Cybersecurity Rankings Criteria for IP Cameras and NVRs Explained
This report requires an IPVM Research Service subscription. Learn more.
This report requires an IPVM Research Service subscription. Learn more.
This report requires an IPVM Research Service subscription. Learn more.
The US government has added 14 PRC China firms to its 'Chinese military company' list, including several security technology software developers...
The Canadian Province of Quebec has joined a growing number of governments banning Dahua and Hikvision (see list), citing cybersecurity concerns...
While independent, YourSix has built its business around partnering with Axis. Why and where does the company want to go? IPVM spoke with...
Eagle Eye competitor Verkada denied that it offered face recognition before admitting the truth. Now, Eagle Eye's CEO is promoting similar...
Following the "Major, Mandatory Upgrade," HID now released two high-severity CVEs on malicious configuration cards, and unauthorized encoders. But...
It is atypical for corporate litigation go to trial, but HID has won a very sizeable judgement against competitor Vector Flow, founded by former...
By William Howard-Waddingham and Jermaine Wilson - 3 months ago
Only three months after Wavelynx was acquired / invested in by a large private equity firm and days after HID released a "major, mandatory...
HID's "major, mandatory upgrade" added iClass SE to its list of "legacy credentials [that] can expose a security risk," prompting IPVM and PACS...
While IPVM is critical of many Verkada practices, one we have found significantly beneficial is its highly atypical (for physical security)...
Following a series of IPVM reports explaining HID's long-standing unfixed vulnerabilities (see 1, 2, 3), HID has pushed a "major, mandatory...
By John Honovich - 4 months ago
IPVM has advocated HID deal with downgrade attacks it has known and allowed. Now, in what HID is describing as a "major, mandatory upgrade," HID...
Fusus is growing and gaining significant attention and some criticism. A self-described "hacktivist" obtained data on 100+ Fusus customer...
US government policies safeguard a vast array of infrastructure, from communications networks to chemical plants, considered critical to the...
The secret Key Derivation Function (KDF) algorithm in the Saflok RFID system from Dormakaba is cracked, allowing an attacker to calculate the...
This report requires an IPVM Research Service subscription. Learn more.
This report requires an IPVM Research Service subscription. Learn more.
When the US government takes action against PRC China technology companies, like the NDAA ban, it can have wide-ranging impacts on physical...
The US Department of Justice has filed criminal fraud charges against a video surveillance seller over allegedly misrepresenting millions in...
By Conor Healy - 4 months ago
A major shakeup, in the midst of Dahua suing the US government and petitioning a prohibited purposes plan, Dahua is now selling off its USA-branded...
By IPVM Team - 4 months ago
An ADT customer whose home security system failed to alert him to a burglary will not be able to sue the company for damages in court, and he must...
While HID markets "Signo = Security" and that "security comes first," HID obscures and features critical unfixed vulnerabilities both for low...
While Axon's taser-drone idea for dealing with school shootings gained wide attention and criticism, Philadelphia schools are also using drones to...
This report requires an IPVM Research Service subscription. Learn more.
Back to Top