Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

social security card
01 day breach calendar year

Phishing trends

Scamming the scammers

There is no absolute way to completely eradicate end users’ susceptibility to scams, but with constant care and diligence (coupled with technical measures), it’s possible to provide guidance to ensure a heightened awareness and...

cybersecurity

White House axes cyber czar role; DHS unveils new cybersecurity strategy

The White House eliminated the top cybersecurity coordinator position even as Homeland Security warned that "our cyber adversaries can now threaten the very fabric of our republic itself."

orange monitors with lock icon network security cyber threat

Fighting fraud: Tips for getting ahead of the ever-evolving threat

Fraud is largely inevitable but fighting it doesn’t have to be fruitless. Chris Camacho shares tips to help businesses combat this threat more effectively.

Apple phishing webpage

Salted Hash - SC 01: What an Apple phishing attack looks like

Today on Salted Hash, we’re going to look at a phishing attack from two sides. The first side will be what the victim sees. After that, we're going to see what the criminal sees. We'll also discuss some steps administrators can take...

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

thumbs down crush squish hand with thumb

IBM and thumb drives: epoxy or beacons?

Banning thumb drives and removable media will not stop the loss of sensitive data files. Beacons that track the content of thumb drives is far more sensible to reduce data loss.

sepia number 3 film reel top three

The 3 hidden costs of incident response

Every business function seeks to apply finite resources to maximum benefit, and to do that effectively in security, like threats, requires a keen understanding of those costs that are known and those that are hiding.

whyhpcmatters frauddetection 1000

CNP fraud spikes during the holiday shopping season. Here are 3 things you can do now to protect your holiday sales

CNP fraud spikes during every holiday season, and 2018 will be no exception. Before it’s too late, online retailers need to get prepared in their fraud prevention efforts. Here are three steps that online sellers can take right now to...

woman on smartphone city network security leader iot

What is a Chief Security Officer? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

Election 2016 teaser - Electronic voting security for digital election data

Online voting is impossible to secure. So why are some governments using it?

If you thought electronic voting machines were insecure, wait 'til you meet online voting. Dr. Vanessa Teague has twice demonstrated massive security flaws in online voting systems. Instead of fixes and support, she got official...

Atlanta skyline

Atlanta's recovery highlights the costly mistake of being unprepared

The Samsam attack against the city of Atlanta in March was chaotic and crippling. The ransomware, named for the group responsible for development and deployment, left the city scrambling to deal with critical systems that were forced...

security incident responders life preservers

Two incident response phases most organizations get wrong

It's important to remember: Incident response isn't a thing, it's a process.

customer feedback frustrated man speech bubbles social media

Customers describe the impact of the Allscripts ransomware attack

A ransomware attack against a SaaS provider hurts customers, but when it's a healthcare company that’s hit, patients suffer. Such was the case with January's attack against Allscripts, one of the largest electronic health record and...

Pills 168822677

Busted! Cops use fingerprint pulled from a WhatsApp photo to ID drug dealer

Police used a photo sent via WhatsApp and a “pioneering fingerprint technique” to ultimately secure drug convictions against 11 people.

allscripts health care ransomware bitcoin

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.

credit card fraud

Without the right data, CNP fraud protection could be out of reach

Capturing and analyzing your sales and fraud data gives your ecommerce business real-time, dynamic information that helps you keep pace with rapid changes in the way fraudsters operate. Without this information, your fraud prevention...

whyhpcmatters frauddetection 1000

Cross-channel fraud detection

How performing behavioral analysis across silos can help detect sophisticated attacks.

balint seeber bastille SirenJack

SirenJack: Hackers can hijack emergency alert sirens with a $35 radio and laptop

Emergency alert systems manufactured by Acoustic Technology Inc. can be hijacked and made to play any audio thanks to a vulnerability dubbed SirenJack.

Load More