Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

gas pump creditcard payment
visa cards credit debit money

donald trump rally

Website taking donations for the assassination of Donald Trump and Mike Pence

A website launched earlier this week on the Darknet is calling for the assassination of President-elect Donald Trump and Vice President-elect Mike Pence, due to an extreme difference in opinion on their political views.

pacemaker hacking kit

Implantable medical devices can be hacked to harm patients

It's possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work, researchers in Belgium and the U.K. have demonstrated.

binary monitor tech digital moody hacker threat

Report: Most cybercriminals earn $1,000 to $3,000 a month

Most cybercriminals make between $1,000 and $3,000 a month, but 20 percent earn $20,000 a month or more, according to a recent report from Recorded Future

Group of executives holding trophy photo winners people men woman award

Incident response and our 'culture of winning'

Security professionals understand the immense value of a formal incident response plan, but management may not always see it the same way, especially as it may be viewed by stockholders or other interests as a "plan to fail". But...

01 holiday phishing

10 top holiday phishing scams

It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to...

facebook magnify

Security experts divided on ethics of Facebook's password purchases

Last week, Facebook CSO Alex Stamos told conference attendees in Lisbon that the company buys stolen passwords on the black market, and some security experts are questioning the ethics and benefits of this approach.

hillary clinton florida campaign

Hillary Clinton might have been a pretty good president had she used Pretty Good Privacy

Had Presidential candidate Hillary Clinton employed basic email security techniques, she’d be President-elect.

nuclear power plant

Is critical infrastructure the next DDoS target?

DDoS attacks are vastly bigger now, thanks to botnets composed of Internet of Things devices. A recent attack that took down a portion of the internet has led to questions about whether something similar could shut down critical...

ios search ads app store results

Apple just removed hundreds of fake shopping apps from the App Store

Counterfeit apps masquerading as huge brands like Zappos and Nordstrom are sneaking into the iOS App Store.

broken silver key

Fraud and privacy problems on the blockchain

Enemy at the Gates post explaining blockchain vulnerabilities that open opportunities for fraud and describing privacy problems introduced by potential fraud countermeasures.

tesco bank security

UK bank suspends online payments after fraud hits 20,000 accounts

The banking arm of U.K. supermarket chain Tesco has suspended online payments for its 136,000 checking account customers following a spate of fraud.

ecommerce woes2

7 ways to protect your ecommerce site from fraud, hacking and copycats

Ecommerce business owners and cybersecurity experts discuss how you can protect your online store, especially during the holiday season.

twitter broken

BGP errors are to blame for Monday’s Twitter outage, not DDoS attacks

Early Monday morning, for about thirty minutes, Twitter went dark. Almost immediately, once service was returned, people started speculating about a massive attack. However, Monday’s outage wasn’t anything malicious, by all accounts...

power lines electric grid

Above the lines: Addressing grid security in the press

The electricity industry continues to improve its security posture, yet we are drowning in a sea of negative press.

emv chipandpin

EMV, fraud mitigation or migration?

It's been just over a year since the roll out, but how much fraud has EMV really prevented?

hunting orange

It’s hunting season but who’s the prey?

There’s a trend in security operations to work to close the gap between discovering a breach after the damage has been inflicted, and delving deeper into the infrastructure to evaluate the “What/Where/When/How” in an effort to advance...

bullseye hospital healhcare

Unencrypted pagers a security risk for hospitals, power plants

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages sent without encryption, attackers can listen in and even interfere with the communications

electrical grid powerline

Defending the grid

The vulnerabilities that allow hackers to infiltrate protocol and DDoS attack

Load More