Physical Security

Physical Security | News, how-tos, features, reviews, and videos

security threats and vulnerabilities
abstract networks and connections

A traveller with suitcase looks at the horizon and the path ahead. / travel / adventure / beginnings

What the digital booking trend means for local travel attractions and fraud prevention

Online bookings of local tours, attractions and even dining have skyrocketed. Although this can be a great source of traffic and revenue for these local attractions, online payments fraud in this sector continues to rise and these...

stolen credit card

In the new ecommerce fraud landscape, every vertical is now at risk

Fraudsters are not just targeting small merchants or inexpensive items anymore – virtually any vertical or product can be a worthwhile target for online fraud, and the losses could cause irreversible damage to a retailer’s bottom...

smart city iot iiot buildings skyline matthew henry unsplash

Hacking smart buildings

Smart buildings are giant IoT devices begging to get hacked. A new report offers concrete advice on how to mitigate the risk to building automation and control systems (BACS).

power lines

Our electric grid is vulnerable to cyberattacks. Here’s what we need to do

As more state-sponsored cyberterrorists and rogue actors take aim at bringing down the U.S. power grid, the government and private utility companies need to coordinate efforts to mitigate the chances of what could be a major...

7 safe browswer search legitimate url domains surfing the internet

Why abandoned domain names are so dangerous

Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.

candle laptop blackout

Botnet of smart air conditioners and water heaters could bring down the power grid

If "smart" appliances that connect to the internet were to be used in a botnet, it could cause large-scale blackouts of the power grid, researchers warn.

binary neural network - artificial intelligence - machine learning

Balancing cybersecurity and regulatory compliance

Leveraging artificial intelligence and other advancements is key to protecting critical infrastructure.

Passenger view of an airplane wing above the clouds. / travel / journey / transportation

Where Chicken Little meets information security

Outside of a movie theater, your plane won’t be hacked out of the sky.

Exclamation point on screen warning alert caution stop

Ways to improve your security team’s response time

Every second counts when it comes to incident response. With proper staffing, a streamlined procedure and the right tools in place, responding to threats can be a far less daunting task.

monitoring systems

Data is the oil of the 21st century

The cybersecurity lessons of the 2016 election and the changing nature of our critical infrastructure.

security threats and vulnerabilities

What price range sees the most CNP fraud? It depends

Data on the price ranges that online fraudsters target most are effective in helping retailers be more aware of fraud tendencies. However, any price point can be a target to some criminals, and it’s important to leverage this data to...

deepfakes fake news tv head manipulation superimposed brainwashed

What are deepfakes? How and why they work

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

cyber terrorism dynamite explosion blow up binary detinate

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's...

fingerprint scan biometric security system

N-dimensional behavioral biometrics: a viable solution for digital fraud?

Artificial intelligence can be used to stop identity fraud from reaching record-breaking highs.

credit card fraud

Analyzing user behavior to stop fake accounts

Online account fraud is a big, automated business. NuData Security looks at hundreds of data points to identify malicious login attempts.

number 4 four film strip

4 cybersecurity developments to watch in 2018

Be ready for when the future arrives, start monitoring a pipeline of emerging technologies.

Elon Musk

Insider threat becomes reality for Elon Musk

Every company needs to worry about the insider threat and Tesla is no exception. Now, Tesla has sued former employee Martin Tripp for sabotage and intellectual property theft.

woman phone scam

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

Load More
You Might Also Like