Networking Security


NQ Mobile

Report Identifies Top Three Malware Threats for 2012

A new report from NQ Mobile Inc., indicates that from 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals.

Damballa Discovers Advanced Evasion Techniques Being Used by Six Crimeware Families

Damballa Inc. recently released results of its discovery of advanced stealth techniques used by six crimeware families to carry out global cyber attacks.

Unintentional Exposure of Corporate Data Through Theft, Loss of Removable Devices Examined in Survey

Imation Corp. recently revealed the results of a recent survey of 302 IT decision makers in the U.S. and Canada, which was conducted by Harris Interactive on behalf of Imation. According to the survey, 37 percent of IT decision makers reported that their business had unintentionally exposed corporate data through theft or loss of removable devices in the past two years.

White Paper Examines Certificate Management Challenges and Entrust

With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.

Milestone Announces Partner Achievements

It’s always a pleasure to attend the Milestone Integration Platform Symposium, and is an eye-opening experience to see what’s happening in the networked world.

Genetics Inspired Research Prevents Cyber Attacks

Cyber security is an ever changing and growing concern. Nearly twice as much cyber security funding proposed in the 2013 budget underscores the need for improved computer network defenses. Inadequate security configurations are blamed for 80 percent of the United States Air Force network vulnerabilities.

Cybercriminals Target Broad Range of Victims in January

January saw malware attacks targeting a wide range of potential victims, including gamers looking for a Pro Evolution Soccer 2012 game crack, small business owners concerned about the reputation of their business, and government organizations receiving spoofed messages from the United States Computer Emergency Readiness Team (US-CERT).

HFES Offers Tips on Improving Website Password Practices

In an upcoming article from the Human Factors and Ergonomics Society (HFES), human factors/ergonomics researchers identify impediments to efficient password creation and provide design strategies for enhancing the user experience.



The DLR Standard

Many security professionals have used the DLR standard to conduct security operations. Personal recognition is the most accurate form of identification; use of the DLR standard is at the other end of the identification spectrum.

ObjectVideo, Tyco Security Products' American Dynamics Business Unit Enter into Patent Licensing Agreement

ObjectVideo, Inc., announced today the signing of a global patent licensing agreement with Tyco Security Products’ American Dynamics business unit. This agreement provides American Dynamics access to ObjectVideo’s portfolio of video analytics patents as American Dynamics develops and launches a wide-range of its own video analytics software and hardware products.

Reaching Each Milestone On Time

The IT division’s network team at WKU implemented Milestone’s open platform video management software, XProtect Corporate.

Remote Possibilities

A security guard doing his nightly rounds on the perimeter of a power plant encounters a car left in a restricted area outside the security fence. The driver is nowhere to be found. Is this a threat?

Centralizing Credential Management with Biometrics

Ask yourself. Would your organization like to have a system that offers quick, easy access for authorized users to enter specific locales or use particular data sets and which can also enforce and document compliance with your policies and procedures? In today’s complex world, however, your authorized users are probably forced to remember multiple passwords and carry different forms of credentials for various applications.

Santiago, Chile, Metro System Ensures Passenger Safety with Security Monitoring System

Passengers on the Santiago Metro system can travel more safely to their destinations due to a new security monitoring system from IndigoVision. More than two million passengers a day travel on the Santiago metro, the backbone of the Chilean capital’s public transport system.

Ottawa Senators Enhances Stadium Security System in Time for NHL All-Star Game

This week, the Ottawa Senators and Scotiabank Place will play host to the NHL All-Star Game with enhanced facility surveillance.

Unisys Releases 2012 Enterprise Technology Predictions Based on Real World Client Work

In a series of blog posts, Unisys Corporation announced offering its enterprise technology predictions for 2012. Based on its work with clients around the world, Unisys expects that disruptive technologies –cloud computing, mobility, social computing, big data and smart analytics, IT appliances, and cybersecurity –will become more tightly woven into mission-critical systems and processes as organizations look for ways to innovate and operate more cost efficiently

Consumers Should Be Vigilant in Wake of Zappos Cyberattack

As an estimated 24 million Zappos.com customers begin receiving notifications that some of their personal data have been compromised in a massive cyberattack, an Indiana University cybersecurity expert is warning those affected to be on the lookout for targeted fraud attempts.

ONVIF Releases Profile S for Easier Management of Interoperable Devices

ONVIF recently announced that it has released Profile S, the first in a series of profile introductions that will aid end users and system designers in determining interoperable components of a physical security solution.

Las Vegas Treasure Island Hotel and Casino Gets A Security Upgrade

Treasure Island Hotel & Casino received a comprehensive overhaul and update of the surveillance and security infrastructure throughout the resort property.

Megapixel Video Cameras Help Determine Photo-finish Winners at Track and Field Club

Megapixel video cameras from Arecont Vision are being used in European sporting events to help officials better determine race results in close competitions. At the Vojvodina Track & Field Club in Novi Sad, Serbia, the Arecont Vision 1.3 megapixel IP camera is capturing detailed images of sporting events so that athletes, and the order in which they finish, can be more easily identified.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.