Mobile Security


child smart watch

Millions of Children-Tracking Smartwatches Are At Risk Of Being Hacked

New findings by security firm Pen Test Partners reveal that 47 million devices worldwide could be exposed and tracked thanks to a strikingly insecure cloud platform.

dark twitter screen

Hackers Targeted Epilepsy Foundation With Strobe Lights Aiming to Induce Seizures

The foundation has reported at least 30 incidents that targeted their Twitter account and followers last month with GIFs and videos of harmful strobe lights.

chinese facial recognition phone

China Implements Mandatory Facial Recognition Scans For New Cell Phone Users

The government claims that the new requirement will prevent fraud for citizens, but critics see it as the furthering of invasive surveillance measures.

smart thermostat

Tips for Increasing Security in Your Smart Home

On their own, smart home devices do not protect themselves. Users must take action to protect their privacy and data security.

stalker following woman

Cybersecurity Companies Partner Up With Domestic Violence Charities to Fight Stalkerware

The Coalition Against Stalkerware hopes to be a resource for abuse victims and a pathway for security companies and advocacy organizations to work together.

Research: 5G Networks Still Vulnerable to Location Tracking, Downgrading Attacks

A group of researchers found 11 flaws, several of which would expose a device’s location and when a user calls or sends texts.

Amazon Echo

Lasers Can Take Over Voice Assistant Systems From Long Distances, Research Finds

By pointing a laser or even a flashlight into the microphone of a Google Home, Siri or Alexa system, the researchers were able to control the devices and the systems connected to them.

TikTok

U.S. Government Opens Official National Security Investigation Into TikTok

The inquiry from the Department of Commerce is looking into TikTok’s acquistion of Musical.ly in 2017.



jack o lantern

What’s Scarier Than Halloween Night? The Rise of Scammers and Security Breaches in 2019

The horror stories of scammers targeting landline phone numbers and the elderly continue to pile up. Here are the steps that phone companies and governments could take to stop the madness.

TikTok app

Senators Ask U.S. Intelligence To Investigate Potential Security Risks of TikTok and Chinese-Owned Companies

Chuck Schumer and Tom Cotton sent a letter to the director of national intelligence expressing concerns about ByteDance, which owns the video app TikTok.

Capitol Hill at sunset

'Cyber Shield Act’ Aims To Establish Cybersecurity Standards for IoT Devices

The bill, introduced by Democratic legislators on Tuesday, would direct a committee to create security benchmarks and then give labels to products who meet those standards.

Amazon Echo speaker

Researchers: Google and Amazon Smart Speakers Are Vulnerable to Phishing, Eavesdropping Hacks

A group of security researchers found that applications for Google Home and Alexa could be used to obtain passwords and overhear conversations from unsuspecting users.

Delivery App DoorDash Becomes Latest Company To Suffer Data Breach Affecting Millions

Delivery App DoorDash Becomes Latest Company To Suffer Data Breach Affecting Millions

4.9 million users have been affected by the data breach, which DoorDash discovered in the past month.

London Police Partner With Facebook to Prevent Live Streaming of Terrorist and Firearm Attacks

London Police Partner With Facebook to Prevent Live Streaming of Terrorist and Firearm Attacks

The issue gained renewed attention after a mass shooter used Facebook to live stream his murder of over 50 people at a mosque in Christchurch, New Zealand.

Report: Facebook Database Found Online Exposed Phone Numbers of Millions

Report: Facebook Database Found Online Exposed Phone Numbers of Millions

A database that was left without password protection was discovered by a security researcher, who said 419 million records of Facebook user phone numbers were exposed.

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone.

work wifi

10 Simple Steps to Take Right Now to Secure Your Business WiFi Network

Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network

siri app

Apple Contractors Regularly Overhear ‘Confidential’ Conversations Through Siri, Whistleblower Says

An employee spoke out due to their concerns about the potential misuse of information by firms working for Apple.

faceapp screen

Viral FaceApp Draws Concerns From Users About Data Privacy

The app, which is based out of Russia, was popular for its ability to make users look older. But critics say there’s a catch.

Security App Connects Law Enforcement Institutions to Reduce Response Times

Security App Connects Law Enforcement Institutions to Reduce Response Times

IN FORCE 911 allows staff to quickly launch an emergency alert and facilitates quick communication between victims and police.

Featured

  • Meeting Modern Demands

    Door hardware and access control continue to be at the forefront of innovation within the security industry, continuously evolving to meet the dynamic needs of commercial spaces. Read Now

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.