Top Stories


NSA May Have Used Second-rate Domains for Cyber Espionage

NSA May Have Used Second-rate Domains for Cyber Espionage

Malware activated as soon as the device is plugged in; no further action required.

Facebook Clarifies Offensive Content Policies

Facebook Clarifies Offensive Content Policies

The social networking site explains why it might or might not remove a piece of content reported as inappropriate or offensive.

March Madness and St. Patrick

March Madness and St. Patrick's Day Creates Security Issues on University Campus

After a riot broke out on campus two years ago, the University of Dayton is poised and ready to create a safe environment.



Secret Service Agents Disrupted Bomb Investigation at White House

Secret Service Agents Disrupted Bomb Investigation at White House

The two agents had been drinking when they reportedly drove directly beside the suspicious package.

Securitech Makes Schools Safer with Unique One-press Classroom Deadbolt

New QID Deadbolt Lock is fastest safe haven solution.

New StarLink CDMA Universal Cellular Alarm Communicator

Verizon network certified and now available.

Software House Enhances C•CURE Fault Tolerance

Integration with Stratus everRun products provides 24/7 protection.

Fluidmesh and On-Line Communications Give Metuchen Savings Connectivity They Can Bank On

Existing laser antennas were replaced with a solution that addressed all mandated requirements, time lines and budgetary considerations.

Secret Service Agents Allegedly Crash into White House Barrier While Drinking

Secret Service Agents Allegedly Crash into White House Barrier While Drinking

The Department of Homeland Security is investigating the incident.

Secret Meeting Reveals How to Break Apple

Secret Meeting Reveals How to Break Apple's Security

Security researchers meet to discuss tactics and strategies for exploiting security flaws in iPhones and iPads.

Catalyst AV Distribution Network Appoints AHA Distributing for Southeast Territory

AHA picks-up APC, Catalyst Wire & Cable, ClearView CCTV, Dropcam, EnGenius, IC Realtime, Nest, Rapid Mounts, TiVo and Vivitek lines.

Genetec and Prism Skylabs Help Retailers Gain In-store Insights

New integration enables retailers to leverage their video surveillance system to understand customer shopping patterns and extend their video monitoring capabilities.

Apple Watch

The Security Features of the Apple Watch

We don’t know much yet, but Apple has shown a few features that will help keep your information safe.

CertainSafe Prevents Payment Card Industry Data Breaches

MicroTokenization adds protection to data “around the card," adding to the newest requirement set for October 2015 EMV Standards.

IDSecurityOnline.com Launches New ID Card Service Bureau

Improve efficiency and turnaround time for customers.

Open Options Upgrades to New Headquarters

Access control company’s growth prompts need for more space.

Honeywell Expands Performance Series IP NVR

Compatibility with Honeywell’s equIP and Performance Series cameras multiplies options for customized surveillance systems.

7 Steps to Keeping a Connected Home Safe

7 Steps to Keeping a Connected Home Safe

There are steps anyone can take to ensure hackers will have a more difficult time accessing your system

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.