CyberSecurity


Looking Beyond the Hype

Looking Beyond the Hype

The past few years have seen significant advancements in computing power. With this, machines seem to have a greater ability to learn about us and participate in our lives.



Security Flaws Already Found in 5G Technology

Security Flaws Already Found in 5G Technology

5G is the talk of the town, but is it free of security risks?

Military File-Sharing Site Brought Back Online Following Security Concerns

Military File-Sharing Site Brought Back Online Following Security Concerns

The Defense Department website used to transfer large files containing sensitive unclassified information was brought back online earlier this month after being taken down due to security concerns last year.

New Report Shows 550 Percent Increase in Consumer Security Risks Connected to Apps

New Report Shows 550 Percent Increase in Consumer Security Risks Connected to Apps

McAfee's Mobile Threat Report found that reporting backdoors, malicious cryptomining, fake apps and banking Trojans all increased substantially in 2018.

Reverse Engineering is One of Your Best Weapons in the Fight Against Cyberattacks

Reverse Engineering is One of Your Best Weapons in the Fight Against Cyberattacks

Reverse engineering is a powerful tool to keep in your cybersecurity tool belt.

California Introduces New Bill to Enhance Data Breach Notification Laws

California Introduces New Bill to Enhance Data Breach Notification Laws

California already has some of the strongest data breach laws in the U.S., but thinks it can do better.

Senate Intelligence Committee Questions Healthcare Cybersecurity

Senate Intelligence Committee Questions Healthcare Cybersecurity

Democrat Senator Mark Warner is asking healthcare organizations how the Senate Intelligence Committee can aid in beefing up cybersecurity laws.

Major Security Flaws Found in Popular Password Managers

Major Security Flaws Found in Popular Password Managers

Independent Security Evaluators found some worrying flaws in popular password managers, but still suggest that you use one.

Cybersecurity Preparations for 2020 Election Underway

Cybersecurity Preparations for 2020 Election Underway

The director of Homeland Security's cybersecurity agency said on Wednesday that election security officials should prepare for all possibilities.

Nearly 15 Million 500px Users Made Vulnerable by Breach

Nearly 15 Million 500px Users Made Vulnerable by Breach

The names, usernames, passwords and other sensitive information was leaked in July of 2018.

Two Dating Apps Under Fire for Security Issues

Two Dating Apps Under Fire for Security Issues

Two dating apps have come under fire lately for security problems—Ok Cupid for a potential data breach and Jack’d for a vulnerability that left private photos potentially exposed.

The 3 Greatest Valentine

The 3 Greatest Valentine's Day Cyber Threats

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

Business-Targeted Email Fraud Sees Huge Increase

Business-Targeted Email Fraud Sees Huge Increase

Email fraud has seen a 476 percent increase between Q4 2018 and Q4 2017, according to the Proofpoint Q4 2018 Threat Report.

Almost 60,000 Data Breaches Reported Since GDPR Implementation

Almost 60,000 Data Breaches Reported Since GDPR Implementation

More than 59,000 data breaches have been reported across Europe since the General Data Protection Regulation (GDPR) came into full effect, according to law firm DLA Piper.

Google Warns Nest Owners to Check their Login Security after Increase in Hacked Cameras

Google Warns Nest Owners to Check their Login Security after Increase in Hacked Cameras

Google clarified in the email that per its numbers, there has not been a breach of the Nest user base. The company wanted to remind users that breaches are possible and that there are “a few easy things you can do to get the most out of Nest’s security features.”

NASA Faced Cybersecurity Threats During Government Shutdown

NASA Faced Cybersecurity Threats During Government Shutdown

According to Renee Wynn, NASA’s Chief Information Officer, NASA’s Security Operations Center (SOC) continued to operate 24/7 during the government shutdown, fighting cybersecurity threats.

How to Recover from a Ransomware Attack

How to Recover from a Ransomware Attack

Having the right cybersecurity solutions in place now will go a long way toward helping you recover from a ransomware attack later.

City of San Antonio Plans to Open First Security Operations Center

City of San Antonio Plans to Open First Security Operations Center

The city expects to share the new center with CPS Energy, San Antonio Water System and VIA Metropolitan Transit, according to the San Antonio Business Journal. For security purposes, the organizations’ data streams would be kept separate.

Google Rolls Out New Data Protection Tools

Google Rolls Out New Data Protection Tools

In a blog post Tuesday, Google announced two new updates to help users protect their data: Password Checkup and Cross Account Protection.

Airbus Suffers Hack Attack, Discloses Breach

Airbus Suffers Hack Attack, Discloses Breach

Airbus has disclosed the company is the victim of a cyberattack.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.