Business laptop? $1,000. Sending away the thief? Priceless.

Credit to Author: Sharky| Date: Tue, 14 May 2019 03:00:00 -0700

The time is 2001, not long after 9/11, and the place is New York City. Heightened security awareness is the order of the day, and everyone in pilot fish’s office is required to carry an access card that activates the office doors. Look out for tailgaters, they’re all told. Those are people dressed like professionals who slide in behind someone with an access card and then steal wallets, coats and more.

One morning, fish arrives at the office and passes a man in business-casual attire carrying a laptop tucked under his arm and headed for the elevators. Fish doesn’t recognize the fellow, but he does know the co-worker who is running behind him, calling for someone to call building security and the police. The co-worker had returned to an empty desk just seconds after this tailgater had snatched his laptop, well before the tailgater could make a clean getaway.

To read this article in full, please click here

Read more

Security theater, ’80s style

Credit to Author: Sharky| Date: Tue, 23 Apr 2019 03:00:00 -0700

It’s the late 1980s and pilot fish is working on business application development for an aerospace and defense contractor where physical security is surprisingly lax. There’s a guard on duty at the front desk during business hours, but that’s about the extent of it. That changes with the announcement that all personal gear will be subject to inspection on leaving the building.
Now there are guards 24/7, and everyone leaving the building is politely requested by those guards to open their briefcases and backpacks. The guards then take a look inside before waving the owners through.
Rumor has it that this security push came about because some Apple Mac computers have gone missing. And it continues for about six months, and then suddenly ceases.
What happened? Employees have to rely on rumor again, which holds that the cleaning crew had taken the Macs, which makes sense given that large, wheeled trashcans would make the job easy.
The exit checks never turned up anything, but even law-abiding pilot fish can’t help but notice that it would be pretty easy to cover any contraband in a bag with a few clothes or newspapers and never be discovered, given the cursory nature of the searches.

To read this article in full, please click here

Read more

Assessing the security of a portable router: a look inside its hardware, part deux

Credit to Author: Jean Taggart| Date: Wed, 26 Dec 2018 19:15:59 +0000

In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.

Categories:

Tags:

(Read more…)

The post Assessing the security of a portable router: a look inside its hardware, part deux appeared first on Malwarebytes Labs.

Read more

How to build your own motion-activated security camera

Credit to Author: Jean Taggart| Date: Tue, 16 Oct 2018 15:00:00 +0000

Attention makers! Are you looking for a challenging project that not only gets your gears grinding but helps to keep you secure while traveling? Welcome to the build-your-own security camera tutorial.

Categories:

Tags:

(Read more…)

The post How to build your own motion-activated security camera appeared first on Malwarebytes Labs.

Read more

Bloomberg blunder highlights supply chain risks

Credit to Author: Adam McNeil| Date: Wed, 10 Oct 2018 16:00:00 +0000

A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.

Categories:

Tags:

(Read more…)

The post Bloomberg blunder highlights supply chain risks appeared first on Malwarebytes Labs.

Read more

Assessing the security of a portable router: a look inside its hardware

Credit to Author: Jean Taggart| Date: Mon, 10 Sep 2018 15:00:00 +0000

In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.

Categories:

Tags:

(Read more…)

The post Assessing the security of a portable router: a look inside its hardware appeared first on Malwarebytes Labs.

Read more