Physical Security

Physical Security | News, how-tos, features, reviews, and videos

animus onetouch ping

New insulin pump flaws highlights security risks from medical devices

Medical device manufacturer Animas warns diabetic patients who use its OneTouch Ping insulin pumps about security issues that could allow hackers to take over the devices and deliver unauthorized doses of insulin.

luc portelance theodoros sotiropoulos

Canada-EU counter-terror data exchange is illegal, says top EU judge

An agreement to send Canadian authorities passenger name record (PNR) data for flights from the European Union cannot be entered into in its current form, a top European Union judge has said.

Legislation of privacy security keyboard law legal gavel court ruling

Florida privacy law adds breach notification and strengthens compliance

A brief intro to US State and Federal Law and how they work to govern the United States, An intro to the FIPA (Florida Information Protection Act) and how it works with existing compliance to strengthen it and better protect business...

04 insider threat

Combating insider threats faced by utilities

Today, grid operators face daily external threats from cyber hackers and criminals vandalizing or destroying company assets. While protections are in place to help prevent these external threats, utilities must realize that insiders...

third party threats

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

pokemon go app

Pokemon Go puts enterprises at risk

Eight statistics that might surprise you about Pokemon Go and the corporate network

padlocks

Salted Hash Rehashed: Vegas Adventures (Part I)

Welcome to a special edition of Rehashed. After a week in Las Vegas, followed by a week of nothing but sleep and pure laziness (otherwise known as vacation), we're getting back into the swing of things and catching up on the news and...

power analysis safe electronic lock

High-security electronic safes can be hacked through power and timing analysis

A hacker showed that high-security electronic safe locks are susceptible to power and timing side-channel attacks like those used to defeat cryptosystems.

cso 50 sm

The modern look of a utility's chief security officer

Security has received more attention in the last several years and organizations have realized that they lack a designated individual with the appropriate authority to carry out the security responsibilities of an organization. Enter...

How to protect yourself from common hotel security threats

Frequently travelers who aren't prepared for the security risks associated with staying in hotels put potentially sensitive information and their own personal safety at risk. Here's how to spot common threats, and protect your data...

magnetic card spoof point-of-sale hotel

This tiny device can infect point-of-sale systems and unlock hotel rooms

Millions of point-of-sale systems and hotel room locks can be hacked by temporarily placing a small, inexpensive device several inches away from their card readers.

cybersecurity

Digital security officer recruitment challenges and victories on the cyber battlefield

Veteran cybersecurity recruiter and leadership adviser S. A. Spagnuolo, of global executive search firm ZRG Partners, offers greetings to the reading audience, provides a quick primer on his background and sets his agenda going...

privileged accounts

Businesses failing to secure privileged accounts

A new benchmark survey finds that more than half of organizations have a failing grade when it comes to securing privileged accounts that can give attackers access to their entire networks.

Safe Skies TSA Lock

Rehashed: Lessons learned from the Safe Skies TSA master key leak

Over the weekend, Salted Hash broke the news that hackers had released the eighth and final TSA master key, which opens locks created by Safe Skies LLC. Today we'll discuss a key takeaway point from the story, as well as provide a...

Hackers leak Safe SKies TSA master key

Hackers create Safe Skies TSA master key from scratch, release designs

On Saturday evening, during the Eleventh HOPE conference in New York City, three hackers released the final master key used by the Transportation Security Administration (TSA), which opens Safe Skies luggage locks. The public release...

saip app

In Nice attack, government's official terror alert comes too late

"Take cover," the French government warned people in Nice via its official terror alert app, hours after the immediate danger had passed.

tesla fatality

Tesla asked to brief Senate committee on fatal car crash

Tesla Motors has been asked by a U.S. Senate Committee to brief it on the circumstances leading to a fatal accident that killed the driver of a Tesla Model S, while the vehicle’s Autopilot driver-assistance feature was turned on.

pokemon go

Muggers used Pokemon Go to lure victims, police say

With the launch of Pokemon Go last week, it's not just players but police that "gotta catch 'em all."

Pokemon Go

Pokémon Go players robbed at gunpoint, suspects arrested

Last week, people all over the U.S. started walking around in circles staring at their phones. No, they're not lost; they're playing a game – Pokémon Go. Most of those who have started playing, are reporting positive experiences, but...

nj transit

Big Brother is listening as well as watching

The professed goal of audio surveillance on mass transit systems may be to protect passengers. But privacy advocates say it crosses a line, amounting to violations of free speech and the right to be free from unwarranted and...

Load More
You Might Also Like