Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

gundremmingen nuclear power plant
refinery 109025 1920

1 iot intro

4 tips to protect digital identity in an IoT world

Everyone and everything has a unique digital identity -- from employees to customers, connected cars to drones – that leaves plenty of data floating around the Internet. Here are four scenarios on how to keep that data safe.

swift banking euros

SWIFT banking network warns customers of cyberfraud cases

SWIFT, the international banking transactions network, has warned customers of "a number" of recent cyber incidents that criminals used to send fraudulent messages through its system, according to a news report.

bangladesh dhaka bank

Bangladesh Bank attackers used custom malware that hijacked SWIFT software

The hackers who stole $81 million from Bangladesh's central bank earlier this year likely used custom malware designed to interfere with the SWIFT client software used by financial institutions.

mexican election vote

MongoDB configuration error exposed 93 million Mexican voter records

A 132 GB database, containing the personal information on 93.4 million Mexican voters has finally been taken offline. The database sat exposed to the public for at least eight days after its discovery by researcher Chris Vickery, but...

taxi passenger

Uber fraud: Scammer takes the ride, victim gets the bill

Some users of the ride-hailing service Uber have found themselves being charged for “ghost” rides they never ordered, since their credentials were stolen and sold on the Dark Web. Experts say better security practices by the company...

bullseye darts

CEO targeted by fraud twice a month

Every couple of weeks or so, Tom Kemp's company gets hit by ever-more-sophisticated attempts to trick them out of large sums of money

young executive at laptop being watched by hacker

Blackhole exploit kit author sent to jail: Pyrrhic victory for the cybersecurity industry

The imprisonment is rather a defeat than a victory for our industry if we carefully look into the details.

01 whaling title

10 whaling emails that could get by an unsuspecting CEO

Email security company Mimecast has shared a handful of real-life examples of fraud attempts targeted at the person in the corner office.

trojan horse

Hybrid GozNym malware targets customers of 24 financial institutions

A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen million dollars from customers of 24 U.S. and Canadian banks.

power transmission towers

Catastrophic cyber attack on U.S. grid possible, but not likely

U.S. critical infrastructure systems still need major security improvements. But experts say that predictions of catastrophe from portions of the electric grid being taken down for months or more by a cyber attack, are overblown.

high voltage line

Defining the threat in the energy sector

What are the categories of adversary faced by the energy sector in 2016? By analyzing their motivation and procedures we gain a better understanding of who might be a target and why.

package delivery

Woman loses $1,825 to mystery shopping scam posing as BestMark, Inc.

A woman in Houston, Texas is out $1,825 after scammers targeted her using the name of a legitimate company that specializes in mystery shopping. The victim came to Salted Hash's attention after a family member read a post on CSO's XSS...

board16ibmsynapsechips

Infiltrate take aways for a security newb

Across security sectors, offensive hackers offer tactics to prevent an attack

walmart shopper

Walmart mystery shopper scam resurfaces

A mystery shopper scam targeting Walmart customers, which has been around since at least 2011, has resurfaced. Reports of the scam have started circulating on Facebook and other parts of the Web, from people who have gotten checks of...

hard drive stock

Millions of child support records stolen, D.C. officials want answers

Two people have been arrested, but stolen drives with millions of child-support records are still missing in Olympia, Washington. The hard drives belonged to the local office of the Administration for Children and Families, part of...

disaster recovery knob

In the event of an emergency, you will be prepared

Preparedness drills for physical safety are commonplace. Why not begin doing the same for digital safety? And what would such a thing entail?

us eu handshake

The impact of the new Trans-Atlantic privacy law

After 20 years of relative calm regarding the handling of personal data of EU citizens by U.S. companies, events over the past six months have instigated widespread reform. While the resolution is yet to be confirmed, the building...

suspicious activity

A reality check for security leaders on insider risk

Mike Tierney shares his insights on successfully implementing processes to combat insider risk by engaging the right people at the right time in the program

Load More