Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

water bubbler fountain drinking

Protecting vital water infrastructure

Safe drinking water is a necessity for protecting public health and safety. Water systems in the United States perpetuate all human activity and properly treated wastewater is vital for preventing disease and protecting the...

coal power station

New report examines the weaknesses of industrial environments

A new report from FireEye examines the attack surfaces shared by a number of industrial enterprise operations, including electric utilities, petroleum companies, and manufacturing organizations. The six weaknesses outlined by FireEye...

smart city pins iot navigation

Getting smarter about building smart cities

Security risks to consider with more interconnected devices used in the critical infrastructure of smart cities

oil rig water

Refuting urban legends of the energy sector

A Houston Chronicle article makes many missteps in its reporting that must be addressed.

People walking with airplane in background

Email security appears grounded as attacks continue to take flight

With clever cybercriminals finding creative new ways to get to users, has email security lost the battle to protect.

1 picture that key

7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

7 ways criminal hackers use high-tech surveillance—sometimes with a social engineering element—to tap into the enterprise to get the keys to your kingdom, or sensitive information.

night stars sky utility pole

Myth-busting the urban legends surrounding the energy sector

A U.S. newspaper recently printed an article, "Hacked: Energy industry controls provide an alluring target for cyberattacks", focusing on purported cybersecurity weaknesses across the energy sector. John Bryk sets the record straight....

8 safari tips and tricks do a spotlight search in safari 8

Scammers scare iPhone users into paying to unlock not-really-locked Safari

Apple has patched a bug in the iOS version of Safari that was used by criminals to spook users into paying $125 or more because they thought the browser was broken.

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

smartphones 2013

Study finds devices are not wiped properly

The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them.

combat cyber crime ts

Continuous IT audits are needed to combat today's cyber threats

It's time to shift to continuous audits as cyber threats are dynamic and constantly changing, we can no longer afford to take a static snapshot of critical IT systems.

amazon gift cards

Bot attacking gift card accounts

Distil Networks has found a bot affecting nearly 1,000 customer websites. Gift cards are under attack by hackers, and consumers are being advised to check their balances.

bitcoins

Bitcoin rise fuels social media scams

The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get in on the action with Ponzi schemes and phishing sites spread via social media.

IRS

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

Anti-fraud measures by the Internal Revenue Service (IRS) and state agencies over the past two years have made tax refund scams harder for cyber criminals to pull off even as attacks targeting taxpayer information continue unabated.

substation transformers

Critical infrastructure: Off the web, out of danger?

For more than a decade there have been warnings that US critical infrastructure is vulnerable to a cyber “Pearl Harbor” attack. Those overseeing the grid say that is close to impossible, since control systems are not connected to the...

IRS

IRS issues new tax scam warnings, FSA tool suspended due to security concerns

The Internal Revenue Service (IRS) has issued a new warning to businesses, taxpayers, and tax prep professionals about Phishing scams targeting the sensitive information they work with on a daily basis. Soon after, the IRS and the US...

emv payment primary

Is the rocky road to EMV retail adoption getting smoother?

Confusion and resistance to EMV abounded in 2015, but 2017 brings improvements in adoption and an ongoing evolution in the implementation of EMV-capable credit card readers.

01 plan

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.

printer ink cartridges

Crime ring used Amazon, eBay to sell stolen printer ink

A dozen suspects are accused of raking in at least $12 million by putting stolen ink cartridges and retail electronics up for sale on Amazon and eBay, New York’s attorney general said on Wednesday.

Load More