IT Security


Study: Cybercriminals Creating 57,000 New Websites Per Week To Exploit High-Profile Brand Names

PandaLabs, Panda Security's anti-malware laboratory, has discovered that hackers are creating 57,000 new websites each week that exploit approximately 375 high-profile brand names worldwide at any time. These findings are based on a three-month long study conducted by PandaLabs of its global malware database. Notably, eBay and Western Union-related URLs comprise 44 percent of all malicious sites, with Visa, Amazon, Bank of America and PayPal also heavily targeted by cybercriminals.

NIST Releases Initial Set Of Smart Grid Cyber Security Guidelines

The National Institute of Standards and Technology (NIST) issued recently its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.

Study: Cybercrime Strikes More Than Two-Thirds Of Internet Users

The next time you surf the Internet, consider this: You might be just one click away from becoming the next cybercrime victim.

New Product Of The Year Award Winners Announced

Security Products magazine, the only integrated product magazine reaching the entire security market, announced the winners of its 2010 New Product of the Year Award at the publication’s premiere Virtual Event today.

Study: 25 Percent Of New Worms Designed To Spread Through USB Devices

PandaLabs, Panda Security's antimalware laboratory, has discovered that in 2010, 25 percent of new worms have been specifically designed to spread through USB storage devices connected to computers. These types of threats can copy themselves to any device capable of storing information such as cell phones, external hard drives, DVDs, flash memories and MP3/4 players.

Study: Mobile Application Security One Of Top Concerns For Organizations

According to a new study commissioned by Entrust Inc., many of today's mobile applications have limited functionality from a lack of overall security. And for mobile applications that feature transaction-based capabilities, the requirement for security is even greater, highlighting a key area of concern for deploying organizations.

Cameron Diaz Is Web’s Most Dangerous Celebrity Search

Cameron Diaz has replaced Jessica Biel as the most dangerous celebrity to search for on the Web, according to security company McAfee Inc. For the fourth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest celebrity athletes, musicians, politicians, comedians and Hollywood stars on the Web.

Intel To Acquire McAfee For $7.68 Billion

Intel Corp. has entered into a definitive agreement to acquire McAfee Inc., through the purchase of all of the company’s common stock at $48 per share in cash, for approximately $7.68 billion. Both boards of directors have unanimously approved the deal, which is expected to close after McAfee shareholder approval, regulatory clearances and other customary conditions specified in the agreement.



Brivo Earns TRUSTe's Stamp of Approval

The TRUSTe EU Safe Harbor Seal communicates that a website has committed to protecting the privacy of visitors through compliance with the EU-U.S. Safe Harbor Framework and participation in TRUSTe’s Watchdog Consumer Dispute Resolution service.

NIST Report: Securing Critical Computer Systems Starts At Beginning

Nothing beats the feeling of starting up a new computer -- be it a laptop, desktop or a major, custom-designed computing system. A new system is a blank slate with no worry of botnets, viruses or any other cybersecurity hazards. Not so, explains computer researcher Marianne Swanson at the National Institute of Standards and Technology (NIST), lead author of a draft report, Piloting Supply Chain Risk Management for Federal Information Systems. Information systems and components are under attack throughout the supply chain from the design phase -- including specification and acquisition of custom products -- through disposal.

IQinVision Centralizes Marketing under Nazarenus, Expands Sales

The addition of new distribution organizations and the augmentation of sales operations with four new personnel will help ensure the company is set up for continued rapid sales growth, the company said.

Pictured from left are Ken King, President of ‘The Strategy King’; Dr. Greg Winter, CVTC Superintendent; Haley Pitre, Executive Assistant, HSI Sensing; Ryan Posey, VP Operations, HSI Sensing; Angela Lewis, CVTC BIS Director; George Tiner, CVTC Assistant Superintendent; and Dick Lowe, CVTC Industrial Coordinator.

HSI Sensing Recognized with Partners for Progress Award

“Partnerships like this strengthen our communities and serve as the foundation for future growth and prosperity,” said CVTC’s Angie Lewis of HSI, an ISO 9001:2008-registered company that designs, develops, and makes reed switches, proximity sensors, and other sensing products.

Survey: Accessing Corporate Data On Vacation Has Serious Implications For IT Security

With bags packed, flights booked and foreign currency in their pockets the workforce might be jetting off but they’re definitely not leaving the daily grind behind. Instead these stressed out individuals, a whopping 95 percent of our sample, will be taking their mobiles and smartphones abroad with them with the expectation of working.

Research: Majority Of Business Leaders Underestimate Risk Of Advanced Cyberthreats

NetWitness Corp. recently announced the results of a research study by the Ponemon Institute on advanced threat prevalence, impact and preparedness. The study demonstrates that a vast majority of enterprises of all sizes regularly fall victim to advanced cyber threats, at the same time, more than half of these organizations recognize their defensive technologies, personnel and budget as "inadequate."

Microsoft, Other IT Companies Support Cybersecurity Legislation

The sponsors of comprehensive, bipartisan, risk-based cybersecurity legislation Wednesday thanked Microsoft Corp. and others for supporting the Protecting Cyberspace as a National Asset Act, S. 3480.

National Initiative For Cybersecurity Education Spreading Across Country

Cybersecurity training is spreading from high-tech and government offices into high schools, libraries and workplaces near you. Called the National Initiative for Cybersecurity Education (NICE) and coordinated by the National Institute of Standards and Technology (NIST) , the new interagency program aims to promote cybersecurity awareness and know-how across the country and among citizens of all ages.

Smart Business Communications

How secure is your business data network? It’s a question that can be tough to answer when new security risks seem to emerge on a daily basis. Broadband data and voice communications are the lifeblood of business, and without a network that functions optimally all the time, the productivity, profitability and even viability of businesses in many vertical sectors are at risk.

Research: Smart Grid Cybersecurity Market To Reach $3.7 Billion By 2015

As governments and utilities invest in smart grid deployments, the need for robust security measures has become increasingly apparent. Those requirements will drive major investments in smart grid cybersecurity over the next several years, according to a recent report from Pike Research.

Schalge, idOnDemand Form Technology Partnership

Ingersoll Rand Security Technologies, provider of security and safety solutions and manufacturer of Schlage contactless smart credentials and readers, and idOnDemand are partnering to offer a joint solution that consolidates a user’s identity across the enterprise.

House Leaders Announce Support For Cybersecurity Bill

Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman, ID-Conn., Ranking Member Susan Collins, R-Me., and Senator Thomas Carper, D-Del., last week hailed the bipartisan support of prominent members of the House of Representatives for comprehensive cybersecurity legislation introduced last week by the three Senators.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.