Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

macos sierra auto unlock apple watch 2
note 7 explosion jeep

luc portelance theodoros sotiropoulos

Canada-EU counter-terror data exchange is illegal, says top EU judge

An agreement to send Canadian authorities passenger name record (PNR) data for flights from the European Union cannot be entered into in its current form, a top European Union judge has said.

third party threats

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

steal thief theft burglar laptop secret crime

Laptops most often stolen from most unlikely place

The rise of mobile has led many CIOs to fret about data loss from lost or stolen devices. A new study suggests IT theft in the office should be a primary concern.

Bugs & Bugs logo

Bugs & Bugs: DARPA, bug bounties & thousands of bees

Facebook Live stream captures latest news on computer bugs & real insects

power analysis safe electronic lock

High-security electronic safes can be hacked through power and timing analysis

A hacker showed that high-security electronic safe locks are susceptible to power and timing side-channel attacks like those used to defeat cryptosystems.

mans hand with key card to hotel room door

How to protect yourself from common hotel security threats

Frequently travelers who aren't prepared for the security risks associated with staying in hotels put potentially sensitive information and their own personal safety at risk. Here's how to spot common threats, and protect your data...

magnetic card spoof point-of-sale hotel

This tiny device can infect point-of-sale systems and unlock hotel rooms

Millions of point-of-sale systems and hotel room locks can be hacked by temporarily placing a small, inexpensive device several inches away from their card readers.

privileged accounts

Businesses failing to secure privileged accounts

A new benchmark survey finds that more than half of organizations have a failing grade when it comes to securing privileged accounts that can give attackers access to their entire networks.

security code big data cyberespionage DDoS

Attackers launch multi-vector DDoS attacks that use DNSSEC amplification

Incident responders from Akamai recently helped mitigate a DDoS attack against an unnamed European media organization that used six different attack techniques, including DNSSEC-based DNS amplification.

saip app

In Nice attack, government's official terror alert comes too late

"Take cover," the French government warned people in Nice via its official terror alert app, hours after the immediate danger had passed.

security padlock on keyboard locked computer stock

Cisco aims to simplify security

By combining its network visibility and breadth of integrated products, Cisco aims to make it simple for distributed and mobile businesses to deploy effective security while reducing the complexity required to manage it.

pokemon go pikachu car

Pokémon Go: Into the real world, with real crime

The game is getting its players off the couch, which already wasn’t safe from the bad guys.

o fallon missouri

Muggers used Pokemon Go to lure victims, police say

With the launch of Pokemon Go last week, it's not just players but police that "gotta catch 'em all."

rio police airport

Rio Olympics pose security risks to travelers

Physical safety isn't the only thing that travelers need to worry about at the Rio Olympics -- security experts warn that travelers need to be extremely careful when they access computer networks, as well.

Big Brother

Big Brother is listening as well as watching

The professed goal of audio surveillance on mass transit systems may be to protect passengers. But privacy advocates say it crosses a line, amounting to violations of free speech and the right to be free from unwarranted and...

01 intro

How to enhance protection of your surveillance system against cyber attacks

Here are nine areas of a network surveillance system that are most vulnerable, and how IT departments, with their security and facility management departments, can mitigate those risks.

security code big data cyberespionage DDoS

Think tanks mull Geneva Convention for cybercrime

A Geneva Convention on cyberwar: That's how a panel of experts proposes to deal with the growing threat to critical infrastructure posed by the possibility of cyberattack.

0 hurricane recovery

7 steps to hurricane-ready disaster recovery

When the winds start to howl, hopefully you can take solace that your data is safely backed up many miles away.

Load More