Why NIST is the Best Approach for Joined-up Physical and Cyber Security
UK security vendors should look to the US for help in standardising converged security systems, according to experts, or risk their cyber defences being undermined by a lack of co-ordination and...
View ArticleSkills and Self-Awareness Are Keys to Installer Cyber Security Success
Having the right skills and the courage to challenge product manufacturers and suppliers on poor data security features will play an increasingly important role in determining success the new cyber...
View Article“Video Analytics has Been Over-sold and Underused”: The Future of Video...
A discussion panel at IFSEC 2016 recently looked into its crystal ball to consider the future of video surveillance. Simon Adcock, CEO of Wolverhampton-based integration firm ATEC Fire & Security,...
View ArticleHow Small Businesses Can Protect Themselves Against Ransomware
Ransomware – a type of malware that encrypts a computer’s files and threatens to delete them unless money is paid – is causing havoc in a growing number of companies. In recent weeks alone, the Kansas...
View Article5 Data Security Trends Every Business Should be Aware of in 2016 and Beyond
Last year saw some of the biggest and most significant data breaches the world has ever seen. One of the most publicised – and controversial – was the Ashley Madison hacking. The IBM and Ponemon...
View ArticlePokémon Go Security Risks Flagged by CIA, Gulf States and Data Security Experts
Even by the standards of online viral trends, Pokemon Go’s trajectory is quite astonishing. Within a week of launch the augmented-reality mobile exploration game could boast 20 million downloads. To...
View ArticleBeware Malware Disguised as Pokemon Go App, Warns Security Firm
A security firm has discovered malware disguised as the Pokemon Go app that covertly sending SMS to premium numbers. Cyber security experts at ThreatlabZ spotted an Android SMS Trojan disguised as the...
View ArticleMobile App Security in a BYOD Environment
Mobile app security is a major issue. Popular apps for your smartphone can be convenient, and increase productivity but can also carry malware which gives hackers easy access to your personal or...
View ArticleWearables and privacy protection among top secure identity trends, says HID...
Wearables, personalised mobile access, privacy protection and improving user experience are chief among the trends highlighted in an analysis of secure identity solutions issued by HID Global. Based on...
View ArticleHow to blend cyber security with your physical security practices
By James Lantrip, segment head for security at Siemens Building Technologies Cyber security has become an important piece of most physical security practices. It’s an ever-evolving space because...
View ArticleHow to protect your cloud-based video surveillance system against cyber attack
With businesses focusing above all else on growing revenues, investment in CCTV security often falls by the wayside. Unfortunately, the reality is that these companies are vulnerable to the same...
View ArticleHow to protect Z-Wave devices and IoT networks against Shodan hacks
Shodan is a search engine designed to find internet-connected devices. Once discovered, devices on unsecured networks can become attractive targets for hacking. Because Shodan can be used to find...
View ArticleBlack Hat Europe 2016 to feature hacks of smartphones, cellular networks,...
Black Hat, the world’s leading family of information security events, has announced the first 30+ high intensity talks on the lineup for its upcoming conference in London. Returning to Europe for its...
View ArticleIP CCTV managers warned: neglect cyber security at your peril
The BSIA CCTV section has urged operators of IP-connected surveillance systems to do more to safeguard their systems against cyber attack, including changing the manufacturer’s default credentials. The...
View ArticleCCTV hacking threat: Hanwha Techwin reassures customers and calls for...
The CCTV hacking threat was brought into sharp focus last week by a Times investigation into overseas involvement in UK critical infrastructure and the video surveillance industry. Responding to the...
View ArticleYahoo data breach: these security experts have some questions for the Silicon...
Yahoo has revealed that 500 million of its customers’ accounts have been compromised following a major data breach. So far, so unsurprising; barely a month passes these days without one of the world’s...
View ArticleMeet Oliver Stone’s go-to cyber consultant: the ethical hacker
Not many cyber security specialists moonlight as advisers to Hollywood directors with the pedigree of Oscar-winning director Oliver Stone. Developing a secure online ticketing system for the family of...
View ArticleWatch the Tesla Model S being hacked and controlled from 12 miles away
Hackers have managed to take control of a Tesla Model S while the car was moving and slam on the brakes. The attackers, who were situated 12 miles away, also popped open the bonnet and folded in the...
View ArticleHijack of nearly 1.5m surveillance cameras a wake-up call for security industry
Last week hackers managed to bring down a popular security website after hijacking more than a million security cameras. KrebsOnSecurity.com, which is run by freelance journalist Brian Krebs, was...
View ArticleWatch how to hack a security camera. It’s alarmingly simple
For decades CCTV has been deployed with great success in the fight against crime. But if security cameras have long been a reliable means of catching people in the act of breaking and entering, the...
View Article