CyberSecurity


Hackers Breach White House Computers

Hackers Breach White House Computers

The hackers are thought to be working for the Russian government.



Apple CEO Discusses Privacy Talks with Chinese Government

Apple CEO Discusses Privacy Talks with Chinese Government

Tim Cook said the talks were ‘very open’

BadUSB is Haunting Cyber Space

The ABC’s of Cyber Security

It’s time to stop lecturing about cyber security and transform it into a topic of conversation, a give-and-take discussion, so that an effective battle against cyber malice can wage, and hopefully, win out over cyber criminals. Our perceptions must change; we must take the time to make safety and security into habits when it comes to the cyber world.

Google Takes Authentication to a New Level

Google Takes Authentication to a New Level

Insert USB device then tap it when prompted by Chrome.

Staples Stores Potentially Attacked by Credit Card Thieves

Staples Stores Potentially Attacked by Credit Card Thieves

Stores in the Northeastern United States may have been attacked

How to Set Up Your Twitter Profile as a Security Professional

How to Set Up Your Twitter Profile as a Security Professional

Learn step-by-step how to set up a Twitter account along with reasons why you should.

FBI Not Happy with Google, Apple Encryption

FBI Not Happy with Google, Apple Encryption

The encryption techniques might be regulated by the government in order to maintain control.

Newly-discovered Security Bug has Gone to the Dogs

Newly-discovered Security Bug has Gone to the Dogs

Used in encryption technology and can allow attackers to take over accounts, such as email and banking.

BadUSB is Haunting Cyber Space

BadUSB is Haunting Cyber Space

Thumb drives could become the carriers for the next digital epidemic! There’s not only risk in the data that they store but also in the core of how USBs work. Security Today and Bob Ehlers from RGB Spectrum will be discussing the details about BadUSB. Dubbed by some media sources as “a critical security flaw that can turn USB drives into cyber threats,” BadUSB is giving hackers access to what they want most…our computers!

Dropbox Blames Security Breach on Password Reuse

The company is urging users to enable two-step authentication.

Russian Hackers are Using Microsoft Windows to Spy

Russian Hackers are Using Microsoft Windows to Spy

The hackers are targeting the Ukrainian government, a European government agency, two European companies and a United States scholar.

10 Top Cyber Security Safety Tips

In honor of National Cyber Security Awareness Month, these not-so-familiar tips will help keep you safer online.

Japan Court Orders Google to Remove Search Results

Japan Court Orders Google to Remove Search Results

The court ordered Google to remove results of a man’s unflattering past.

Twitter Files Suit over National Security Data

Twitter Files Suit over National Security Data

Social media giant feels First Amendment right has been violated.

Symantec Reportedly Looking to Split into Two

Symantec Reportedly Looking to Split into Two

The security and storage company looks to split the two categories into separate organizations.

Yahoo Claims a Server Attack was not the Shellshock Bug

Yahoo Claims a Server Attack was not the Shellshock Bug

Yahoo officials made a statement regarding a bug that was discovered by hackers looking to exploit the system.

Cyber Security is Everyone

Cyber Security is Everyone's Job

Many are aware of cyber security issues on a global basis, making cyber security the responsibility of everyone who interacts with the Internet in some form or fashion.

Cyberattack against JPMorgan Chase Affects 76 Million Households

Cyberattack against JPMorgan Chase Affects 76 Million Households

The attack also affected an estimated seven million businesses.

Jimmy John’s Shops Hit by Data Breach

Jimmy John’s Shops Hit by Data Breach

Over 200 restaurants were affected

Apple Can’t Unlock your iPhone for the Police, even with a Search Warrant

Apple Can’t Unlock Your iPhone for the Police, Even With a Search Warrant

The company says it has made it impossible in order to deflect allegations of collecting user information.

Featured

  • UL Solutions Launches Artificial Intelligence Safety Certification Services

    UL Solutions Inc., a global leader in safety science, today announced the launch of artificial intelligence (AI) safety certification services, enabling comprehensive assessments for evaluating the safety of AI-powered products. Read Now

  • ESA Announces Initiative to Introduce the SECURE Act in State Legislatures

    The Electronic Security Association (ESA), the national voice for the electronic security and life safety industry, has announced plans to introduce the SECURE Act in state legislatures across the country beginning in 2025. The proposal, known as Safeguarding Election Candidates Using Reasonable Expenditures, provides a clear framework that allows candidates and elected officials to use campaign funds for professional security services. Read Now

    • Guard Services
  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.