Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

emv chip and pin
spam

2014 11 14 value in passwords

After this judge's ruling, do you finally see value in passwords?

Judge rules authorities can use your fingerprint to unlock your smartphone. What that means for authentication and the future of passwords.

retail theft

Cost of retail crime skyrockets nearly 30 percent

Higher proportions of employee theft and shoplifting as a share of all retail losses, combined with higher spending on loss prevention, resulted in a 27 percent increase of the cost of retail crime in the United States, according to...

obama credit

Obama signs Executive Order to bolster federal credit card security

On Friday, at the headquarters of the Consumer Financial Protection Bureau, President Obama signed an Executive Order that will add chip-and-PIN protections (EMV) to federal credit cards starting in January. The President encouraged...

cybertale2

Three scary, but true, security tales

Just in time for Halloween, renowned cyber security expert and SANS Faculty Fellow, Dr. Eric Cole, shares three horrific tales of hideous human behavior which he has personally witnessed – and lived to tell!

What did you expect to happen when you bought the electronic lock?

In a case where physical and cyber security merge, some think the judge in the case got it wrong. Here’s why the decision was right and what it means for you.

Threat Intelligence firm mistakes research for nation-state attack

A Bloomberg story, backed by data collected by threat intelligence firm, ThreatStream, mistakenly identified scans by a security researcher as a nation-state attack. According to the data, Chattanooga, TN is second only to Beijing in...

cell tower

Rogue cell towers discovered in Washington, D.C.

After initially discovering more than a dozen rogue cell towers in the U.S., ESD America and IntegriCell discovered more questionable towers in the nation's capitol, 15 of them to be exact. Ownership remains unknown, but Tuesday's...

grindr logo

Grindr vulnerability places men in harm's way

Grindr, a dating application that caters to gay and bisexual men, could be placing them at risk; and in at least one case, has helped authorities enforce anti-gay agendas by taking advantage of the service's geo-location...

Train security

Tunnel vision: Train security as critical as planes and automobiles

Railroads have historically considered their computing, controls and communications to be proprietary, and therefore more secure. With today’s use of commercial off-the-shelf products and standard protocols, yesterday’s defenses for...

wateringhole

Industrial software website used in watering hole attack

AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.

How a hacker could cause chaos on city streets

Traffic is chaotic enough in major cities, but imagine how much worse it would be if a criminal hacker got control of the traffic lights.

security snafus deadly death skull bones fatal

Why physical security (and InfoSec!) still matter

In this day and age where everything is connected, it's easy to forget that protecting devices themselves is just as important as InfoSec

Dragon NaturallySpeaking 13 office man image

Is the open floor plan trend a data security headache?

Open-office floor plans have become an increasingly popular option for businesses, but the risks they present may outweigh the benefits

Retired US airport body scanners fail to spot guns, knives

Tests on the Rapiscan Secure 1000 shows weapons can be smuggled by exploiting weaknesses

nuclear bomb test bikini atoll and enewetak october 21 1952 dv1282017

Workers at U.S. nuclear regulator fooled by phishers

Nuclear Regulatory Commission employees were tricked into disclosing passwords and downloading malware in three phishing attacks that occurred over a three-year period.

medical 3

Community Health Systems blames China for recent data breach

Community Hospital Systems (CHS), which operates just over 200 hospitals in 29 states, reported a data breach impacting about 4.5 million people on Monday. The incident, blamed on actors in China, was made public via an 8-K filing...

shutterstock 209307634

Buckle up: Security threats to connected cars get real

As our connected cars move from syncing our music to driving us home, drivers, passengers, and pedestrians are starting to wonder if they should trust these high-velocity death-mobiles with their lives. It’s a good question.

shutterstock 1012656

Getting past the most basic physical security of all: Learning to pick locks at DEFCON 22

The following guest post is from Grant Hatchimonji, CSO's Senior Editor

Load More