Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

iphone explosion viral video
01 network

Why the CSO needs to be involved in active shooter prep

All security managers, especially those charged with physical security responsibilities, need to be involved in emergency prep for varying scenarios - including the potential for an active shooter on scene. Imad Mouline, CTO at...

01 fairy godmother

The security theory and troubling practice behind the TSA's PreCheck security lines

What is up with the TSA PreCheck program? Aside from being convenient, how does one get that pass through the security checkpoint? And how do you prove you are not a threat?

data breach predictions

5 data breach predictions for 2017

To help you stay ahead of emerging threats, here are five key data breach trends that you should anticipate in 2017.

D-Link DCS-8000LH, DCS-8700LH, DCS-8100LH home security cameras

D-Link shows off three new home security cameras in its Connected Home series

All three cameras deliver 720p resolution, microSD storage, night vision, and IFTTT support.

pacemaker hacking kit

Implantable medical devices can be hacked to harm patients

It's possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work, researchers in Belgium and the U.K. have demonstrated.

iot threats

Why IoT devices are the 'unusual suspects' in DDOS attacks

While CIOs have shored up PCs and software systems for years, they should start to look at video conferencing systems, webcams and other inconspicuous network devices, which can be exploited to trigger devastating DDOS attacks.

shopping mall crowd

Flash mobs the latest threat this holiday season

The holiday season rings in more than just higher sales for retailers. There's also more shoplifting and lower profit margins than the rest of the year, according to a report released today. Plus, this year, there's an extra surprise...

biokey

REVIEW: BIO-key’s plug-in fingerprint readers for Windows 10 computers

BIO-key loaned me these three models for evaluation. I tested them on two notebooks: one running Windows 10 Home, and the other Windows 10 Pro. Find out the results.

airplane landing

Grey hats and blue skies, dealing with airline security

Since Sept. 11, 2001, the airline industry has been one of the fastest industries to upgrade their security procedures and protocols against various threats, both present and perceived. However, hackers don't need to board an airplane...

onetouch ping

New insulin pump flaws highlights security risks from medical devices

Medical device manufacturer Animas warns diabetic patients who use its OneTouch Ping insulin pumps about security issues that could allow hackers to take over the devices and deliver unauthorized doses of insulin.

macos sierra auto unlock apple watch 2

How to 'Auto Unlock' your Mac with Apple Watch

A new feature in Apple's macOS Sierra lets you use your Apple Watch to easily unlock your Mac computer. However, the 'Auto Lock' feature won't work unless a set of security and authentication safeguards is also enabled.

note 7 explosion jeep

The Galaxy Note 7 implicated in dramatic Jeep and house fires, reports say

If you haven't opted to take advantage of Samsung's recall offer, you should reconsider.

luc portelance theodoros sotiropoulos

Canada-EU counter-terror data exchange is illegal, says top EU judge

An agreement to send Canadian authorities passenger name record (PNR) data for flights from the European Union cannot be entered into in its current form, a top European Union judge has said.

third party threats

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

steal thief theft burglar laptop secret crime

Laptops most often stolen from most unlikely place

The rise of mobile has led many CIOs to fret about data loss from lost or stolen devices. A new study suggests IT theft in the office should be a primary concern.

Bugs & Bugs logo

Bugs & Bugs: DARPA, bug bounties & thousands of bees

Facebook Live stream captures latest news on computer bugs & real insects

power analysis safe electronic lock

High-security electronic safes can be hacked through power and timing analysis

A hacker showed that high-security electronic safe locks are susceptible to power and timing side-channel attacks like those used to defeat cryptosystems.

mans hand with key card to hotel room door

How to protect yourself from common hotel security threats

Frequently travelers who aren't prepared for the security risks associated with staying in hotels put potentially sensitive information and their own personal safety at risk. Here's how to spot common threats, and protect your data...

Load More