A new report from NQ Mobile Inc., indicates that from 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals.
Damballa Inc. recently released results of its discovery of advanced stealth techniques used by six crimeware families to carry out global cyber attacks.
Imation Corp. recently revealed the results of a recent survey of 302 IT decision makers in the U.S. and Canada, which was conducted by Harris Interactive on behalf of Imation. According to the survey, 37 percent of IT decision makers reported that their business had unintentionally exposed corporate data through theft or loss of removable devices in the past two years.
With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.
It’s always a pleasure to attend the Milestone Integration Platform Symposium, and is an eye-opening experience to see what’s happening in the networked world.
- By Ralph C. Jensen
- Feb 23, 2012
Cyber security is an ever changing and growing concern. Nearly twice as much cyber security funding proposed in the 2013 budget underscores the need for improved computer network defenses. Inadequate security configurations are blamed for 80 percent of the United States Air Force network vulnerabilities.
January saw malware attacks targeting a wide range of potential victims, including gamers looking for a Pro Evolution Soccer 2012 game crack, small business owners concerned about the reputation of their business, and government organizations receiving spoofed messages from the United States Computer Emergency Readiness Team (US-CERT).
In an upcoming article from the Human Factors and Ergonomics Society (HFES), human factors/ergonomics researchers identify impediments to efficient password creation and provide design strategies for enhancing the user experience.
Many security professionals have used the DLR standard to conduct security operations. Personal recognition is the most accurate form of identification; use of the DLR standard is at the other end of the identification spectrum.
- By Ron Martin
- Feb 01, 2012
ObjectVideo, Inc., announced today the signing of a global patent licensing agreement with Tyco Security Products’ American Dynamics business unit. This agreement provides American Dynamics access to ObjectVideo’s portfolio of video analytics patents as American Dynamics develops and launches a wide-range of its own video analytics software and hardware products.
The IT division’s network team at WKU implemented Milestone’s open platform video management software, XProtect Corporate.
- By Courtney Pedersen
- Feb 01, 2012
A security guard doing his nightly rounds on the perimeter of a power plant encounters a car left in a restricted area outside the security fence. The driver is nowhere to be found. Is this a threat?
- By Steve Surfaro
- Feb 01, 2012
Ask yourself. Would your organization like to have a system that offers quick, easy access for authorized users to enter specific locales or use particular data sets and which can also enforce and document compliance with your policies and procedures? In today’s complex world, however, your authorized users are probably forced to remember multiple passwords and carry different forms of credentials for various applications.
- By Phil Scarfo
- Jan 30, 2012
Passengers on the Santiago Metro system can travel more safely to their destinations due to a new security monitoring system from IndigoVision. More than two million passengers a day travel on the Santiago metro, the backbone of the Chilean capital’s public transport system.
This week, the Ottawa Senators and Scotiabank Place will play host to the NHL All-Star Game with enhanced facility surveillance.
In a series of blog posts, Unisys Corporation announced offering its enterprise technology predictions for 2012. Based on its work with clients around the world, Unisys expects that disruptive technologies cloud computing, mobility, social computing, big data and smart analytics, IT appliances, and cybersecurity will become more tightly woven into mission-critical systems and processes as organizations look for ways to innovate and operate more cost efficiently
As an estimated 24 million Zappos.com customers begin receiving notifications that some of their personal data have been compromised in a massive cyberattack, an Indiana University cybersecurity expert is warning those affected to be on the lookout for targeted fraud attempts.
ONVIF recently announced that it has released Profile S, the first in a series of profile introductions that will aid end users and system designers in determining interoperable components of a physical security solution.
Treasure Island Hotel & Casino received a comprehensive overhaul and update of the surveillance and security infrastructure throughout the resort property.
Megapixel video cameras from Arecont Vision are being used in European sporting events to help officials better determine race results in close competitions. At the Vojvodina Track & Field Club in Novi Sad, Serbia, the Arecont Vision 1.3 megapixel IP camera is capturing detailed images of sporting events so that athletes, and the order in which they finish, can be more easily identified.