A researcher at security firm Synack has discovered how to hack GlobalStar satellite tracking technology using a $1,000 device composed of a satellite antenna, a software defined radio transceiver and an amplifier.
SSI Staff · August 04, 2015
NICE Systems is selling its video surveillance unit to private equity firm Battery Ventures for up to $100 million, its second divestment in three months as it focuses more on its analytics business. Its new name is Qognify.
Rodney Bosch · August 03, 2015
Zimperium, a security company, uncovered a flaw in Stagefright, a media playback tool built into Android smartphone, which could allow malicious hackers to steal anything on the device, including credit card numbers or other personal information.
SSI Staff · July 28, 2015
Microsoft is planning to acquire Adallom, an Israeli cybersecurity company that offers end users information security technology on remote servers, for $320 million.
SSI Staff · July 22, 2015
Stanley Security’s Rich Mellott discusses market forces driving business intelligence (BI) in Security Sales & Integration’s latest IT Intelligence column.
By Rich Mellott · July 10, 2015
Cybersecurity firm Kaspersky Lab reveals that third-parties can hack video surveillance networks and manipulate the data transmitted through it.
SSI Staff · May 29, 2015
Hospitals and medical clinics are regarded as sanctuaries for patients, so it's crucial that these facilities are secure. Let's examine health-care facilities’ escalating security needs.
Bob Stockwell · May 23, 2015
NICE Systems' acquired cyber and intelligence business unit will be merged into Cyberbit, an Elbit Systems subsidiary, in order to consolidate the parent company's cyber activities.
SSI Staff · May 21, 2015
Perhaps the most notable change to PSA-TEC was the inclusion of a new cybersecurity education track and a series of vendor cybersecurity solutions spotlight sessions. Find out what they had to share.
Scott Goldfine · May 10, 2015
Eagle Eye Networks has released as whitepaper that offers 12 cyber-safe best practices for security cameras. The document covers attack vectors and vulnerabilities for both cloud-managed video surveillance systems and traditional video surveillance systems that are connected to the internet or the company’s private network.
SSI Staff · April 30, 2015