Data Security


Android Security Flaw Leaves 950 Million Phones Vulnerable

Android Security Flaw Leaves 950 Million Phones Vulnerable

The devices can be hacked using a simple MMS message.

Online Exclusive Series Part 2: A Glimmer of Hope

Online Exclusive Series Part 2: A Glimmer of Hope

International Information Systems Security Certification Consortium of 1988 formed among several professional organizations to create a global information security certification process for professionals and address the need for standardized curriculum.

Online Exclusive Series Part 1: In the Beginning

Online Exclusive Series Part 1: In the Beginning

What does information security have in common with Eastern Air Lines Flight 401? It’s an odd question, with an important — and potentially tragic — answer.

Code Dx Expands Reseller Program with Addition of CM-Logic

Partnership will expand reach for Code Dx's software vulnerability management system to Europe.

Google Disables Flash Due to Security Concerns

Google Disables Flash Due to Security Concerns

Mozilla also disabled the web-enabled video software.

21 Million Social Security Numbers Stolen in Second OPM Data Breach

21 Million Social Security Numbers Stolen in Second OPM Data Breach

Credit monitoring and identity-theft protection offered to those affected.

How Colleges and Universities Defend Against Cyber Threats

How Colleges and Universities Defend Against Cyber Threats

Take into consideration the hackers' motivation, then develop a plan of action.

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Increasing mobility of equipment raises new concerns of managing access and keeping data confidential.



United Airlines Resuming Flights after Computer Glitch

United Airlines Resuming Flights after Computer Glitch

Flights were grounded nationwide due to a network connectivity issue.

Smarter Storage - Benefits drive expansion of IP video systems in Bergen County, N.J.

Smarter Storage

The advantages of video surveillance are well known, but at times, the full value is realized only after a system is installed.

Google Security Researcher Leaves to Take on New Project

Google Security Researcher Leaves to Take on New Project

The researcher known as Mudge plans to start a non-profit devoted to software security.

Safe-T Box 6.0 Secures Data in the Cloud

Unified Secure Data Exchange Broker solution consolidates email, file, mobile and cloud data security.

Facebook Hires Yahoo’s Chief Security Executive

Facebook Hires Yahoo's Chief Security Executive

Alex Stamos starts his new job as the company’s chief security officer.

SureView Systems Announces Integration with PPM

Immix CC Enterprise Command Center Software completes integration with Perspective.

Banks Show Vulnerabilities in Website Security

Banks Show Vulnerabilities in Website Security

Banks such as HSBC and TD Bank are behind the times when it comes to protecting their digital assets.

New Report Puts Samsung Galaxy Users at Risk

New Report Puts Samsung Galaxy Users at Risk

Private information stored on the phone could easily be accessed.

Houston Astros

Houston Astros' Ground Control System Hacked, Possibly by Rival Team

Network contained internal discussions about trades, proprietary statistics and scouting reports.

Secure Your Data with Emojis

Secure Your Data with Emojis

Cute little pics could take the place of PIN codes.

Security at Summer Camps is Not What it Needs to Be

Security at Summer Camps is Not What it Needs to Be

How security professionals can help kids and those who care for them stay safe.

China Hacking Exposes Millions of U.S. Workers

China Hacking Exposes Millions of U.S. Workers

The Obama administration a breach on government workers could affect up to four million citizens.

Featured

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.