Sicherheitsinfos

securitymagazine.comData from 2017 included information on around 5.4 million incidents with 6,290,042 criminal offense, of which 61 percent were crimes against property, 23 percent were crimes against persons, and 16 percent were crimes against society (such as animal cruelty)....

securitymagazine.comSecurity directors are no stranger to the necessity of blending legacy physical security devices and software with newer products and services. Whether you are a retail business in search of higher resolution camera technology for more accurate images, or you’re the head of a multi-location organization that wants to leverage new access control card reader technology with existing hardware without installing completely new door controllers, card readers and wiring, retrofits are a large percentage of installations, encompassing many of our industry’s technologies....

securitymagazine.comBy definition, a perimeter is the outer boundary, and securing that perimeter means protecting that area. Everything has a perimeter, from a large university campus to your own personal space on that campus. Law enforcement and security personnel have predefined outer perimeters that keep people either in or out in the case of an event. But you should also look within the perimeter to criticalities that could present problems....

securitymagazine.comCriminal cyber activity evolves at an incredible pace. Today’s cybercriminals are constantly on the lookout for security gaps that will give them access to your facilities or a wide range of important, private and sensitive information. In our increasingly interconnected world, the potential avenues of exploitation seem greater than ever....

securitymagazine.comHertz and CLEAR announced the launch of Hertz Fast Lane powered by CLEAR – a new service that uses biometrics to drastically speed up the car rental process....

securitymagazine.comAbout two-thirds of American adults (68%) say they at least occasionally get news on social media, about the same share as at this time in 2017, according to a new Pew Research Center survey....

securitymagazine.comDespite gradual industry acceptance of two-factor authentication (2FA), many consumer websites still don’t provide a full set of 2FA options—including easily accessible and clear-cut information for users—according to a recent study....

securitymagazine.comNew data from Jumio reveals that online ID fraud attempts on government-issued IDs increased 22 percent worldwide during the 2018 Black Friday to Cyber Monday period compared to the non-holiday full-year average....

securitymagazine.comA new study by computer scientists at William & Mary shows how burglars could potentially break into houses through smart home devices....

securitymagazine.comCalifornia regulators want to tax text messages to increase funds for social programs....

securitymagazine.comAon's Global Catastrophe Recap report reveals that a series of major wildfires burned across Northern and Southern California throughout the month; the most catastrophic, the Camp Fire in Butte County, largely destroyed the city of Paradise, killing 88 people with dozens of others unaccounted for....

securitymagazine.comThe Marjory Stoneman Douglas High School Public Safety Commission recommended that teachers who volunteer and undergo extensive background checks and training be allowed to carry concealed guns on campus to stop future shootings....

threatpost.comItaly's regulator found the social giant guilty of misleading consumers as to what it does with their data....

threatpost.comExperts sound off on how companies can work with their third-party suppliers and partners to secure the end-to-end supply chain....

threatpost.comThe news comes amid reports that a Chinese intelligence-gathering effort was behind the massive Marriott hotel data breach....

threatpost.comOperation Sharpshooter uses a new implant to target mainly English-speaking nuclear, defense, energy and financial companies....

threatpost.comConsumers are much more likely to fall for spam during the season of giving....

threatpost.comThe trojan purports to be a battery optimization app - and then steals up to 1,000 euro from victims' PayPal accounts....

threatpost.comOne of the most destructive malware families ever seen is back, and researchers think its authors are gearing up to again take aim at the Middle East....

threatpost.comChanges to how data is encrypted can help developers ward off data leakage and exfiltration....

threatpost.comAttacks targeting critical infrastructure system are ramping up - and defense has become a top priority for the U.S. government....

threatpost.comThe online spell check platform is taking its private bounty program public in hopes of outing more threats....