloween Twitter chat about keeping parents, kids and pets safe during this time of witches flying on broomsticks, the pitter-pat of little ghost and ghoul feet and candy, candy, candy! Join us to learn some awesome safety tips as well as the chance to win treats by answering trivia questions throughout the chat! No tricks here, just treats!

Customers Concerned about Security in CurrentC vs. Apple Debate

Customers Concerned about Security in CurrentC vs. Apple Debate

Customers are worried about the safety of their banking information.

Hackers Breach White House Computers

Hackers Breach White House Computers

The hackers are thought to be working for the Russian government.

Apple CEO Discusses Privacy Talks with Chinese Government

Apple CEO Discusses Privacy Talks with Chinese Government

Tim Cook said the talks were ‘very open’

BadUSB is Haunting Cyber Space

The ABC’s of Cyber Security

It’s time to stop lecturing about cyber security and transform it into a topic of conversation, a give-and-take discussion, so that an effective battle against cyber malice can wage, and hopefully, win out over cyber criminals. Our perceptions must change; we must take the time to make safety and security into habits when it comes to the cyber world.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3