Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

atm cash machine money
Internal Revenue Service IRS tax filing form 1040

managed security service providers

Security training programs don't do enough to mitigate insider risk

The threats posed by negligent insiders top many security professionals' lists of security concerns, but even organizations that have data protection and privacy training programs aren't getting through to their employees.

click fraud

Angry advertisers hope to seal fate of online ad fraud

Certified Against Fraud is the brainchild of the Trustworthy Accountability Group (TAG), of which the ANA is one of the founders. It plans to award seals to advertising buyers, sellers, and intermediaries that meet its anti-fraud...

overloaded

How employees can share the IT security load

Security threats weigh heavily on IT and security professionals, and it is a responsibility that they should not bear alone. We all need to do our part to uphold the safeguarding of sensitive data.

atm cash machine money

Stealthy malware Skimer helps hackers easily steal cash from ATMs

Security researchers have found a new version of a malware program called Skimer that's designed to infect Windows-based ATMs and can be used to steal money and payment card details.

hacker house

Cybercriminal business model vulnerable to intervention

Cybercrime may be booming but its business model is vulnerable on many fronts, according to a new report.

US flag in front of government state capital

'Security Mom' talks about role of cyber in government agencies

Former assistant secretary at the U.S. Department of Homeland Security, says the government needs more skilled cyber security practitioners

emv chip and pin

State of EMV report: Fraud rises before a fall

Counterfeit fraud losses for retailers will hit $4.5 billion in 2016; fall to $1 billion by 2020.

04 insider threat

Mitigating insider threats from a people perspective

Mitigating insider threats is an ongoing effort that requires a holistic approach that encompasses technological as well as human solutions. Additionally, organizational and situational factors can help mitigate the threat posed by...

power storm power lines electricity overhead power lines 000000583296

Maintaining a utility's security and reputational risk is vitally important

Building a utility's reputation may take years, but it can be damaged or destroyed very quickly from a security event. Reputational risk is regarded as the greatest threat to a company's market value and standing in the community.

Yellow luggage with airplane and sky

Unfunny wifi hotspots on a plane 

News broke yesterday where a flight in Australia was delayed due to some intellectually challenged individual thought it would be funny to rename his/her wifi hotspot. But, before we dig into that I’ll share a personal story. A...

gundremmingen nuclear power plant

Is this the nuclear power hack we've all feared? Hardly.

Bavarian nuclear power plant discovers malware.

refinery 109025 1920

Energy infrastructure cyber risk outlook for 2016

Risk predictions in relation to the cyber threat landscape posed by criminals, hacktivists, spies, and cyber warfare.

1 iot intro

4 tips to protect digital identity in an IoT world

Everyone and everything has a unique digital identity -- from employees to customers, connected cars to drones – that leaves plenty of data floating around the Internet. Here are four scenarios on how to keep that data safe.

swift banking euros

SWIFT banking network warns customers of cyberfraud cases

SWIFT, the international banking transactions network, has warned customers of "a number" of recent cyber incidents that criminals used to send fraudulent messages through its system, according to a news report.

bangladesh dhaka bank

Bangladesh Bank attackers used custom malware that hijacked SWIFT software

The hackers who stole $81 million from Bangladesh's central bank earlier this year likely used custom malware designed to interfere with the SWIFT client software used by financial institutions.

mexican election vote

MongoDB configuration error exposed 93 million Mexican voter records

A 132 GB database, containing the personal information on 93.4 million Mexican voters has finally been taken offline. The database sat exposed to the public for at least eight days after its discovery by researcher Chris Vickery, but...

taxi passenger

Uber fraud: Scammer takes the ride, victim gets the bill

Some users of the ride-hailing service Uber have found themselves being charged for “ghost” rides they never ordered, since their credentials were stolen and sold on the Dark Web. Experts say better security practices by the company...

bullseye darts

CEO targeted by fraud twice a month

Every couple of weeks or so, Tom Kemp's company gets hit by ever-more-sophisticated attempts to trick them out of large sums of money

Load More