Sicherheitsinfos

securitymagazine.comAs the Internet of Things (IoT) grows and cyberthreats become more sophisticated and prevalent, it’s more important than ever for security companies to understand the cybersecurity landscape and have strong cybersecurity postures. The security industry is recognizing the urgency of this issue, too – in the Security Industry Association’s (SIA’s) research to forecast the 2019 Security Megatrends, cybersecurity was identified as the standout trend shaping the security industry....

securitymagazine.comSingapore has been ranked as the best-prepared business center to manage a crisis....

securitymagazine.comThe number of children and adolescents visiting the nation’s emergency departments due to mental health concerns continued to rise at an alarming rate from 2012 through 2016, with mental health diagnoses for non-Latino blacks outpacing such diagnoses among youth of other racial/ethnic groups, according to a retrospective cross-sectional study presented during the American Academy of Pediatrics National Conference & Exhibition....

securitymagazine.comA small subset of professional criminal actors is responsible for the bulk of cybercrime-related damage, employing tools and techniques as sophisticated, targeted and insidious as most nation-state actors, says the State of Cybercrime Report 2018....

securitymagazine.comSecurity directors can install, upgrade and configure their Symmetry Security Management System through AMAG Technology’s ninth version of its access control software, which is streamlined to be more efficient and dramatically reduce setup time....

securitymagazine.comFrom hardware to keycards to RFID, smartphones, software and more, access control encompasses a vast number of options for security leaders to manage who enters their facilities....

securitymagazine.comA new international survey of 13 countries by Healthcare Ready shows significant concern among patients about losing access to prescription medication during disasters....

securitymagazine.comThe Coneckt smartphone-based RFID credentials and readers from Farpointe enable users to distribute credentials with features that let the user register only once, with no additional portal accounts or activation features....

securitymagazine.comThe 7800 Electric Strike from Adams Rite offers an electrification option for narrow stile aluminum applications that require a life-safety exit device....

securitymagazine.comThis High Frequency RFID Access Controller from Southco enables electronic access control using contactless smart cards, and it incorporates an integrated LED that provides visual feedback of card acceptance and includes an adjustable door release timer....

securitymagazine.comIdeal for high-security and multi-tenant applications, this nexTouch Sectional Mortise Lock from Yale reduces investment and maintenance costs while adding another layer of security and accountability....

securitymagazine.comThe outdoor Trove1M1WP enclosure from Altronix features a backplane that allows for easy integration with Altronix power and Mercury/Lenel access controllers....

securitymagazine.comVicon’s VAX Access Control solution now includes mobile credentialing, enabling users to present their smartphones at Bluetooth-enabled VAX door readers instead of cards or fobs....

securitymagazine.comIntuitive LED lights on the Lifeline Boost access control pedestal mount detect visitors approaching and guide them through clearly and easily without compromising the flow of foot traffic....

securitymagazine.comThe G100 wireless digital glass lock from Adams Rite enables security leaders to extend their success control to single or double all-glass doors easily and affordably without sacrificing aesthetics....

securitymagazine.comA total of 293 firearms have been found in carry-on bags and as improperly packed or undeclared guns in checked luggage at Hartsfield-Jackson International Airport so far this year. The TSA reports that 80 to 90 percent of them are loaded....

threatpost.comThe modular malware seems to be in a testing phase, but TA505's interest made researchers take note....

threatpost.comThe flaw allows hackers to bypass handset lock screens in seconds....

threatpost.comThe privilege-escalation vulnerability would allow an attacker to inject malware, place ads and load custom code on an impacted website....

threatpost.comThe issue comes from how Gmail automatically files messages into the "Sent" folder....

threatpost.comThe "Kitten of Doom" denial-of-service attack is easy to carry out....

threatpost.comHackers took advantage of an unpatched Drupal vulnerability in the organization's website to launch a cryptojacking attack....