Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

wdbj memorial facebook
wdbj news truck

isis flag graphic

Reports: Ex-TeaMp0isoN member killed in Syrian drone strike

A British hacker, and former member of the hacking group TeaMp0isoN, Junaid Hussain (TriCk), was killed in a drone strike outside of the Syrian city of Raqqa on Tuesday. Reports of his death started circulating Wednesday afternoon as...

credit cards

Fraud rate doubles as cybercriminals create new accounts in users' name

To get more value out of stolen personal information, cyber criminals doubled their rate of account creation fraud this summer, according to a report report from Vancouver-based NuData Security

locks

DRM could be making a comeback in the enterprise

Digital rights management might be coming back to the enterprise, experts say, as long as usability issues don't get in the way.

dead mannequin

DEF CON 23 – How to kill someone

The following talk by Chris Rock was one of the standout talks earlier this month in Las Vegas. The video is just over 30 minutes in length and worth watching, as it highlights a number of basic logic flaws in the death industry.

emv chip and pin

What you need to know about chip-embedded credit cards

The conversion process from older magnetic stripe cards to chip-embedded credit and debit cards has sped up in recent months because of an Oct. 1 deadline. That's the day when liability for credit card fraud will shift from banks to...

nested russian botnet

GameOver ZeuS criminals spied on Turkey, Georgia, Ukraine and OPEC

The criminals behind the GameOver ZeuS Botnet didn’t just steal $100 million from banks -- they also spied on several countries on behalf of Russia, according to a Black Hat presentation Wednesday by an FBI agent and two other...

false identity

Ubiquiti Networks victim of $39 million social engineering attack

Ubiquiti Networks Inc in its SEC filings reveal they were the victim of a social engineering attack resulting in the loss of $39 million

trust

Trust in the new world: The evolving role of the Chief Risk Officer

The role of the Chief Risk Officer has changed in recent years to one that now involves fostering trust between client and corporation. Tomer Barel, global chief risk officer with PayPal, outlines four key areas where the CRO can...

shopping cart grunge

Book excerpt: Bullseye Breach

An excerpt from Bullseye Breach, a fictional account of how a major retailer loses 40 million card numbers to an international crime operation

remote trojan

How to kill Remote Access Trojans

Like their fleshy counterparts, RATs travel in packs, leading additional malware components to gather and reassemble themselves before launching the ultimate attack.

malware keyboard skull and crossbones

Newest RIG exploit kit driven by malicious advertising

Earlier this year, a disgruntled reseller leaked the source code for version 2.0 of the RIG exploit kit. Since then, the RIG's author has released a new version, which was recently discovered by researchers from Trustwave. The latest...

fb servers

7 essential SQL Server security tips

How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots

011215 president barack obama

Groups urge Obama to oppose cyberthreat sharing bills

U.S. President Barack Obama should oppose legislation intended to let businesses share cyberthreat information with each other and with government agencies because the bill would allow the sharing of too much personal information, a...

darkode seized page

Darkode cybercrime forum might be making a comeback

The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.

rfid cards

Accuvant researchers to release open source RFID access tool

Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure systems.

jamie dimon

What can we learn from JPMorgan’s insider breaches?

Another former JPMorgan Chase & Co. (JPMC) employee was recently arrested by the FBI on charges of stealing customer data and trying to sell it. Similar incidents have occurred multiple times at JPMC over the past few years. Upon...

watermarked map

When stolen data can ‘phone home’

While it is impossible to prevent all data breaches, digital watermarking of sensitive data can let organizations know immediately not only if it has been stolen, but where and how it is being accessed. That's a lot better than the...

proxyham

Privacy talk at DEF CON canceled under questionable circumstances

Earlier this month, several news outlets reported on a powerful tool in the fight between those seeking anonymity online, versus those who push for surveillance and taking it away. The tool, ProxyHam, was the subject of a recently...

Load More