Networking Security


NQ Mobile

Report Identifies Top Three Malware Threats for 2012

A new report from NQ Mobile Inc., indicates that from 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals.

Damballa Discovers Advanced Evasion Techniques Being Used by Six Crimeware Families

Damballa Inc. recently released results of its discovery of advanced stealth techniques used by six crimeware families to carry out global cyber attacks.

Unintentional Exposure of Corporate Data Through Theft, Loss of Removable Devices Examined in Survey

Imation Corp. recently revealed the results of a recent survey of 302 IT decision makers in the U.S. and Canada, which was conducted by Harris Interactive on behalf of Imation. According to the survey, 37 percent of IT decision makers reported that their business had unintentionally exposed corporate data through theft or loss of removable devices in the past two years.

White Paper Examines Certificate Management Challenges and Entrust

With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.

Milestone Announces Partner Achievements

It’s always a pleasure to attend the Milestone Integration Platform Symposium, and is an eye-opening experience to see what’s happening in the networked world.

Genetics Inspired Research Prevents Cyber Attacks

Cyber security is an ever changing and growing concern. Nearly twice as much cyber security funding proposed in the 2013 budget underscores the need for improved computer network defenses. Inadequate security configurations are blamed for 80 percent of the United States Air Force network vulnerabilities.

Cybercriminals Target Broad Range of Victims in January

January saw malware attacks targeting a wide range of potential victims, including gamers looking for a Pro Evolution Soccer 2012 game crack, small business owners concerned about the reputation of their business, and government organizations receiving spoofed messages from the United States Computer Emergency Readiness Team (US-CERT).

HFES Offers Tips on Improving Website Password Practices

In an upcoming article from the Human Factors and Ergonomics Society (HFES), human factors/ergonomics researchers identify impediments to efficient password creation and provide design strategies for enhancing the user experience.



The DLR Standard

Many security professionals have used the DLR standard to conduct security operations. Personal recognition is the most accurate form of identification; use of the DLR standard is at the other end of the identification spectrum.

ObjectVideo, Tyco Security Products' American Dynamics Business Unit Enter into Patent Licensing Agreement

ObjectVideo, Inc., announced today the signing of a global patent licensing agreement with Tyco Security Products’ American Dynamics business unit. This agreement provides American Dynamics access to ObjectVideo’s portfolio of video analytics patents as American Dynamics develops and launches a wide-range of its own video analytics software and hardware products.

Reaching Each Milestone On Time

The IT division’s network team at WKU implemented Milestone’s open platform video management software, XProtect Corporate.

Remote Possibilities

A security guard doing his nightly rounds on the perimeter of a power plant encounters a car left in a restricted area outside the security fence. The driver is nowhere to be found. Is this a threat?

Centralizing Credential Management with Biometrics

Ask yourself. Would your organization like to have a system that offers quick, easy access for authorized users to enter specific locales or use particular data sets and which can also enforce and document compliance with your policies and procedures? In today’s complex world, however, your authorized users are probably forced to remember multiple passwords and carry different forms of credentials for various applications.

Santiago, Chile, Metro System Ensures Passenger Safety with Security Monitoring System

Passengers on the Santiago Metro system can travel more safely to their destinations due to a new security monitoring system from IndigoVision. More than two million passengers a day travel on the Santiago metro, the backbone of the Chilean capital’s public transport system.

Ottawa Senators Enhances Stadium Security System in Time for NHL All-Star Game

This week, the Ottawa Senators and Scotiabank Place will play host to the NHL All-Star Game with enhanced facility surveillance.

Unisys Releases 2012 Enterprise Technology Predictions Based on Real World Client Work

In a series of blog posts, Unisys Corporation announced offering its enterprise technology predictions for 2012. Based on its work with clients around the world, Unisys expects that disruptive technologies –cloud computing, mobility, social computing, big data and smart analytics, IT appliances, and cybersecurity –will become more tightly woven into mission-critical systems and processes as organizations look for ways to innovate and operate more cost efficiently

Consumers Should Be Vigilant in Wake of Zappos Cyberattack

As an estimated 24 million Zappos.com customers begin receiving notifications that some of their personal data have been compromised in a massive cyberattack, an Indiana University cybersecurity expert is warning those affected to be on the lookout for targeted fraud attempts.

ONVIF Releases Profile S for Easier Management of Interoperable Devices

ONVIF recently announced that it has released Profile S, the first in a series of profile introductions that will aid end users and system designers in determining interoperable components of a physical security solution.

Las Vegas Treasure Island Hotel and Casino Gets A Security Upgrade

Treasure Island Hotel & Casino received a comprehensive overhaul and update of the surveillance and security infrastructure throughout the resort property.

Megapixel Video Cameras Help Determine Photo-finish Winners at Track and Field Club

Megapixel video cameras from Arecont Vision are being used in European sporting events to help officials better determine race results in close competitions. At the Vojvodina Track & Field Club in Novi Sad, Serbia, the Arecont Vision 1.3 megapixel IP camera is capturing detailed images of sporting events so that athletes, and the order in which they finish, can be more easily identified.

Featured

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3