Top Stories


Insecure Data Storage in Mobile Applications Poses Security Issues

Insecure Data Storage in Mobile Applications Poses Security Issues

Users’ data might be more at risk than they realize. A new study shows that three quarters of mobile application have insecure data storage issues, putting passwords, financial information, personal data, and correspondence at risk.

5-Port Switch

5-Port Switch

California Police Forces Use

California Police Use 'HP RoboCop' to Help Patrol

Police use new autonomous data machine with 360-degree HD video as an extra set of eyes for areas where police are not consistently present.



Florida City Pays Almost $600,000 Ransom to Secure Records

Florida City Pays Almost $600,000 Ransom to Secure Records

After three weeks of city data being encrypted in Riviera Beach, Florida, city officials have unanimously voted to pay the hefty ransom to regain access.

Security Scare Causes Panic in Honolulu Airport

Security Scare Causes Panic in Honolulu Airport

Two laptops overheated while being screened Tuesday at the Daniel K. Inouye International Airport. The overheating caused popping sounds and smoke, bringing about false reports of an active shooter.

CISA Warns Microsoft Users to Patch Systems to Protect Against BlueKeep

CISA Warns Microsoft Users to Patch Systems to Protect Against BlueKeep

Through the BlueKeep vulnerability, it is possible to achieve remote code execution on vulnerable devices. Since the virus can spread, if it’s not contained, it could trigger a much bigger problem.

Oregon Department of Human Services Breach Affects 645,000 Clients

Oregon Department of Human Services Breach Affects 645,000 Clients

In March, the department announced that 350,000 clients had been affected by a data breach in January 2019. On Tuesday, they updated the number and announced that 645,000 clients had been affected.

Man Arrested for Attempting to Rush Through Phoenix Security Checkpoint

Man Arrested for Attempting to Rush Through Phoenix Security Checkpoint

After attempting to rush through a security checkpoint at the Phoenix Sky Harbor International Airport, a man was arrested and booked on multiple charges, including five counts of misdemeanor assault.

HID Global Brings High-Assurance Authentication to Broader Markets with New Cloud-Based Credential Management Solution

The HID Credential Management Service includes everything needed to issue and manage the lifecycle of digital identity and high-assurance credentials using a cloud delivery model.

EatStreet Data Breach Risks Customers, Restaurants, Deliverers’ Information

EatStreet Data Breach Risks Customers' Information

In May, EatStreet experienced a data breach that compromised certain customers', restaurants', and deliverers' information. The service just recently disclosed the security breach.

Computer Science Student Shows Venmo Transactions Can Be Easily Acquired

Computer Science Student Shows Venmo Transactions Can Be Easily Acquired

A year after a privacy researcher showed the world that Venmo transactions could be easily accessed, a computer science student scraped seven million Venmo transactions to increase awareness of the issue.

Global Stadium Security Market to Rise to 16057 USD by 2025

Global Stadium Security Market to Rise to US$ 16057.6 Mn by 2025

A report by Fortune Business Insights projects the global stadium security to grow rapidly over the next few years. The analysis estimates that the United States and Canada will lead the charge, with the Asia Pacific experiencing high growth as well.

Aeroturn Expands Its Footprint With New Installation On West Coast & Significant Investments in Internal Resources

Leading Connecticut-based turnstile manufacturer Aeroturn continues to expand its horizons with new turnstile project on west coast & investments in internal resources.

Four Shot, Three Arrested at Toronto Raptors Rally, Police Say

4 Shot, 3 Arrested at Toronto Raptors Rally, Police Say

Following the shooting of four people at the Toronto Raptors rally, three suspects were arrested. The suspects are to appear in court today.

Gunman Opens Fire on Dallas Courthouse

Gunman Opens Fire on Dallas Courthouse

According to the police, the suspect, a 22-year-old male has died after exchanging gunfire with federal officers. The suspect opened fire outside the Earle Cabell Federal Courthouse in Downtown Dallas.

Report reveals Russian Hackers May Be Responsible for $530 Million Cryptocurrency Hack

Report reveals Russian Hackers May Be Responsible for $530 Million Cryptocurrency Hack

It was previously believed that North Korean hackers were behind the January 2018 Coincheck hack, but recent developments in the investigation suggest that Russian actors may have been responsible.

Mission 500 Announces New Board of Director Members

The new members have established security industry experience.

Yubico Replaces Security Keys Due to Hardware Flaws

Yubico Replaces FIPS Series Security Keys Due to Hardware Flaws

Yubico discovered a hardware flaw in YubiKey FIPS Series devices in mid-March and since then, has updated the firmware version to one that does not contain the bug, as well as replaced the majority of affected devices.

Infusion Pump Vulnerabilities Could Offer Hackers Route To Control

Infusion Pump Vulnerabilities Could Offer Hackers Route To Control

Researchers at CyberMDX uncovered two vulnerabilities in older versions of an infusion pump that could allow hackers to gain control over the onboard computer.

Security researcher discovers bug within SymCrypt

Google vulnerability researcher discovers bug within SymCrypt

Tavis Ormandy, one of Google’s “Project Zero” team’s security researchers discovered a vulnerability that could effectively perform a denial-of-service attack on Windows servers. There is a 90-day disclosure deadline associated with Project Zero, and since it was day 91, Ormandy released the information.

Featured

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

  • Survey Finds Human Error is Cybersecurity Weakest Link

    Kaseya, provider of AI-powered cybersecurity and IT management software, recently released the results of its 2024 Kaseya Security Survey. IT professionals reported user behavior as their biggest cybersecurity challenge. Another important finding relates to the widespread adoption of artificial intelligence by both threat actors and defenders. The survey found that feelings are mixed as IT professionals learn to navigate this new industry game-changer. The results of the survey are featured in the Cybersecurity Survey Report 2024: Navigating the New Frontier of Cyber Challenges. Read Now

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3