Physical Security

Physical Security | News, how-tos, features, reviews, and videos

Aerial view of the United States as a nationwide grid.
water infrastructure / wastewater treatment facility / sewage treatment plant

malicious email alerts / warnings / dangers

Email spoofing explained: Who does it and how?

Forging email has been with us since the beginning of the internet, but new security kludges are making it a lot harder.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

No election security funding in latest round of stimulus funding

Doubts raised about funding for 2020 election security and mail-in voting as money omitted from the latest stimulus bill.

A United States postage stamp displayed against a background of red, white and blue question marks.

Mail-in ballots during COVID crisis necessary, but with risk says expert

Noted election security researcher Harri Hursti says mail-in voting is likely the only option for a safe, secure US presidential election, but voter and election worker training needed.

FinTech / electronic payments / banking / dollars / euros / pounds / yen

7 PSD2 questions every CISO should be prepared to answer

The EU's recently updated Payment Services Directive has several requirements that affect security, such as stronger authentication for online payments.

United States national government cybersecurity  >  Diverse hands surround/protect the U.S. Capitol.

Cyberspace Solarium report calls for layered cyber deterrence, defend forward strategy

The intergovernmental commission outlines the steps needed to defend the United States from modern cybersecurity threats.

credit card swipe / crosshairs

Credit card skimmers explained: How they work and how to protect yourself

A card skimmer is a device designed to steal information stored on payment cards when consumers perform transactions at ATMs, gas pumps and other payment terminals. More recently, the use of the term has been extended to include...

credit card hack financial breach stealing money traffiking financial data target by igphotography

8 PCI DSS questions every CISO should be able to answer

PCI DSS is a standard backed by all the major credit cards and payment processors that is designed to protect credit card numbers. It specifies a set of cybersecurity controls and business practices and requires either...

5G light trails

4 ways 5G will change your enterprise threat model

The benefits that fifth-generation cellular networks will enable come with security risks that organizations need to pay attention to right now.

5G mobile wireless network

5G security is a mess. Could digital certificates help?

5G inherited security vulnerabilities from earlier mobile technology, but digital certificates might solve the issue of unauthenticated messages.

election hacking security 2020 election security flag global breach by stuartmiles99 getty

Presidential campaigns taking email security more seriously--not so much at the local level

DMARC now protects the email domains for most U.S. presidential candidates, according to a new report, but local election bodies lag behind and are vulnerable to spoofing.

USA / United States Capitol Building / Congress / abstract digital infrastructure

On the 2020 Congressional cybersecurity agenda: Critical infrastructure, copyright exemptions

Despite the distraction of an election year, Congress is expected to give the Department of Homeland Security tools to identify critical infrastructure threats and copyright exemptions to security researchers.

Internet of Things (IoT) / security alert / wireless network management

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk.

online shopping cart magecart hackers shopping online

Magecart-related arrests made in Indonesia

The three individuals arrested represent only a small portion of the Magecart web-skimming group, but the investigation is ongoing.

medical network h/ ealthcare IoT / hospital connections and communications

Insecure configurations expose GE Healthcare devices to attacks

The six high-risk vulnerabilities result from hard-coded or no credentials in remote access software and the use of outdated applications.

Tour de France cyclists racing / global digital broadcast connections

How the Tour de France secures its broadcast from disruption

Few sporting events have the scale and logistics challenges that the Tour de France presents. Event organizer ASO uses the cloud and tight physical security to avoid cyberattacks and broadcast integrity.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

US elections remain vulnerable to attacks, despite security improvements

Continued Russian interference, insecure paperless voting processes will sow doubt about the next election despite some security improvements.

United States Capitol Building / Congress / legislation in a digital landscape

2020 outlook for cybersecurity legislation

Here's a rundown of all the security-related bills working their way through this year's U.S. Congress, plus some hot security topics likely to be debated.

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

Load More
You Might Also Like