Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

cell tower
grindr logo

Train security

Tunnel vision: Train security as critical as planes and automobiles

Railroads have historically considered their computing, controls and communications to be proprietary, and therefore more secure. With today’s use of commercial off-the-shelf products and standard protocols, yesterday’s defenses for...

wateringhole

Industrial software website used in watering hole attack

AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.

How a hacker could cause chaos on city streets

Traffic is chaotic enough in major cities, but imagine how much worse it would be if a criminal hacker got control of the traffic lights.

security snafus

Why physical security (and InfoSec!) still matter

In this day and age where everything is connected, it's easy to forget that protecting devices themselves is just as important as InfoSec

Dragon NaturallySpeaking 13 office man image

Is the open floor plan trend a data security headache?

Open-office floor plans have become an increasingly popular option for businesses, but the risks they present may outweigh the benefits

Retired US airport body scanners fail to spot guns, knives

Tests on the Rapiscan Secure 1000 shows weapons can be smuggled by exploiting weaknesses

nuclear bomb test bikini atoll and enewetak october 21 1952 dv1282017

Workers at U.S. nuclear regulator fooled by phishers

Nuclear Regulatory Commission employees were tricked into disclosing passwords and downloading malware in three phishing attacks that occurred over a three-year period.

medical 3

Community Health Systems blames China for recent data breach

Community Hospital Systems (CHS), which operates just over 200 hospitals in 29 states, reported a data breach impacting about 4.5 million people on Monday. The incident, blamed on actors in China, was made public via an 8-K filing...

shutterstock 209307634

Buckle up: Security threats to connected cars get real

As our connected cars move from syncing our music to driving us home, drivers, passengers, and pedestrians are starting to wonder if they should trust these high-velocity death-mobiles with their lives. It’s a good question.

shutterstock 1012656

Getting past the most basic physical security of all: Learning to pick locks at DEFCON 22

The following guest post is from Grant Hatchimonji, CSO's Senior Editor

Why the recent court ruling on Gmail matters to you

Email may be coming under different guidance when it comes to warrants and subpoenas as society and the courts address the evolution of technology. Are you prepared to engage in the discussion?

internet gavel keyboard

Duo sentenced to 14 years for Apple Phishing scheme

Two people have been sentenced to a total of 14 years in prison for conducting a Phishing campaign that targeted banking details. The criminals accused, Constanta Agrigoroaie, 23, and Radu Savoae, 28, used the stolen funds as a means...

security awareness

No money, no problem: Building a security awareness program on a shoestring budget

Implementing a security awareness program seems rather straightforward, until you actually start to implement one - factoring in things like resources and the people (users) to be trained. At that point, it can seem complicated,...

street map map directions travel planning 000000559894

Beef up your security and avoid being a victim on vacation this summer

People falling prey to cyberattacks and breaches of physical security while traveling is not uncommon. Here's how to take steps to ensure that you and your assets stay safe

Watermark Retirement Communities suffers laptop theft

Late on Thursday afternoon people all around California were getting ready for July 4th celebrations the next day. What a better time to release notice of a stolen laptop then at that point. Maybe, just maybe, no one would notice.

Turning your security strategy inside out: The convergence of insider and advanced threat

Jason Clark and James Robinson of Accuvant discuss how security leaders can think outside the box when developing or revisiting their insider threat strategies.

internet gavel keyboard

Microsoft's takedown of No-IP pushes innocents into the crossfire

On Monday, Microsoft said they were taking No-IP (noip.com) to task for failing to prevent criminals from abusing their services. The case is Microsoft's latest effort to slow the spread of malware online, but this time innocents are...

Riverside County Regional Medical Center suffers data breach

I have to admit that stories about data breaches are becoming as common as days that end in “y”.

Load More