Security News and Commentary
  • But your security plan needs to be.
    Innovative design helps protect your most critical assets.

  • From prototyping and documentation, to RFP/RFQ and project management, planning removes the barriers - and the excuses.

  • Be sure your system delivers the performance and ROI you need.

Welcome to Security Advancement

This site delivers news and commentary in support of innovative, effective, and efficient security programs. Our goal is to help you protect people and property by identifying the most appropriate technology and resources for the job. We're passionate about the security industry, best practices, and unique solutions.

Security Advancement Blog

The Security Advancement Blog follows electronic security, video surveillance, and network security trends, along with related news. Here is a sampling of recent posts: (click the News link above for more)

  • Linux Worm Targets Embedded Devices
    Linux Worm Targets Embedded Devices
    Dark Reading (12/06/13) Chickowski, Ericka A newly discovered Linux worm targeting embedded devices is the latest example of such attacks aimed at the Internet of Things. The Zollard worm was identified shortly before Thanksgiving by Symantec researchers, and targets a PHP vulnerability that was patched in May […]...
  • Encrypting the Web: Who is Doing What?
    Encrypting the Web: Who is Doing What?
    The Electronic Frontier Foundation (EFF) has updated their report on the support of various encryption and security methods by popular online service providers. Best to check out the original post directly, but you can also download the full graphic here that is current as of this post....
  • IZON Cameras Hacked - Just the latest home security device in a long list...
    IZON Cameras Hacked – Just the latest home security device in a long list…
    The IZON surveillance camera sold in Apple Stores and Best Buy outlets is filled with security holes that enable a hacker to easily commandeer the device, a security researcher said. In this case, the cameras were reportedly hard-coded with a default username/password for the administrator account. According […]...
  • Another Reason to Keep Keys in Your Pocket!
    Another Reason to Keep Keys in Your Pocket!
    We learned this week about an unbelievably bad idea in the way of an online business called “Keys Duplicated” that will copy mechanical keys from a photograph submitted via their site. Users are reassured that this is secure because they require a photograph that includes fingers (supposedly […]...
  • Internet Scans Turn Up More Unsecured Hardware
    Internet Scans Turn Up More Unsecured Hardware
    Vulnerable terminal servers reflect bigger security problem April 26, 2013 — CSO — Security weaknesses uncovered in terminal servers used to provide an Internet connection to a wide variety of business and industrial equipment exemplify the risk inherent in adapting older systems to modern technology, experts say. […]...
  • Can Your Systems Withstand a 200Gbps DDoS Attack?
    Can Your Systems Withstand a 200Gbps DDoS Attack?
    The numbers are amazing – and should concern anyone with critical systems that rely on IP connectivity, and those operating in data centers with this kind of “attractive” bandwidth…  (emphasis below was added) Fueled by Super Botnets, DDoS Attacks Grow Meaner and Ever-More Powerful Ars Technica (04/17/13) […]...
  • DoS Attacks on Call Centers?
    DoS Attacks on Call Centers?
    This is worth keeping an eye on. If the perpetrators’ focus shifts to private enterprise or provider central monitoring stations, it could create entirely new problems for our industry: From CSO Online: Your emergency call centers may be under attack soon Federal law enforcement officials are reporting […]...
  • Destructive Malware - The New Trend?
    Destructive Malware – The New Trend?
    The concerning trend of malware being used to create mayhem within an organization or across a large population of disparate devices seems to be here to stay. Within the security industry, one must think about what the response needs to be if, for example, enterprise security systems […]...