US sets up dedicated office for energy infrastructure cybersecurity

The US government is setting up a new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) at the US Department of Energy. The CESER office will focus on energy infrastructure security and enable more coordinated preparedness and response to natural and man-made threats. “$96 million in funding for the office was included in President […]

How to ensure your IT and security teams stay aligned amid digital transformation

Even for sensitive industries, the movement to cloud-based technologies is generally accepted as a cost-effective and efficient infrastructure strategy and immediate priority. The migration to more agile products are occuring in nearly every department and physical security is no exception. New technologies make it possible for video surveillance data to shift from on-premise to the […]

Amazon Is Fixing a Security Loophole with its ‘Key’ Service

A researcher claims to have found a way to surreptitiously break into a home protected by Amazon Key, the company’s recently launched service which allows delivery staff to unlock a customer’s house and deposit items when no one’s home. MG, the pseudonymous researcher who detailed the issue, told Motherboard that Amazon is working on a […]

Ex-Apple, Dropcam executive launches a security camera for your car

Car hacking presents a grave cyber risk which has not talked about. A wannabe hacker/cybercriminal can gain control of your car and use it for theft and terrorist activities. A startup called Owl has all in one solution for cybersecurity as well as physical security of your car. Former Apple executive Andy Hodge and former Dropcam […]

Number of Internet-accessible ICS components is increasing every year

The number of industrial control system (ICS) components – which run factories, transport, power plants and other facilities – left open to Internet access, is increasing every year. In Germany, for example, researchers from Positive Technologies found 13,242 IP addresses for ICS components, up from 12,542 in 2016. Advanced industrial countries, such as the U.S., Germany, […]

How Strava’s “anonymized” fitness tracking data spilled government secrets

In November of last year Strava, a widely used app for tracking activity and exercise, released an “anonymized” heatmap of all its global data. When Australian student Nathan Ruser started digging into the data this week, he discovered that the map inadvertently reveals the location of sensitive government facilities. With over 3 trillion coordinates at the street level […]

Can Internet of Things make your physical security better?

The Internet of Things arrived somewhere in 2015 and the possibilities offered by it are seemingly endless. Imagine a world where everything is interconnected and helps you in your home chores as well as commercial businesses. Although there are many similarities in the way IoT protocols are implemented, there are some differences that set them […]

What Can We Learn from Counterterrorism and National Security Efforts?

Cyber attacks changed drastically over the last few years. Cyber attackers now focus on disrupting our day-to-day operations or use attacks as a strategic weapon. For example, in December 2016, Kiev experienced a blackout, likely as a result of a cyber attack on the Ukrainian capital’s power system. In the 2016 Dyn attack, Internet of Things […]

Researchers uncover major security vulnerabilities in ICS mobile applications

IOActive and Embedi researchers found 147 cybersecurity vulnerabilities in 34 mobile applications used in tandem with SCADA systems. According to the researchers, if the mobile application vulnerabilities identified are exploited, an attacker could disrupt an industrial process or compromise industrial network infrastructure, or cause a SCADA operator to unintentionally perform a harmful action on the system. The […]

Our smart future and the threat of cyber-kinetic attacks

Our lives increasingly revolve around Cyber-Physical Systems (CPSes) such as the Internet of Things (IoT) which integrate computational devices into an increasing range of everyday physical objects and even biological systems. With the spread of connected devices through all aspects of daily life comes increased vulnerability. These devices are designed to communicate and, as such, can potentially […]