Physical Security

Physical Security news, analysis, research, how-to, opinion, and video.

pacemaker hacking kit
iot threats

shopping mall crowd

Flash mobs the latest threat this holiday season

The holiday season rings in more than just higher sales for retailers. There's also more shoplifting and lower profit margins than the rest of the year, according to a report released today. Plus, this year, there's an extra surprise...

biokey

REVIEW: BIO-key’s plug-in fingerprint readers for Windows 10 computers

BIO-key loaned me these three models for evaluation. I tested them on two notebooks: one running Windows 10 Home, and the other Windows 10 Pro. Find out the results.

airplane landing

Grey hats and blue skies, dealing with airline security

Since Sept. 11, 2001, the airline industry has been one of the fastest industries to upgrade their security procedures and protocols against various threats, both present and perceived. However, hackers don't need to board an airplane...

onetouch ping

New insulin pump flaws highlights security risks from medical devices

Medical device manufacturer Animas warns diabetic patients who use its OneTouch Ping insulin pumps about security issues that could allow hackers to take over the devices and deliver unauthorized doses of insulin.

macos sierra auto unlock apple watch 2

How to 'Auto Unlock' your Mac with Apple Watch

A new feature in Apple's macOS Sierra lets you use your Apple Watch to easily unlock your Mac computer. However, the 'Auto Lock' feature won't work unless a set of security and authentication safeguards is also enabled.

note 7 explosion jeep

The Galaxy Note 7 implicated in dramatic Jeep and house fires, reports say

If you haven't opted to take advantage of Samsung's recall offer, you should reconsider.

luc portelance theodoros sotiropoulos

Canada-EU counter-terror data exchange is illegal, says top EU judge

An agreement to send Canadian authorities passenger name record (PNR) data for flights from the European Union cannot be entered into in its current form, a top European Union judge has said.

third party threats

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

steal thief theft burglar laptop secret crime

Laptops most often stolen from most unlikely place

The rise of mobile has led many CIOs to fret about data loss from lost or stolen devices. A new study suggests IT theft in the office should be a primary concern.

Bugs & Bugs logo

Bugs & Bugs: DARPA, bug bounties & thousands of bees

Facebook Live stream captures latest news on computer bugs & real insects

power analysis safe electronic lock

High-security electronic safes can be hacked through power and timing analysis

A hacker showed that high-security electronic safe locks are susceptible to power and timing side-channel attacks like those used to defeat cryptosystems.

mans hand with key card to hotel room door

How to protect yourself from common hotel security threats

Frequently travelers who aren't prepared for the security risks associated with staying in hotels put potentially sensitive information and their own personal safety at risk. Here's how to spot common threats, and protect your data...

magnetic card spoof point-of-sale hotel

This tiny device can infect point-of-sale systems and unlock hotel rooms

Millions of point-of-sale systems and hotel room locks can be hacked by temporarily placing a small, inexpensive device several inches away from their card readers.

privileged accounts

Businesses failing to secure privileged accounts

A new benchmark survey finds that more than half of organizations have a failing grade when it comes to securing privileged accounts that can give attackers access to their entire networks.

security code big data cyberespionage DDoS

Attackers launch multi-vector DDoS attacks that use DNSSEC amplification

Incident responders from Akamai recently helped mitigate a DDoS attack against an unnamed European media organization that used six different attack techniques, including DNSSEC-based DNS amplification.

saip app

In Nice attack, government's official terror alert comes too late

"Take cover," the French government warned people in Nice via its official terror alert app, hours after the immediate danger had passed.

security padlock on keyboard locked computer stock

Cisco aims to simplify security

By combining its network visibility and breadth of integrated products, Cisco aims to make it simple for distributed and mobile businesses to deploy effective security while reducing the complexity required to manage it.

pokemon go pikachu car

Pokémon Go: Into the real world, with real crime

The game is getting its players off the couch, which already wasn’t safe from the bad guys.

Load More