Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

credit cards

french police

How tech led to the death of France's public enemy number 1

The suspected mastermind of last week's terror attacks in Paris, Abdelhamid Abaaoud, has died in a police raid. Investigators were led to him by wiretaps and an abandoned telephone.

linux encryption

U.S. may be financing encryption apps to stay ahead of terrorists

The U.S. government's financial support for the development of smartphone encryption apps doesn't surprise security experts.

vintage robot toys windup

New ad-fraud botnet targets major corporations, universities

A new botnet is specifically targeting large corporations, taking over user machines to generate high-value ad fraud, according to a new report from Pixalate.


Military's Osprey helicopter-airplane makes record flight

The Osprey just completed its longest flight in history, flying from California to Brazil for joint military training exercises.

drone sunset

Don't fall for drone registration scams, warns FAA

The Federal Aviation Administration hasn't revealed its plans for drone registration yet, but that hasn't stopped at least one company from trying to make a buck from confusion about the rules.

shutterstock 335609987

FTC ruling suggests upcoming changes for data compliance regulation

Recent data breaches tell us what private and public sector victims are dealing with: disruption, reputational damage, and significant financial repercussions. They can also find themselves attracting the undesirable attention of...

electrical grid

Electromagnetic Pulse weapons could knock enterprises offline

No transformers robots, no nukes, just real EMPs from long-range missiles or targeteddDrone attacks.

ted koppel lights out video

Ted Koppel: Apocalypse likely

Retired “Nightline” anchor Ted Koppel, in his new book “Lights Out,” says he is simply documenting the veracity of warnings from top U.S. intelligence officials that the nation’s energy grid is vulnerable to a cyberattack that could...

ted koppel

Ted Koppel discusses the inevitable cyberattack on U.S. infrastructure

Ted Koppel, author of "Lights Out" speaks to CSO about the risks of a catastrophic cyberattack on U.S. infrastructure, and how government has no apparent plan to deal with the results.

isis portal on the darknet

After Paris, ISIS moves propaganda machine to Darknet

Less than a day after the horrific attacks in Paris, ISIS has taken the Al-Hayat propaganda machine to the Darknet and published a new video celebrating the Paris attacks.

nyc power plant

Are vendors on the wrong path where smart plant security is concerned?

Cyber criminals can’t wait for enterprises to mainly apply access controls and encryption as their toughest solution for securing smart plants.

credit card fraud

How to recognize an online fraudster

The capability to profile potential cybercriminals, along with the implementation of chip-and-pin credit cards, may produce a reduction in the amount of money lost to online fraud each year. But that doesn’t mean the threat will go...

lightning over washington

Government CIOs and CISOs under siege by insider threats

As the Office of Management and Budget rolls out a framework to help agencies advance their cybersecurity posture, a new report highlights pervasive vulnerabilities from insiders.

stolen laptop

EMC, hospital to pay $90,000 over stolen laptop with medical data

EMC and Hartford Hospital have agreed to pay US$90,000 to Connecticut in connection with the loss in 2012 of an unencrypted laptop containing patient information of 8,883 residents of the state, according to the state's attorney...

security threat ninja hacker hacked

Spending millions on APT defense? Don’t forget about Third Party Risk Management

Being a large company, you have a risk when hiring a third-party consultant - you condemn them to be hacked instead of you.

machine learning data code people silhouettes shadows

Why we need behavior-centric detection and response

According to the Verizon 2015 Data Breach Investigations Report (DBIR), 60 percent of the time, attackers were able to compromise an organization within minutes. Meanwhile, in more than 75 percent of the cases, the average time to...


Advertising network takes on malvertisers

In the war between malvertisers and legitimate advertising networks, the bad guys seems to be winning. Attackers use real-time bidding platforms to place malicious ads on otherwise reputable sites, infect target users and disappear --...

emv chipandpin

Consumer Alert: Debit card fraud at Walmart discovered in 16 states

Consumers are being warned about an uptick in the number of fraudulent purchases being made at Walmart, which in some cases has resulted in their financial institution moving to deny debit card transactions unless a PIN is used. The...

Load More