Networking Security


NQ Mobile

Report Identifies Top Three Malware Threats for 2012

A new report from NQ Mobile Inc., indicates that from 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals.

Damballa Discovers Advanced Evasion Techniques Being Used by Six Crimeware Families

Damballa Inc. recently released results of its discovery of advanced stealth techniques used by six crimeware families to carry out global cyber attacks.

Unintentional Exposure of Corporate Data Through Theft, Loss of Removable Devices Examined in Survey

Imation Corp. recently revealed the results of a recent survey of 302 IT decision makers in the U.S. and Canada, which was conducted by Harris Interactive on behalf of Imation. According to the survey, 37 percent of IT decision makers reported that their business had unintentionally exposed corporate data through theft or loss of removable devices in the past two years.

White Paper Examines Certificate Management Challenges and Entrust

With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.

Milestone Announces Partner Achievements

It’s always a pleasure to attend the Milestone Integration Platform Symposium, and is an eye-opening experience to see what’s happening in the networked world.

Genetics Inspired Research Prevents Cyber Attacks

Cyber security is an ever changing and growing concern. Nearly twice as much cyber security funding proposed in the 2013 budget underscores the need for improved computer network defenses. Inadequate security configurations are blamed for 80 percent of the United States Air Force network vulnerabilities.

Cybercriminals Target Broad Range of Victims in January

January saw malware attacks targeting a wide range of potential victims, including gamers looking for a Pro Evolution Soccer 2012 game crack, small business owners concerned about the reputation of their business, and government organizations receiving spoofed messages from the United States Computer Emergency Readiness Team (US-CERT).

HFES Offers Tips on Improving Website Password Practices

In an upcoming article from the Human Factors and Ergonomics Society (HFES), human factors/ergonomics researchers identify impediments to efficient password creation and provide design strategies for enhancing the user experience.



The DLR Standard

Many security professionals have used the DLR standard to conduct security operations. Personal recognition is the most accurate form of identification; use of the DLR standard is at the other end of the identification spectrum.

ObjectVideo, Tyco Security Products' American Dynamics Business Unit Enter into Patent Licensing Agreement

ObjectVideo, Inc., announced today the signing of a global patent licensing agreement with Tyco Security Products’ American Dynamics business unit. This agreement provides American Dynamics access to ObjectVideo’s portfolio of video analytics patents as American Dynamics develops and launches a wide-range of its own video analytics software and hardware products.

Reaching Each Milestone On Time

The IT division’s network team at WKU implemented Milestone’s open platform video management software, XProtect Corporate.

Remote Possibilities

A security guard doing his nightly rounds on the perimeter of a power plant encounters a car left in a restricted area outside the security fence. The driver is nowhere to be found. Is this a threat?

Centralizing Credential Management with Biometrics

Ask yourself. Would your organization like to have a system that offers quick, easy access for authorized users to enter specific locales or use particular data sets and which can also enforce and document compliance with your policies and procedures? In today’s complex world, however, your authorized users are probably forced to remember multiple passwords and carry different forms of credentials for various applications.

Santiago, Chile, Metro System Ensures Passenger Safety with Security Monitoring System

Passengers on the Santiago Metro system can travel more safely to their destinations due to a new security monitoring system from IndigoVision. More than two million passengers a day travel on the Santiago metro, the backbone of the Chilean capital’s public transport system.

Ottawa Senators Enhances Stadium Security System in Time for NHL All-Star Game

This week, the Ottawa Senators and Scotiabank Place will play host to the NHL All-Star Game with enhanced facility surveillance.

Unisys Releases 2012 Enterprise Technology Predictions Based on Real World Client Work

In a series of blog posts, Unisys Corporation announced offering its enterprise technology predictions for 2012. Based on its work with clients around the world, Unisys expects that disruptive technologies –cloud computing, mobility, social computing, big data and smart analytics, IT appliances, and cybersecurity –will become more tightly woven into mission-critical systems and processes as organizations look for ways to innovate and operate more cost efficiently

Consumers Should Be Vigilant in Wake of Zappos Cyberattack

As an estimated 24 million Zappos.com customers begin receiving notifications that some of their personal data have been compromised in a massive cyberattack, an Indiana University cybersecurity expert is warning those affected to be on the lookout for targeted fraud attempts.

ONVIF Releases Profile S for Easier Management of Interoperable Devices

ONVIF recently announced that it has released Profile S, the first in a series of profile introductions that will aid end users and system designers in determining interoperable components of a physical security solution.

Las Vegas Treasure Island Hotel and Casino Gets A Security Upgrade

Treasure Island Hotel & Casino received a comprehensive overhaul and update of the surveillance and security infrastructure throughout the resort property.

Megapixel Video Cameras Help Determine Photo-finish Winners at Track and Field Club

Megapixel video cameras from Arecont Vision are being used in European sporting events to help officials better determine race results in close competitions. At the Vojvodina Track & Field Club in Novi Sad, Serbia, the Arecont Vision 1.3 megapixel IP camera is capturing detailed images of sporting events so that athletes, and the order in which they finish, can be more easily identified.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.