The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
It now appears that organized crime groups, often from eastern Europe, are moving across the U.S. placing devices on ATMs and gas station credit card readers to steal identities. Skimmers
The Animal Liberation Front has taken responsibility for a molotov cocktail attack at the former Ylipelto Mink Farm in Svensen, Oregon. In an anonymous Internet post on the North American
A U.S. House Homeland Security subcommittee called DHS senior officials to testify July 28. Panel leaders said they were concerned that TSA has dedicated too much of its resources to
The world market for perimeter security sensors is projected to exceed $440 million by 2014. The growth of this market will primarily be driven by proposed legislation in Europe, CBRN
Chief security and information officers beware: IT professionals are using personal email accounts to mask file transfer activity from management, according to a study released today by Ipswitch, Inc., the
Cybersecurity is a challenge that we face together. It’s important to talk about that challenge, what can be done about it, and, importantly, who should do the work. In 1990,
Based on intelligence indicating that Al Qaeda and associated movements continue to express interest in attacking U.S. mass transit systems, the Government Accountability Office (GAO) has issued a redacted version
At the Black Hat conference in Las Vegas this week, IOActive’s director of security research gave a demonstration of how he learned to crack the security of various standalone ATMs
FREE Webinar from Moog Quikset on July 27!With the increased concern over terrorist threats and intrusions at critical infrastructure sites, installing and operating a reliable, flexible and compliant detection, surveillance,
FREE Webinar from Moog Quikset on July 27! With the increased concern over terrorist threats and intrusions at critical infrastructure sites, installing and operating a reliable, flexible and compliant detection,