German security firm G DATA notes that analysts could identify a new strain of malware in Android smartphones every 14 seconds.
SSI Staff · September 02, 2015
FireEye researchers have uncovered a new vulnerability with Android devices, such as the HTC One Max and Samsung Galaxy S5, in which hackers can remotely steal fingerprints to gain unauthorized access to a user’s phone and data.
SSI Staff · August 13, 2015
Security integrators need to work with clients to stay ahead of proximity card threats.
Bob Stockwell · August 12, 2015
Google has announced software updates to fix Stagefright, a bug affecting Android devices, that allow hackers to take complete control over the smartphone by sending a text message with an infected video.
SSI Staff · August 10, 2015
Cybersecurity experts believe hackers can attack an airport's X-ray scanners and explosive detectors, due to major vulnerabilities in the security systems.
SSI Staff · August 05, 2015
A researcher at security firm Synack has discovered how to hack GlobalStar satellite tracking technology using a $1,000 device composed of a satellite antenna, a software defined radio transceiver and an amplifier.
SSI Staff · August 04, 2015
NICE Systems is selling its video surveillance unit to private equity firm Battery Ventures for up to $100 million, its second divestment in three months as it focuses more on its analytics business. Its new name is Qognify.
Rodney Bosch · August 03, 2015
Zimperium, a security company, uncovered a flaw in Stagefright, a media playback tool built into Android smartphone, which could allow malicious hackers to steal anything on the device, including credit card numbers or other personal information.
SSI Staff · July 28, 2015
Microsoft is planning to acquire Adallom, an Israeli cybersecurity company that offers end users information security technology on remote servers, for $320 million.
SSI Staff · July 22, 2015
Stanley Security’s Rich Mellott discusses market forces driving business intelligence (BI) in Security Sales & Integration’s latest IT Intelligence column.
By Rich Mellott · July 10, 2015