Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

sony headquarters

Siemens patches critical SCADA flaws likely exploited in recent attacks

The vulnerabilities allow remote attackers to extract files from WinCC SCADA servers and execute arbitrary code on them


sony headquarters

Hackers suggest they had physical access during attack on Sony Pictures

On Monday, Sony Pictures was forced to disable their corporate network after attackers hijacked employee workstations in order to threaten the entertainment giant. Now, new information suggests those responsible had physical access to...

00 title smartcard checklist

10 point smartcard checklist for merchants

Just about a year from now, retail merchants who currently accept only magnetic stripe payment cards will have to start accepting chip-based smart cards as well.

emv chip and pin

12 security problems that EMV and tokenization won't solve

On November 1 of next year, merchants that aren't ready to accept chip-based cards instead of the current magnetic-stripe cards will become liable for fraudulent transactions that today are covered by the credit card companies.

spam

Scammers move from Ebola phishing to fundraising

Scammers routinely try to take advantage of humanitarian disasters to get people to open phishing emails, or to donate money to fake organizations. This month, they combined the two approaches, sending out approximately 700,000 spam...

2014 11 14 value in passwords

After this judge's ruling, do you finally see value in passwords?

Judge rules authorities can use your fingerprint to unlock your smartphone. What that means for authentication and the future of passwords.

retail theft

Cost of retail crime skyrockets nearly 30 percent

Higher proportions of employee theft and shoplifting as a share of all retail losses, combined with higher spending on loss prevention, resulted in a 27 percent increase of the cost of retail crime in the United States, according to...

obama credit

Obama signs Executive Order to bolster federal credit card security

On Friday, at the headquarters of the Consumer Financial Protection Bureau, President Obama signed an Executive Order that will add chip-and-PIN protections (EMV) to federal credit cards starting in January. The President encouraged...

cybertale2

Three scary, but true, security tales

Just in time for Halloween, renowned cyber security expert and SANS Faculty Fellow, Dr. Eric Cole, shares three horrific tales of hideous human behavior which he has personally witnessed – and lived to tell!

What did you expect to happen when you bought the electronic lock?

In a case where physical and cyber security merge, some think the judge in the case got it wrong. Here’s why the decision was right and what it means for you.

Threat Intelligence firm mistakes research for nation-state attack

A Bloomberg story, backed by data collected by threat intelligence firm, ThreatStream, mistakenly identified scans by a security researcher as a nation-state attack. According to the data, Chattanooga, TN is second only to Beijing in...

cell tower

Rogue cell towers discovered in Washington, D.C.

After initially discovering more than a dozen rogue cell towers in the U.S., ESD America and IntegriCell discovered more questionable towers in the nation's capitol, 15 of them to be exact. Ownership remains unknown, but Tuesday's...

grindr logo

Grindr vulnerability places men in harm's way

Grindr, a dating application that caters to gay and bisexual men, could be placing them at risk; and in at least one case, has helped authorities enforce anti-gay agendas by taking advantage of the service's geo-location...

Train security

Tunnel vision: Train security as critical as planes and automobiles

Railroads have historically considered their computing, controls and communications to be proprietary, and therefore more secure. With today’s use of commercial off-the-shelf products and standard protocols, yesterday’s defenses for...

wateringhole

Industrial software website used in watering hole attack

AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.

How a hacker could cause chaos on city streets

Traffic is chaotic enough in major cities, but imagine how much worse it would be if a criminal hacker got control of the traffic lights.

security snafus deadly death skull bones fatal

Why physical security (and InfoSec!) still matter

In this day and age where everything is connected, it's easy to forget that protecting devices themselves is just as important as InfoSec

Dragon NaturallySpeaking 13 office man image

Is the open floor plan trend a data security headache?

Open-office floor plans have become an increasingly popular option for businesses, but the risks they present may outweigh the benefits

Retired US airport body scanners fail to spot guns, knives

Tests on the Rapiscan Secure 1000 shows weapons can be smuggled by exploiting weaknesses

Load More